heroui logo

Sysmon Configuration Modification

Sigma Rules

View Source
Summary
This detection rule focuses on monitoring Sysmon (System Monitor) configurations to identify when an attacker attempts to disable or stop Sysmon to evade detection mechanisms during malicious activities. The rule utilizes Sysmon's ability to log its own operational states, capturing any changes from 'Started' to 'Stopped' which may indicate an evasion tactic. The detection logic specifies conditions under which alerts should trigger, specifically looking for 'Stopped' state and configuration changes while ignoring legitimate administrative actions that may also modify these states. The overall goal is to enhance incident detection capabilities by providing real-time insights on Sysmon status alterations that could signify potential security breaches or attacks.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Service
ATT&CK Techniques
  • T1562.001
Created: 2021-06-04