heroui logo

HackTool - SharpEvtMute Execution

Sigma Rules

View Source
Summary
The rule 'HackTool - SharpEvtMute Execution' aims to detect the execution of SharpEvtMute, a tool primarily used for manipulating Windows event logs. This detection rule focuses on identifying specific characteristics of process creation related to SharpEvtMute. It examines the command line for specific patterns and the image name to confirm the execution of the tool. By looking for 'SharpEvtMute.exe' in the process creation logs, as well as checking for command lines containing filters that indicate tampering with event logs, the rule aims to alert on potential defense evasion attempts. The detection leverages the process creation logs from Windows, responding to techniques outlined in the MITRE ATT&CK framework under 'Defense Evasion'. This rule is particularly important for security monitoring teams to detect and respond to unauthorized uses of tools that may hide or alter event logs, potentially allowing malicious activities to go unnoticed.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Process
  • Application Log
Created: 2022-09-07