heroui logo

Windows New Custom Security Descriptor Set On EventLog Channel

Splunk Security Content

View Source
Summary
This rule is designed to detect potentially malicious modifications to the EventLog security descriptor in Windows systems. It focuses on changes to the registry value 'CustomSD' located in the path 'HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\<Channel>\CustomSD'. Such modifications can be indicative of an attacker trying to evade detection by altering access permissions on the event logs. If successful, this could allow an attacker to prevent legitimate users and security monitoring tools from accessing important security-related logs, thereby concealing their activities. The rule utilizes data from the Endpoint.Registry data model and specifically looks at Sysmon EventID 13 to identify relevant changes.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
  • Windows Registry
  • User Account
ATT&CK Techniques
  • T1562
  • T1562.002
Created: 2025-01-07