Windows DISM Used to Remove Windows Defender
The analytic detects the use of `dism.exe` to remove Windows Defender, potentially allowing adversaries to evade detection and carry out further malicious actions.
This threat brief addresses the use of Deployment Image Servicing and Management (DISM) to remove Windows Defender. Adversaries may attempt to disable or remove Windows Defender to evade detection and carry out further malicious actions undetected. This activity is significant because a disabled Defender can lead to persistent access, execution of additional payloads, and exfiltration of sensitive data without interruption. The original Splunk ES/CU analytic was published in May 2026, highlighting the continued relevance of this technique. This brief provides updated detection guidance for security teams.
Attack Chain
- An attacker gains initial access to the target system (e.g., via compromised credentials or exploiting a vulnerability).
- The attacker executes
dism.exewith specific parameters to disable features. - The command includes the
/onlineparameter to operate on the running operating system. - The command includes
/disable-featureto disable a specific feature. - The
featurename:Windows-Defenderparameter targets the Windows Defender feature for removal. - The command includes the
/removeparameter to completely remove the targeted feature. - With Windows Defender removed, the attacker executes malicious payloads without immediate detection.
- The attacker achieves their objective, such as data exfiltration, lateral movement, or ransomware deployment.
Impact
Successful removal of Windows Defender can lead to complete compromise of the affected endpoint. An attacker gains the ability to execute any malicious code without triggering antivirus alerts, leading to data theft, system compromise, or ransomware deployment. The referenced DFIR Report (2020) describes a similar technique used in Pysa/Mespinoza ransomware attacks, indicating that real-world actors employ this evasion strategy.
Recommendation
- Deploy the Sigma rule
Detect DISM Usage to Remove Windows Defenderto your SIEM and tune for your environment to detect the execution ofdism.exewith parameters used to remove Windows Defender. - Enable Sysmon process-creation logging (Event ID 1) to provide the necessary data for the Sigma rule.
- Investigate any instances of
dism.exeexecuting with command-line arguments containing/online,/disable-feature,Windows-Defender, and/removeto identify potential malicious activity.
Detection coverage 2
Detect DISM Usage to Remove Windows Defender
highDetects the execution of dism.exe with parameters used to remove Windows Defender.
Detect DISM Usage by Non-System Account
highDetects the execution of dism.exe with parameters used to remove Windows Defender by user account instead of system account.
Detection queries are kept inside the platform. Get full rules →