Skip to content

feat: Security Event Logging Disabled Via MiniNt Registry Key#5257

Merged
phantinuss merged 11 commits intoSigmaHQ:masterfrom
swachchhanda000:disable_event_logging
Oct 1, 2025
Merged

feat: Security Event Logging Disabled Via MiniNt Registry Key#5257
phantinuss merged 11 commits intoSigmaHQ:masterfrom
swachchhanda000:disable_event_logging

Conversation

@swachchhanda000
Copy link
Collaborator

@swachchhanda000 swachchhanda000 commented Apr 9, 2025

Summary of the Pull Request

Security Event Logging Disabled Via MiniNt Registry Key

Changelog

new: Security Event Logging Disabled Via MiniNt Registry Key - Process
new: Security Event Logging Disabled Via MiniNt Registry Key - Registry Set

Example Log Event

Screenshot 2025-04-09 at 3 30 13 PM

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Apr 9, 2025
@frack113
Copy link
Member

LGTM

phantinuss and others added 3 commits October 1, 2025 12:37
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
…_key.yml

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
@phantinuss phantinuss requested a review from Copilot October 1, 2025 11:52
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds security detection rules for identifying attempts to disable Windows Event Logging through the MiniNt registry key. The rules target a defense evasion technique where adversaries add the MiniNt registry key to stop the Windows Event Log service from writing events after a system reboot.

  • Creates two new detection rules for the MiniNt registry key manipulation
  • Updates an existing registry event rule with additional references and improved MITRE ATT&CK technique mapping
  • Implements detection across process creation and registry modification event sources

Reviewed Changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 2 comments.

File Description
registry_set_create_minint_key.yml New rule detecting registry modifications adding the MiniNt key
registry_event_disable_security_events_logging_adding_reg_key_minint.yml Updated existing rule with additional reference and corrected MITRE technique ID
proc_creation_win_event_logging_disable_via_key_minint.yml New rule detecting process execution attempts to create the MiniNt registry key

Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.

phantinuss and others added 2 commits October 1, 2025 13:54
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
@phantinuss phantinuss merged commit cda3c76 into SigmaHQ:master Oct 1, 2025
12 checks passed
@phantinuss phantinuss added this to the Sigma-August-Release milestone Oct 1, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Rules Windows Pull request add/update windows related rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants