heroui logo

Potential AutoLogger Sessions Tampering

Sigma Rules

View Source
Summary
The detection rule titled 'Potential AutoLogger Sessions Tampering' is designed to identify unauthorized attempts to alter autologger trace sessions in Windows systems. These sessions are critical as they record events for monitoring and auditing purposes. Attackers targeting the autologger employ techniques to disable logging methods such as ETW (Event Tracing for Windows) to evade detection. This rule leverages specific registry paths and properties associated with the Autologger to trigger alerts when a compromise is suspected. Particularly, it monitors changes to \System\CurrentControlSet\Control\WMI\Autologger\, looking for specific TargetObject conditions that indicate potential tampering. The rule checks for interactions with known logging components, particularly those associated with Windows Event Logs and Windows Defender, and filters out activities initiated by the legitimate wevtutil tool to minimize false positives. A high alert level is designated for this rule due to the severity of the tampering effect on a system's ability to log critical events, undermining system integrity and security practices.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2022-08-01