
A brand new instrument known as ‘Defendnot’ can disable Microsoft Defender on Home windows units by registering a faux antivirus product, even when no actual AV is put in.
The trick makes use of an undocumented Home windows Safety Middle (WSC) API that antivirus software program makes use of to inform Home windows it’s put in and is now managing the real-time safety for the gadget.
When an antivirus program is registered, Home windows robotically disables Microsoft Defender to keep away from conflicts from working a number of safety purposes on the identical gadget.
The Defendnot instrument, created by researcher es3n1n, abuses this API by registering a faux antivirus product that meets all of Home windows’ validation checks.
The instrument is predicated on a earlier undertaking known as no-defender, which used code from a third-party antivirus product to spoof registration with WSC. That earlier instrument was pulled from GitHub after the seller filed a DMCA takedown.
“Then, after a couple of weeks after the discharge, the undertaking blew up fairly a bit and gained ~1.5k stars, after that the builders of the antivirus I used to be utilizing filed a DMCA takedown request and I did not actually wish to do something with that so simply erased the whole lot and known as it a day,” the developer explains in a weblog put up.
Defendnot avoids copyright points by constructing the performance from scratch via a dummy antivirus DLL.
Usually, WSC API is safeguarded via Protected Course of Mild (PPL), legitimate digital signatures, and different options.
To bypass these necessities, Defendnot injects its DLL right into a system course of, Taskmgr.exe, that’s signed and already trusted by Microsoft. From inside that course of, it could possibly register the dummy antivirus with a spoofed show identify.
As soon as registered, Microsoft Defender instantly shuts itself off, leaving no energetic safety on the gadget.

Supply: BleepingComputer
The instrument additionally features a loader that passes configuration knowledge by way of a ctx.bin file and allows you to set the antivirus identify you wish to use, flip off registration, and allow verbose logging.
For persistence, Defendnot creates an autorun via the Home windows Job Scheduler in order that it begins if you log in to Home windows.
Whereas Defendnot is taken into account a analysis undertaking, the instrument demonstrates how trusted system options may be manipulated to show off safety features.
Microsoft Defender is at the moment detecting and quarantining Defendnot as a ‘Win32/Sabsik.FL.!ml; detection.
