Windows Defender Reporting Disabled via Registry Modification
Attackers modify the Windows registry to disable Windows Defender generic reports, preventing error reports and potentially hiding malicious activity.
This analytic detects modifications to the Windows registry that disable Windows Defender’s generic reports. Attackers may modify the “DisableGenericRePorts” registry value to prevent the transmission of error reports to Microsoft’s Windows Error Reporting service, effectively hiding malicious activities from being reported. This technique can be employed to reduce the visibility of attacker actions and increase the likelihood of undetected system compromise by bypassing Windows Defender detections. The activity is identified through monitoring changes to specific registry keys associated with Windows Defender reporting. Disabling these reports hinders the ability to identify and respond to security incidents effectively.
Attack Chain
- The attacker gains initial access to the target system (e.g., through compromised credentials or exploiting a vulnerability).
- The attacker elevates privileges to obtain the necessary permissions to modify the Windows Registry.
- The attacker uses a process (e.g.,
reg.exe,powershell.exe, or a custom script) to modify the registry. - The process modifies the
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting\DisableGenericRePortsregistry value. - The
DisableGenericRePortsregistry value is set to0x00000001(DWORD), disabling Windows Defender generic reports. - Windows Defender no longer sends generic reports to the Windows Error Reporting service.
- Malicious activities on the system are less likely to be reported, allowing the attacker to operate with reduced visibility.
Impact
Successful execution of this technique leads to a diminished ability to detect malicious activity on the affected system. Disabling Windows Defender’s reporting mechanisms can allow malware or other malicious actors to operate undetected, potentially leading to data breaches, system compromise, or other adverse outcomes. The impact is significant because it impairs a key security control, creating a blind spot for defenders.
Recommendation
- Enable Sysmon EventID 13 logging to monitor registry modifications, as this is the data source for the provided detections.
- Deploy the Sigma rule
Detect Windows Defender Reporting Disabled via Registry Modificationto your SIEM to detect this specific activity. - Investigate any detected instances of registry modifications to the
DisableGenericRePortsvalue. - Monitor process creation events for processes such as
reg.exeorpowershell.exemodifying registry keys related to Windows Defender using the ruleSuspicious Process Modifying Windows Defender Registry.
Detection coverage 2
Detect Windows Defender Reporting Disabled via Registry Modification
mediumDetects modifications to the Windows Registry that disable Windows Defender's generic reports.
Suspicious Process Modifying Windows Defender Registry
mediumDetects processes like reg.exe or powershell.exe modifying Windows Defender related registry keys
Detection queries are kept inside the platform. Get full rules →