Skip to content

Hide Navigation Hide TOC

Potential AutoLogger Sessions Tampering (f37b4bce-49d0-4087-9f5b-58bffda77316)

Detects tampering with autologger trace sessions which is a technique used by attackers to disable logging. The AutoLogger event tracing session records events up that occur early in the operating system boot process. Applications and device drivers can use the AutoLogger session to capture traces before the user logs in, and also used by security solutions as telemetry source. Adversaries may disable these sessions to evade detection and prevent security monitoring of early boot activities and system events.

Cluster A Galaxy A Cluster B Galaxy B Level
Disable or Modify Windows Event Log - T1685.001 (1411e6b8-80a6-4465-9909-54eaa9c67ce0) Attack Pattern Potential AutoLogger Sessions Tampering (f37b4bce-49d0-4087-9f5b-58bffda77316) Sigma-Rules 1
Disable or Modify Tools - T1685 (bbde9781-60aa-4b8a-a911-895b0c1b3872) Attack Pattern Disable or Modify Windows Event Log - T1685.001 (1411e6b8-80a6-4465-9909-54eaa9c67ce0) Attack Pattern 2