ETW Logging/Processing Option Disabled On IIS Server
Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.
Sigma rule (View on GitHub)
1title: ETW Logging/Processing Option Disabled On IIS Server
2id: a5b40a90-baf5-4bf7-a6f7-373494881d22
3status: experimental
4description: Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.
5references:
6 - https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis
7 - https://www.microsoft.com/en-us/security/blog/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/
8 - https://learn.microsoft.com/en-us/iis/configuration/system.applicationhost/sites/sitedefaults/logfile/
9author: frack113, Nasreddine Bencherchali
10date: 2024-10-06
11tags:
12 - attack.defense-evasion
13 - attack.persistence
14 - attack.t1562.002
15 - attack.t1505.004
16logsource:
17 product: windows
18 service: iis-configuration
19detection:
20 selection:
21 EventID: 29
22 Configuration|endswith: '@logTargetW3C'
23 OldValue|contains: 'ETW'
24 filter_main_etw_added:
25 NewValue|contains: 'ETW'
26 condition: selection and not 1 of filter_main_*
27falsepositives:
28 - Legitimate administrator activity
29level: medium
References
Related rules
- HTTP Logging Disabled On IIS Server
- New Module Module Added To IIS Server
- Previously Installed IIS Module Was Removed
- Potential Suspicious Activity Using SeCEdit
- Kapeka Backdoor Configuration Persistence