heroui logo

ETW Logging Disabled In .NET Processes - Sysmon Registry

Sigma Rules

View Source
Summary
This detection rule is designed to identify attempts by adversaries to disable Event Tracing for Windows (ETW) logging in .NET processes. By manipulating registry settings related to .NET, attackers may suppress logging capabilities, which could prevent security solutions from capturing critical data about loaded .NET assemblies during runtime. The rule specifically checks for changes to the registry keys associated with ETW settings for .NET Framework, looking for cases where the `ETWEnabled` key is set to 0 or if `COMPlus_ETWEnabled` or `COMPlus_ETWFlags` keys are also set to 0. The ability to stop ETW logging allows attackers to hide their activities, making it harder for defenders to analyze and respond effectively. The rule operates by monitoring Registry events originating from Windows systems, thus requiring proper collection and analysis of Registry logs.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2020-06-05