
Summary
This detection rule targets the shutdown of the Windows Event Log service, specifically by monitoring for Windows Event ID 1100, which is logged whenever the service stops. The shutdown of this service can arise from legitimate system processes, such as standard shutdowns, or it can indicate malicious activity aimed at disabling logging and covering tracks. The rule emphasizes the importance of scrutinizing these events, especially when shutdowns occur unexpectedly. Analysts are advised to corroborate any shutdown with additional data sources to evaluate whether the activity is benign or indicative of an attack. False positives are recognized, as some services may stop for legitimate reasons like system errors or administrative tasks. Thus, analysts should delve deeper into the context surrounding the shutdowns, considering correlating alerts and user actions.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
ATT&CK Techniques
- T1070
- T1070.001
Created: 2025-01-28