Skip to content
Threat Feed
high advisory

Detection of ETW Disabling via Registry Modification

Attackers may disable Event Tracing for Windows (ETW) by modifying specific registry keys to evade detection and hinder security monitoring, potentially leading to further system compromise.

Attackers may attempt to disable Event Tracing for Windows (ETW) to evade detection mechanisms and make it more difficult for security tools to monitor malicious activities. This is often achieved by modifying specific registry keys associated with .NET Framework ETW settings. By setting the ETWEnabled value to 0x00000000, adversaries can effectively turn off ETW, allowing them to execute payloads with minimal alerting. This technique is often observed in ransomware and other advanced attacks where stealth and persistence are crucial for success. This activity is significant because disabling ETW impairs defenses and potentially leads to further compromise of the system.

Attack Chain

  1. Initial access is achieved through various means such as phishing, exploitation of vulnerabilities, or compromised credentials.
  2. The attacker gains administrative privileges on the targeted system.
  3. The attacker uses a command-line interface (e.g., cmd.exe, powershell.exe) or a scripting language to interact with the Windows Registry.
  4. The attacker modifies the registry key HKLM\SOFTWARE\Microsoft\.NETFramework\ETWEnabled (or a similar key) setting its value to 0x00000000.
  5. This modification disables ETW, preventing the system from logging certain events and activities.
  6. The attacker executes malicious code or payloads without being easily detected.
  7. The attacker moves laterally within the network, compromising additional systems.
  8. The final objective is achieved, such as data exfiltration, ransomware deployment, or system disruption.

Impact

Successful disabling of ETW allows attackers to operate with a significantly reduced risk of detection. This can lead to prolonged periods of undetected malicious activity, resulting in significant data breaches, financial losses, and reputational damage. Ransomware actors, in particular, benefit from this technique as it allows them to encrypt systems without triggering security alerts, maximizing their chances of a successful extortion attempt.

Recommendation

  • Enable Sysmon Event ID 13 to monitor registry modifications and detect changes to the *\\SOFTWARE\\Microsoft\\.NETFramework\\ETWEnabled registry path (data_source).
  • Deploy the Sigma rule “Detect ETW Disabling Through Registry Modification” to your SIEM to identify potential ETW disabling attempts (rules).
  • Investigate any alerts generated by the Sigma rule, focusing on processes modifying the specified registry keys (rules).
  • Implement strict access control policies to limit who can modify registry settings (description).

Detection coverage 2

Detect ETW Disabling Through Registry Modification

high

Detects modifications to the registry that disable the Event Tracing for Windows (ETW) feature by monitoring changes to the registry path '*\SOFTWARE\Microsoft\.NETFramework\ETWEnabled' with a value set to '0x00000000'.

sigma tactics: defense_evasion sources: registry_set, windows

Detect ETW Disabling Through Registry - Alternate Key

high

Detects modifications to the registry that disable the Event Tracing for Windows (ETW) feature by monitoring changes to the registry path '*\SOFTWARE\Microsoft\.NETFramework\ETW\ETWEnabled' with a value set to '0x00000000'.

sigma tactics: defense_evasion sources: registry_set, windows

Detection queries are kept inside the platform. Get full rules →