heroui logo

ETW Registry Disabled

Splunk Security Content

View Source
Summary
The "ETW Registry Disabled" analytic rule is designed to detect modifications to the registry that disable Event Tracing for Windows (ETW) within the .NET Framework, utilizing data from the Endpoint.Registry data model. Specifically, it monitors any changes to the ETWEnabled value located under the .NETFramework registry path. A change that sets this value to 0 (disabled) is a significant indicator of a potential evasion tactic being employed by attackers. Disabling ETW can obstruct Endpoint Detection and Response (EDR) capabilities, making it easier for malicious actors to execute and cover their tracks from security monitoring tools, thus posing a serious threat to the integrity of the system. Confirming this entry as malicious could reveal attempts by an adversary to compromise an environment stealthily, indicating a higher risk of further intrusions and persistent access.
Categories
  • Endpoint
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1562.006
  • T1127
  • T1562
Created: 2024-12-16