Detection rules › Sigma

Sysmon Channel Reference Deletion

Severity
high
Author
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Source
upstream

Potential threat actor tampering with Sysmon manifest and eventually disabling it

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1112 Modify Registry
Defense EvasionT1112 Modify Registry

Event coverage

ProviderEvent IDTitle
Security-Auditing4657A registry value was modified.
Security-Auditing4663An attempt was made to access an object.

Stages and Predicates

Stage 1: 1 of selection1

or:
ObjectName|contains: 'WINEVT\Channels\Microsoft-Windows-Sysmon/Operational'
ObjectName|contains: 'WINEVT\Publishers\{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'
NewValue: 0
ObjectValueName: Enabled

Stage 2: 1 of selection2

or:
ObjectName|contains: 'WINEVT\Channels\Microsoft-Windows-Sysmon/Operational'
ObjectName|contains: 'WINEVT\Publishers\{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'
AccessMask: 0x10000

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
AccessMaskeq
  • 0x10000
NewValueeq
  • 0 corpus 4 (sigma 3, splunk 1)
ObjectNamematch
  • WINEVT\Channels\Microsoft-Windows-Sysmon/Operational
  • WINEVT\Publishers\{5770385f-c22a-43e0-bf4c-06f5698ffbd9}
ObjectValueNameeq
  • Enabled

Neighbors

Often fire together

Rules that target events appearing in the same incident timelines. They pattern-match on adjacent steps of the same TTP, so an alert from one is often paired with alerts from these. Useful for triage context and for assembling chained-detection rules.

Share event IDs (chain-detection candidates)

Rules that observe the same Windows event-ID pairs as this one. If you're authoring a multi-stage / sequence rule that spans these events, these are the existing detections that already cover one or both endpoints.