Windows EventLog Autologger Session Disabled via Registry Modification
Adversaries may attempt to disable Windows EventLog autologger sessions via registry modification to evade detection and prevent security monitoring of early boot activities and system events.
Attackers may disable Windows EventLog autologger sessions by modifying specific registry keys, thus evading detection and preventing security monitoring of early boot activities and system events. The AutoLogger event tracing session records events early in the operating system boot process, allowing applications and device drivers to capture traces before user login. Disabling these sessions can blind security monitoring tools, especially those focused on early boot activity, making it harder to detect malicious activity. This technique allows attackers to operate with less scrutiny during critical phases of system startup, potentially enabling persistence or other malicious objectives.
Attack Chain
- The attacker gains initial access to the system, possibly through exploitation of a vulnerability or through stolen credentials.
- The attacker uses
reg.exeor PowerShell to modify the registry. - The attacker targets registry keys under
\Control\WMI\Autologger\. - The attacker modifies the
Startvalue to disable specific autologger sessions like EventLog-Application or EventLog-System. - Alternatively, the attacker modifies the
Enabledvalue to disable specific providers of an autologger session. - The attacker executes the command, changing the registry value to disable the targeted autologger session or provider.
- The system no longer records events for the disabled autologger session or provider.
Impact
Disabling the Windows EventLog autologger can severely impact an organization’s ability to detect and respond to threats. Security monitoring tools that rely on these logs will be unable to record early boot activities and system events, leading to a gap in visibility. This can allow attackers to establish persistence mechanisms, escalate privileges, or perform other malicious activities without being detected. The impact could range from undetected malware infections to significant data breaches, depending on the attacker’s objectives.
Recommendation
- Deploy the Sigma rule
Windows EventLog Autologger Session Registry Modification Via CommandLineto your SIEM and tune for your environment to detect this behavior in your environment. - Monitor process creation events for
reg.exe,powershell.exe, orpwsh.exewith command-line arguments that contain\Control\WMI\Autologger\and eitherStartorEnabledbased on the Sigma rule’s detections. - Implement Atomic Red Team simulations to validate detections and train security staff.
- Investigate any instances of registry modifications related to Autologger sessions to determine if they are legitimate or malicious.
Detection coverage 2
Windows EventLog Autologger Session Registry Modification via Reg.exe
highDetects attempts to disable Windows EventLog autologger sessions via registry modification using reg.exe
Windows EventLog Autologger Session Registry Modification via PowerShell
highDetects attempts to disable Windows EventLog autologger sessions via registry modification using PowerShell
Detection queries are kept inside the platform. Get full rules →