Skip to content

Hide Navigation Hide TOC

Windows EventLog Autologger Session Registry Modification Via CommandLine (d7b81144-b866-48a4-9bcc-275dc69d870e)

Detects attempts to disable Windows EventLog autologger sessions via registry modification. The AutoLogger event tracing session records events that occur early in the operating system boot process. Applications and device drivers can use the AutoLogger session to capture traces before the user logs in. Adversaries may disable these sessions to evade detection and prevent security monitoring of early boot activities and system events.

Cluster A Galaxy A Cluster B Galaxy B Level
Disable or Modify Windows Event Log - T1685.001 (1411e6b8-80a6-4465-9909-54eaa9c67ce0) Attack Pattern Windows EventLog Autologger Session Registry Modification Via CommandLine (d7b81144-b866-48a4-9bcc-275dc69d870e) Sigma-Rules 1
Disable or Modify Tools - T1685 (bbde9781-60aa-4b8a-a911-895b0c1b3872) Attack Pattern Disable or Modify Windows Event Log - T1685.001 (1411e6b8-80a6-4465-9909-54eaa9c67ce0) Attack Pattern 2