Detectionhightest
Sysmon Configuration Modification
Detects when an attacker tries to hide from Sysmon by disabling or stopping it
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Windowssysmon_status
ProductWindows← raw: windows
Categorysysmon_status← raw: sysmon_status
Detection Logic
Detection Logic3 selectors
detection:
selection_stop:
State: Stopped
selection_conf:
- 'Sysmon config state changed'
filter:
State: Started
condition: 1 of selection_* and not filterFalse Positives
Legitimate administrative action
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
1f2b5353-573f-4880-8e33-7d04dcf97744
Status
test
Level
high
Type
Detection
Created
Fri Jun 04
Modified
Tue Aug 02
Author
Path
rules/windows/sysmon/sysmon_config_modification_status.yml
Raw Tags
attack.defense-evasionattack.t1564