Windows Defender Signature Retirement Disabled via Registry Modification
An attacker disables Windows Defender's signature retirement feature by modifying a registry key, potentially reducing its effectiveness in detecting threats by allowing older, less relevant signatures to persist.
Attackers may attempt to disable Windows Defender’s signature retirement mechanism to weaken the endpoint protection. This is achieved by modifying the DisableSignatureRetirement registry value. Disabling signature retirement can prevent Windows Defender from removing outdated antivirus signatures, potentially reducing its effectiveness in detecting threats. Attackers may use this technique to evade detection by ensuring older, less effective signatures remain active, thereby reducing the likelihood of detecting their malicious activities. The tactic is used as part of defense evasion strategies.
Attack Chain
- The attacker gains initial access to the target system through unspecified means.
- The attacker elevates privileges to obtain the necessary permissions to modify the Windows Registry.
- The attacker uses a command-line tool like
reg.exeor PowerShell to modify the registry. - The attacker targets the specific registry key:
HKLM\SOFTWARE\Microsoft\Windows Defender\NIS\Consumers\IPS. - The attacker modifies the
DisableSignatureRetirementregistry value. - The attacker sets the
DisableSignatureRetirementvalue to0x00000001to disable the signature retirement feature. - Windows Defender continues to use outdated signatures, which may be less effective against modern threats.
- The attacker executes malicious code, evading detection due to the weakened signature database.
Impact
Disabling Windows Defender’s signature retirement feature weakens the system’s security posture. This allows outdated and less effective signatures to remain active, potentially leading to missed detections of newer threats. Successfully exploiting this vulnerability allows attackers to operate with reduced risk of detection, potentially leading to data breaches, malware infections, and other security incidents. The impact can affect individual endpoints as well as entire organizations relying on Windows Defender for primary threat protection.
Recommendation
- Deploy the provided Sigma rule to detect modifications to the
DisableSignatureRetirementregistry value (see rules). - Monitor Windows Registry events for unauthorized modifications to Windows Defender settings, specifically Event ID 13 from Sysmon (see rules and data_source).
- Investigate any detected instances of
DisableSignatureRetirementbeing set to0x00000001(see rules). - Implement strict access controls to prevent unauthorized modification of registry settings related to Windows Defender.
- Tune the provided filter macro
windows_impair_defense_disable_win_defender_signature_retirement_filterto reduce false positives in your environment (see search).
Detection coverage 2
Windows Defender Signature Retirement Disabled
mediumDetects when the Windows Defender Signature Retirement feature is disabled by modifying the registry key.
Sysmon Event 13 - Windows Defender Signature Retirement Disabled
mediumDetects the disabling of Windows Defender Signature Retirement using Sysmon Event ID 13.
Detection queries are kept inside the platform. Get full rules →