HackTool - SysmonEnte Execution
Detects the use of SysmonEnte, a tool to attack the integrity of Sysmon
Sigma rule (View on GitHub)
1title: HackTool - SysmonEnte Execution
2id: d29ada0f-af45-4f27-8f32-f7b77c3dbc4e
3status: test
4description: Detects the use of SysmonEnte, a tool to attack the integrity of Sysmon
5references:
6 - https://codewhitesec.blogspot.com/2022/09/attacks-on-sysmon-revisited-sysmonente.html
7 - https://github.com/codewhitesec/SysmonEnte/
8 - https://github.com/codewhitesec/SysmonEnte/blob/main/screens/1.png
9author: Florian Roth (Nextron Systems)
10date: 2022-09-07
11modified: 2023-11-28
12tags:
13 - attack.defense-evasion
14 - attack.t1562.002
15logsource:
16 category: process_access
17 product: windows
18detection:
19 selection_sysmon:
20 TargetImage|contains:
21 - ':\Windows\Sysmon.exe'
22 - ':\Windows\Sysmon64.exe'
23 GrantedAccess: '0x1400'
24 selection_calltrace:
25 CallTrace: 'Ente'
26 filter_main_generic:
27 SourceImage|contains:
28 - ':\Program Files (x86)\'
29 - ':\Program Files\'
30 - ':\Windows\System32\'
31 - ':\Windows\SysWOW64\'
32 filter_main_msdefender:
33 SourceImage|contains: ':\ProgramData\Microsoft\Windows Defender\Platform\'
34 SourceImage|endswith: '\MsMpEng.exe'
35 condition: ( selection_sysmon and not 1 of filter_main_* ) or selection_calltrace
36falsepositives:
37 - Unknown
38level: high
References
Related rules
- Audit Policy Tampering Via Auditpol
- Audit Policy Tampering Via NT Resource Kit Auditpol
- Change Winevt Channel Access Permission Via Registry
- Disable Windows Event Logging Via Registry
- Disable Windows IIS HTTP Logging