Skip to content

Commit abfbe7a

Browse files
committed
Update windows_event_logging_service_has_shutdown.yml
1 parent 1dfb259 commit abfbe7a

File tree

1 file changed

+5
-15
lines changed

1 file changed

+5
-15
lines changed

detections/endpoint/windows_event_logging_service_has_shutdown.yml

Lines changed: 5 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,23 +4,13 @@ version: 1
44
date: '2025-01-28'
55
author: Mauricio Velazco, Splunk
66
status: production
7-
type: Anomaly
8-
description: The following analytic detects the shutdown of the Windows Event Log
9-
service using Windows Event ID 1100. This event is logged every time the service
10-
stops, including during normal system shutdowns. Monitoring this activity is crucial
11-
as it can indicate attempts to cover tracks or disable logging. If confirmed malicious,
12-
an attacker could hide their activities, making it difficult to trace their actions
13-
and investigate further incidents. Analysts should verify if the shutdown was planned
14-
and review other alerts and data sources for additional suspicious behavior.
7+
type: Hunting
8+
description: The following analytic detects the shutdown of the Windows Event Log service by leveraging Windows Event ID 1100. This event is logged every time the service stops, including during normal system shutdowns. Monitoring this activity is crucial as it can indicate attempts to cover tracks or disable logging. If confirmed malicious, an attacker could hide their activities, making it difficult to trace their actions and investigate further incidents. Analysts should verify if the shutdown was planned and review other alerts and data sources for additional suspicious behavior.
159
data_source:
1610
- Windows Event Log Security 1100
17-
search: (`wineventlog_security` EventCode=1100) | stats count min(_time) as firstTime
18-
max(_time) as lastTime by dest name EventCode | `security_content_ctime(firstTime)`
19-
| `security_content_ctime(lastTime)`| `suspicious_event_log_service_behavior_filter`
20-
how_to_implement: To successfully implement this search, you need to be ingesting
21-
Windows event logs from your hosts. In addition, the Splunk Windows TA is needed.
22-
known_false_positives: It is possible the Event Logging service gets shut down due
23-
to system errors or legitimately administration tasks. Investigate the cause of this issue and apply additional filters as needed.
11+
search: (`wineventlog_security` EventCode=1100) | stats count min(_time) as firstTime max(_time) as lastTime by dest name EventCode | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`| `suspicious_event_log_service_behavior_filter`
12+
how_to_implement: To successfully implement this search, you need to be ingesting Windows event logs from your hosts. In addition, the Splunk Windows TA is needed.
13+
known_false_positives: It is possible the Event Logging service gets shut down due to system errors or legitimate administration tasks. Investigate the cause of this issue and apply additional filters as needed.
2414
references:
2515
- https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-1100
2616
- https://www.ired.team/offensive-security/defense-evasion/disabling-windows-event-logs-by-suspending-eventlog-service-threads

0 commit comments

Comments
 (0)