heroui logo

ETW Trace Evasion Activity

Sigma Rules

View Source
Summary
This rule identifies potential evasion activities by monitoring command-line interactions intended to disable or clear Event Tracing for Windows (ETW) logs. Such activities could represent an attempt to conceal malicious actions from the monitoring capabilities of security tools. Specific command line patterns such as `cl /Trace`, `clear-log /Trace`, `sl /e:false`, and `Remove-EtwTraceProvider` are flagged, among others, indicating deliberate attempts to alter the logging status of ETW. Instances of command line executions that suggest modifications to trace providers or manipulations of logging settings are captured under this rule. Due to the sensitive nature of ETW logs in auditing Windows activity, this detection is categorized with a high alert level.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2019-03-22