heroui logo

Sysmon Configuration Error

Sigma Rules

View Source
Summary
This detection rule aims to identify attempts by adversaries to evade detection by manipulating Sysmon logging configurations. It focuses on specific error messages that indicate problems when attempting to alter the Sysmon service configuration. The rule captures instances where there are critical failures in communicating with Sysmon, such as errors when opening service configurations or connecting to the driver. The filter conditions are stringent, allowing for the detection of specific error messages related to failed configurations. By triggering on these specific logs and filtering out certain common legitimate administrative actions, this rule can effectively indicate potential attempts at tampering with Sysmon settings, which could denote an ongoing security incident or an effort to obscure malicious activity. This rule is particularly important for maintaining visibility into actions taken on a Windows environment, where Sysmon is invaluable for logging and monitoring system activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
  • Process
ATT&CK Techniques
  • T1562.001
Created: 2021-06-04