Windows Defender Health Check Interval Modification
This analytic detects modifications to the Windows registry, specifically targeting the `ServiceKeepAlive` value, to impair Windows Defender's ability to perform timely health checks, potentially leading to a vulnerable system state.
Attackers may attempt to disable or delay security scans by modifying the health check interval of Windows Defender. This is achieved by altering the ServiceKeepAlive registry value. The modifications can prevent the timely detection of malware or other malicious activities, thereby increasing the risk to the system. The observed registry key path is *\\Windows Defender\\ServiceKeepAlive with the specific registry value data being 0x00000001. This technique has been observed in the wild, as reported on X (formerly Twitter), and is also a focus of privacy-enhancing tools like privacy.sexy. This highlights the importance of monitoring registry modifications related to Windows Defender’s configuration.
Attack Chain
- Attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).
- The attacker executes a process with elevated privileges (e.g., using
sudoor exploiting a privilege escalation vulnerability). - The process modifies the Windows Registry, specifically targeting the
HKLM\SOFTWARE\Microsoft\Windows Defender\ServiceKeepAlivekey. - The
registry_value_datais set to0x00000001, which may disable or delay health checks. - Windows Defender health checks are impaired, reducing the frequency or effectiveness of scans.
- Malware or malicious activity remains undetected due to the reduced scan frequency.
- The attacker maintains persistence and further compromises the system, potentially leading to data theft or ransomware deployment.
Impact
Successful modification of Windows Defender health check intervals can lead to a significant decrease in the system’s ability to detect and respond to threats. This can result in undetected malware infections, data breaches, and system compromise. While the number of direct victims is unknown, the widespread use of Windows Defender makes this a potentially impactful technique across various sectors.
Recommendation
- Deploy the Sigma rule
Registry Modification of Windows Defender Health Check Intervalto your SIEM to detect malicious registry changes. - Monitor
Sysmon EventID 13events for registry modifications related to Windows Defender’sServiceKeepAlivekey. - Investigate any alerts generated by the Sigma rule, paying close attention to the
destandprocess_guidfields. - Use the provided references to understand the context of this technique in real-world attacks.
- Tune the provided filter macro
windows_impair_defense_change_win_defender_health_check_intervals_filterto minimize false positives in your environment.
Detection coverage 2
Registry Modification of Windows Defender Health Check Interval
highDetects modifications to the Windows Registry that change the health check interval of Windows Defender.
Process Modifying Windows Defender Health Check Registry Key
mediumDetects processes that modify the Windows Defender ServiceKeepAlive registry key.
Detection queries are kept inside the platform. Get full rules →