Detectionhightest

ETW Logging Disabled In .NET Processes - Registry

Potential adversaries stopping ETW providers recording loaded .NET assemblies.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)Created Fri Jun 05Updated Tue Dec 20a4c90ea1-2634-4ca0-adbb-35eae169b6fcwindows
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Detection Logic
Detection Logic2 selectors
detection:
    selection_etw_enabled:
        EventID: 4657
        ObjectName|endswith: '\SOFTWARE\Microsoft\.NETFramework'
        ObjectValueName: 'ETWEnabled'
        NewValue: 0
    selection_complus:
        EventID: 4657
        ObjectName|contains: '\Environment'
        ObjectValueName:
            - 'COMPlus_ETWEnabled'
            - 'COMPlus_ETWFlags'
        NewValue: 0
    condition: 1 of selection_*
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
a4c90ea1-2634-4ca0-adbb-35eae169b6fc
Status
test
Level
high
Type
Detection
Created
Fri Jun 05
Modified
Tue Dec 20
Path
rules/windows/builtin/security/win_security_dot_net_etw_tamper.yml
Raw Tags
attack.persistenceattack.defense-evasionattack.t1112attack.t1562
View on GitHub