Detection rules › Sigma

Potential AutoLogger Sessions Tampering

Severity
high
Author
Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects tampering with autologger trace sessions which is a technique used by attackers to disable logging

Event coverage

ProviderEvent IDTitle
Sysmon13RegistryEvent (Value Set)

Stages and Predicates

Stage 1: all of selection_main

TargetObject|contains: '\System\CurrentControlSet\Control\WMI\Autologger\'

Stage 2: all of selection_values

or:
TargetObject|endswith: '\Enable'
TargetObject|endswith: '\Start'
or:
TargetObject|contains: '\Defender'
TargetObject|contains: '\EventLog-'
Details: 'DWORD (0x00000000)'

Stage 3: not 1 of filter_main_*

or:
or:
Image|startswith: 'C:\Program Files (x86)\Windows Defender\'
Image|startswith: 'C:\Program Files\Windows Defender\'
Image|startswith: 'C:\ProgramData\Microsoft\Windows Defender\Platform\'
or:
TargetObject|contains: '\DefenderApiLogger\'
TargetObject|contains: '\DefenderAuditLogger\'
Image|endswith: '\MsMpEng.exe'
Image: 'C:\Windows\system32\wevtutil.exe'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Detailseq
  • DWORD (0x00000000) corpus 38 (sigma 38)
Imageends_with
  • \MsMpEng.exe corpus 13 (sigma 13)
Imageeq
  • C:\Windows\system32\wevtutil.exe corpus 2 (sigma 2)
Imagestarts_with
  • C:\Program Files (x86)\Windows Defender\ corpus 5 (sigma 5)
  • C:\Program Files\Windows Defender\ corpus 5 (sigma 5)
  • C:\ProgramData\Microsoft\Windows Defender\Platform\ corpus 7 (sigma 7)
TargetObjectends_with
  • \Enable
  • \Start corpus 2 (sigma 2)
TargetObjectmatch
  • \Defender
  • \DefenderApiLogger\
  • \DefenderAuditLogger\
  • \EventLog-
  • \System\CurrentControlSet\Control\WMI\Autologger\