Windows Defender Scan On Update Disabled via Registry Modification
An attacker modifies the Windows registry to disable the Windows Defender Scan On Update feature, potentially evading detection and establishing persistence.
This threat brief addresses the disabling of Windows Defender’s “Scan On Update” feature through registry modifications. Attackers may target this setting to prevent automatic scans when signature updates are applied, thereby hindering real-time detection of malware and other threats. This technique can be employed to evade initial access detection or to maintain persistence on a compromised system. Specifically, the attack involves changing the “DisableScanOnUpdate” registry value to “0x00000001”. Disabling this feature, while not always indicative of malicious activity, significantly reduces the effectiveness of Windows Defender, making systems more susceptible to compromise. Defenders should monitor for unauthorized registry modifications related to Windows Defender settings.
Attack Chain
- The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).
- The attacker escalates privileges to obtain the necessary permissions to modify the registry.
- The attacker uses a command-line tool (e.g.,
reg.exe, PowerShell) or a script to modify theDisableScanOnUpdateregistry value. - The attacker changes the registry key
HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates\DisableScanOnUpdateto a value of0x00000001. - Windows Defender no longer performs automatic scans upon signature updates.
- The attacker deploys malware or other malicious payloads to the system without triggering immediate scans.
- The attacker establishes persistence and continues to perform malicious activities.
Impact
Disabling the Windows Defender Scan On Update feature can significantly increase the dwell time of malware on a compromised system. This can lead to data breaches, system corruption, or further lateral movement within the network. The potential impact includes financial losses, reputational damage, and disruption of business operations. Systems that are not actively scanned are more vulnerable to both known and unknown threats, potentially impacting thousands of endpoints within an organization if the registry modification is widespread.
Recommendation
- Deploy the Sigma rule
Registry Modification to Disable Windows Defender Scan On Updateto detect registry modifications related to theDisableScanOnUpdatesetting. - Monitor Sysmon EventID 13 for registry modifications to the
HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates\DisableScanOnUpdatepath. - Investigate any instances where the
DisableScanOnUpdateregistry value is set to0x00000001. - Use endpoint detection and response (EDR) solutions to identify and block suspicious processes attempting to modify Windows Defender settings.
- Tune the
windows_impair_defense_disable_win_defender_scan_on_update_filtermacro in Splunk to reduce false positives.
Detection coverage 2
Registry Modification to Disable Windows Defender Scan On Update
mediumDetects modifications to the Windows registry that disable the Windows Defender Scan On Update feature.
Process Modifying Windows Defender DisableScanOnUpdate Registry Key
mediumDetects a process modifying the Windows Defender DisableScanOnUpdate registry key.
Detection queries are kept inside the platform. Get full rules →