Skip to content
Threat Feed
high advisory

ETW Registry Disabled via Registry Modification

Attackers may disable Event Tracing for Windows (ETW) for the .NET Framework by modifying the ETWEnabled registry value, allowing them to evade endpoint detection and response (EDR) tools and hide malicious activity.

The detection identifies registry modifications that disable Event Tracing for Windows (ETW) for the .NET Framework. By modifying the ETWEnabled registry value under the .NETFramework path, attackers can disable ETW, a crucial logging mechanism. This allows them to evade Endpoint Detection and Response (EDR) tools and hide their execution from audit logs. Disabling ETW can allow attackers to operate undetected, potentially leading to further compromise and persistent access within the environment. This technique is a form of defense evasion and can be used in conjunction with other malicious activities to maintain a stealthy presence on the system. The referenced Splunk detection etw_registry_disabled.yml version 17 provides the basis for identifying this behavior.

Attack Chain

  1. Initial Access: An attacker gains initial access to the system, possibly through phishing, exploitation of a vulnerability, or compromised credentials.
  2. Privilege Escalation (If Needed): The attacker escalates privileges to gain the necessary permissions to modify registry keys, if they do not already have them.
  3. Identify ETW Configuration: The attacker identifies the specific registry path for ETW configuration related to the .NET Framework: HKLM\SOFTWARE\Microsoft\.NETFramework.
  4. Modify Registry Value: The attacker modifies the ETWEnabled registry value under the identified path to 0x00000000, effectively disabling ETW. This may involve using tools like reg.exe or PowerShell to modify the registry.
  5. Execute Malicious Actions: With ETW disabled, the attacker executes malicious actions, such as deploying malware, performing lateral movement, or exfiltrating data. These actions are less likely to be logged or detected by security tools due to the disabled ETW.
  6. Maintain Persistence: The attacker establishes persistence mechanisms to maintain access to the system, ensuring that their access is not disrupted by system restarts or other events.
  7. Lateral Movement: The attacker uses the compromised system as a pivot point to move laterally to other systems within the network, potentially compromising additional resources.
  8. Data Exfiltration/Impact: The attacker exfiltrates sensitive data from the compromised systems or performs other destructive actions, such as deploying ransomware.

Impact

Disabling ETW can significantly hinder the ability of security teams to detect and respond to malicious activity. If successful, attackers can operate undetected within the environment, potentially leading to data breaches, financial losses, and reputational damage. Successful exploitation could lead to widespread data exfiltration, system compromise, and deployment of ransomware, impacting all affected systems and potentially leading to significant business disruption. The CISA AA23-347A analytic story highlights the potential for data destruction and wiper malware.

Recommendation

  • Enable Sysmon Event ID 13 to monitor registry modifications, especially those targeting ETW-related registry keys.
  • Deploy the Sigma rule Detect ETW Registry Disabled to your SIEM and tune for your environment to detect potential ETW disabling attempts.
  • Investigate any alerts generated by the Detect ETW Registry Disabled rule to determine the legitimacy of the registry modifications.
  • Review and harden registry permissions to restrict unauthorized modifications, particularly to sensitive registry keys like those related to ETW configuration, to prevent unauthorized ETW disabling.
  • Ensure that the official Sysmon TA is at least version 2.0, as mentioned in the “How to Implement” section, to ensure proper log ingestion and parsing.

Detection coverage 2

Detect ETW Registry Disabled

high

Detects registry modifications that disable ETW for the .NET Framework.

sigma tactics: defense_evasion techniques: T1127 sources: registry_set, windows

Detect Process Modifying ETW Registry

medium

Detects processes modifying ETW related registry keys.

sigma tactics: defense_evasion techniques: T1127 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →