heroui logo

Unload Sysmon Filter Driver

Splunk Security Content

View Source
Summary
The 'Unload Sysmon Filter Driver' analytic rule is designed to detect and alert on instances where the Sysmon driver, which is critical for gathering detailed logging of system activity, is unsuspectingly unloaded using the 'fltMC.exe' process. The significance of this detection lies in its ability to identify potential security gaps; when Sysmon is disabled, malicious activities may occur without being logged, making it harder to investigate incidents or to understand the security state of the environment. The detection leverages multiple data sources including Sysmon logs that capture process creation events and EDR logs that track command executions. Given that disabling Sysmon can enhance an attacker's ability to persist undetected in a system, this detection rule aims to promptly surface those unauthorized unloading actions for investigation.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13