<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.t1685.001 on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.t1685.001/</link>
    <description>Recent content in attack.t1685.001 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.t1685.001/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Audit Policy Tampering Via Auditpol</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_auditpol_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_auditpol_susp_execution/</guid>
      <description>
        
          
            Threat actors can use auditpol binary to change audit policy configuration to impair detection capability.
This can be carried out by selectively disabling/removing certain audit policies as well as restoring a custom policy owned by the threat actor.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Audit Policy Tampering Via NT Resource Kit Auditpol</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_auditpol_nt_resource_kit_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_auditpol_nt_resource_kit_usage/</guid>
      <description>
        
          
            Threat actors can use an older version of the auditpol binary available inside the NT resource kit to change audit policy configuration to impair detection capability.
This can be carried out by selectively disabling/removing certain audit policies as well as restoring a custom policy owned by the threat actor.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Change Winevt Channel Access Permission Via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_change_winevt_channelaccess/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_change_winevt_channelaccess/</guid>
      <description>
        
          
            Detects tampering with the &#34;ChannelAccess&#34; registry key in order to change access to Windows event channel.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Security Events Logging Adding Reg Key MiniNt</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_disable_security_events_logging_adding_reg_key_minint/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_disable_security_events_logging_adding_reg_key_minint/</guid>
      <description>
        
          
            Detects the addition of a key &#39;MiniNt&#39; to the registry. Upon a reboot, Windows Event Log service will stop writing events.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows Event Logging Via Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_winevt_logging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_winevt_logging/</guid>
      <description>
        
          
            Detects tampering with the &#34;Enabled&#34; registry key in order to disable Windows logging of a Windows event channel
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Windows IIS HTTP Logging</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iis_appcmd_http_logging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iis_appcmd_http_logging/</guid>
      <description>
        
          
            Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union)
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Logging/Processing Option Disabled On IIS Server</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_logging_etw_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_logging_etw_disabled/</guid>
      <description>
        
          
            Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.
          
          
        
      </description>
    </item>
    
    <item>
      <title>EVTX Created In Uncommon Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_create_evtx_non_common_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_create_evtx_non_common_locations/</guid>
      <description>
        
          
            Detects the creation of new files with the &#34;.evtx&#34; extension in non-common or non-standard location.
This could indicate tampering with default EVTX locations in order to evade security controls or simply exfiltration of event log to search for sensitive information within.
Note that backup software and legitimate administrator might perform similar actions during troubleshooting.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Filter Driver Unloaded Via Fltmc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver/</guid>
      <description>
        
          
            Detect filter driver unloading activity via fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Forest Blizzard APT - File Creation Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_activity/</guid>
      <description>
        
          
            Detects the creation of specific files inside of ProgramData directory.
These files were seen being created by Forest Blizzard as described by MSFT.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Forest Blizzard APT - JavaScript Constrained File Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_constrained_js/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_constrained_js/</guid>
      <description>
        
          
            Detects the creation of JavaScript files inside of the DriverStore directory.
Forest Blizzard used this to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SharpEvtMute DLL Load</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_hktl_sharpevtmute/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_hktl_sharpevtmute/</guid>
      <description>
        
          
            Detects the load of EvtMuteHook.dll, a key component of SharpEvtHook, a tool that tampers with the Windows event logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SharpEvtMute Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharpevtmute/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharpevtmute/</guid>
      <description>
        
          
            Detects the use of SharpEvtHook, a tool that tampers with the Windows event logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SysmonEnte Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_sysmonente/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_sysmonente/</guid>
      <description>
        
          
            Detects the use of SysmonEnte, a tool to attack the integrity of Sysmon
          
          
        
      </description>
    </item>
    
    <item>
      <title>HTTP Logging Disabled On IIS Server</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_logging_http_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_logging_http_disabled/</guid>
      <description>
        
          
            Detects changes to of the IIS server configuration in order to disable HTTP logging for successful requests.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Important Windows Event Auditing Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_disable_event_auditing_critical/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_disable_event_auditing_critical/</guid>
      <description>
        
