Windows AutoLogger Session Disabled via Registry Modification
An attacker disables Windows AutoLogger sessions by modifying specific registry values to evade defenses and blind EDR and log ingest tools.
Attackers are known to disable Windows AutoLogger sessions to impair defenses and evade detection. This technique involves modifying specific registry values associated with AutoLogger sessions and their providers, effectively blinding EDR solutions and log ingest tools. By setting the “Start” or “Enabled” values under the \WMI\Autologger\ registry key to 0x00000000, adversaries can stop the collection of crucial event data. This activity is often observed post-compromise, as a means to conceal further malicious actions and maintain persistence on the affected system. Malware such as IcedID and ransomware variants have been observed using similar techniques to impair logging and detection capabilities. The scope of this threat includes any Windows system where adversaries have gained sufficient privileges to modify registry settings related to event logging.
Attack Chain
- Initial Access: The attacker gains initial access to the target system through methods such as phishing or exploiting a software vulnerability.
- Privilege Escalation: The attacker escalates privileges to gain administrative access, allowing them to modify system-level settings.
- Discovery: The attacker identifies the registry keys associated with Windows AutoLogger sessions, typically located under
HKLM\System\CurrentControlSet\Control\WMI\Autologger. - Defense Evasion: The attacker modifies the
StartorEnabledregistry values for specific AutoLogger sessions or providers within the\WMI\Autologger\path. The values are set to0x00000000to disable the logging session. - Persistence: The attacker may establish persistence through various methods.
- Lateral Movement: The attacker moves laterally to other systems on the network, repeating the defense evasion steps to blind security tools across the environment.
- Data Exfiltration/Ransomware Deployment: With logging impaired, the attacker proceeds to exfiltrate sensitive data or deploy ransomware, hindering incident response efforts.
Impact
Successful execution of this attack can severely impair an organization’s ability to detect and respond to security incidents. By disabling AutoLogger sessions, attackers effectively blind EDR solutions and prevent the collection of critical event data. This can lead to delayed detection of malicious activity, increased dwell time, and ultimately, greater damage from data breaches or ransomware attacks. Several campaigns, including those involving IcedID and XingLocker ransomware, have leveraged similar techniques.
Recommendation
- Enable Sysmon EventID 13 to monitor registry modifications, as specified in the
data_sourcesection. - Deploy the Sigma rule
Disable AutoLogger Sessionto detect changes to AutoLogger registry values. - Investigate any alerts generated by the Sigma rule
Disable AutoLogger Sessionto determine if the activity is malicious. - Review and harden registry permissions to prevent unauthorized modifications to critical system settings.
- Utilize the
windows_impair_defenses_disable_auto_logger_session_filtermacro (referenced in the original Splunk search) to tune detections and reduce false positives.
Detection coverage 2
Disable AutoLogger Session
highDetects the disabling of an AutoLogger session or provider by monitoring registry modifications.
Disable AutoLogger Session by Process
highDetects processes disabling AutoLogger sessions by modifying specific registry values.
Detection queries are kept inside the platform. Get full rules →