Potential EventLog File Location Tampering

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects tampering with EventLog service "file" key. In order to change the default location of an Evtx file. This technique is used to tamper with log collection and alerting

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Registry value modified" AND ((OBJECTNAME contains "\SYSTEM\CurrentControlSet\Services\EventLog" OR (OBJECTNAME endswith "\SYSTEM\CurrentControlSet\Services\EventLog" AND isExist(OBJECTVALUENAME))) AND OBJECTNAME endswith "\File") AND INFORMATION notcontains "\System32\Winevt\Logs" select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES

Detection

Execution Mode

realtime

Log Sources

Windows

Author

D3F7A5105