          
            Detects scenarios where system auditing for important events such as &#34;Process Creation&#34; or &#34;Logon&#34; events is disabled.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Module Module Added To IIS Server</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_module_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_module_added/</guid>
      <description>
        
          
            Detects the addition of a new module to an IIS server.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AutoLogger Sessions Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_autologger_sessions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_autologger_sessions/</guid>
      <description>
        
          
            Detects tampering with autologger trace sessions which is a technique used by attackers to disable logging.
The AutoLogger event tracing session records events up that occur early in the operating system boot process.
Applications and device drivers can use the AutoLogger session to capture traces before the user logs in, and also used by security solutions as telemetry source.
Adversaries may disable these sessions to evade detection and prevent security monitoring of early boot activities and system events.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential EventLog File Location Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_evtx_file_key_tamper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_evtx_file_key_tamper/</guid>
      <description>
        
          
            Detects tampering with EventLog service &#34;file&#34; key. In order to change the default location of an Evtx file. This technique is used to tamper with log collection and alerting
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Activity Using SeCEdit</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/</guid>
      <description>
        
          
            Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Previously Installed IIS Module Was Removed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_module_removed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/iis-configuration/win_iis_module_removed/</guid>
      <description>
        
          
            Detects the removal of a previously installed IIS module.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Security Event Logging Disabled via MiniNt Registry Key - Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_event_logging_disable_via_key_minint/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_event_logging_disable_via_key_minint/</guid>
      <description>
        
          
            Detects attempts to disable security event logging by adding the `MiniNt` registry key.
This key is used to disable the Windows Event Log service, which collects and stores event logs from the operating system and applications.
Adversaries may want to disable this service to prevent logging of security events that could be used to detect their activities.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Security Event Logging Disabled via MiniNt Registry Key - Registry Set</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_create_minint_key/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_create_minint_key/</guid>
      <description>
        
          
            Detects the addition of the &#39;MiniNt&#39; key to the registry. Upon a reboot, Windows Event Log service will stop writing events.
Windows Event Log is a service that collects and stores event logs from the operating system and applications. It is an important component of Windows security and auditing.
Adversary may want to disable this service to disable logging of security events which could be used to detect their activities.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Eventlog Clearing or Configuration Change Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_eventlog_clear/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_eventlog_clear/</guid>
      <description>
        
          
            Detects the clearing or configuration tampering of EventLog using utilities such as &#34;wevtutil&#34;, &#34;powershell&#34; and &#34;wmic&#34;.
This technique were seen used by threat actors and ransomware strains in order to evade defenses.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Svchost Process Access</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_svchost_susp_access_request/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_svchost_susp_access_request/</guid>
      <description>
        
          
            Detects suspicious access to the &#34;svchost&#34; process such as that used by Invoke-Phantom to kill the thread of the Windows event logging service.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Driver Unloaded Via Fltmc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver_sysmon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver_sysmon/</guid>
      <description>
        
          
            Detects possible Sysmon filter driver unloaded via fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Event Auditing Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_disable_event_auditing/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_disable_event_auditing/</guid>
      <description>
        
          
            Detects scenarios where system auditing (i.e.: Windows event log auditing) is disabled.
This may be used in a scenario where an entity would want to bypass local logging to evade detection when Windows event logging is enabled and reviewed.
Also, it is recommended to turn off &#34;Local Group Policy Object Processing&#34; via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as &#34;gpedit.msc&#34;.
Please note, that disabling &#34;Local Group Policy Object Processing&#34; may cause an issue in scenarios of one off specific GPO modifications - however, it is recommended to perform these modifications in Active Directory anyways.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows EventLog Autologger Session Registry Modification Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_autologger_session_registry_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_autologger_session_registry_modification/</guid>
      <description>
        
          
            Detects attempts to disable Windows EventLog autologger sessions via registry modification.
The AutoLogger event tracing session records events that occur early in the operating system boot process.
Applications and device drivers can use the AutoLogger session to capture traces before the user logs in.
Adversaries may disable these sessions to evade detection and prevent security monitoring of early boot activities and system events.

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
