Windows Base ETW Model #
This model is designed to follow ETW event sources.
ETW events are provided by various ETW Providers in the Windows Kernel. These events can provide security critical information which can be detected using Sigma Rules.
This is a real time monitoring profile which allows live monitoring of Windows systems using Sigma rules.
Log Sources #
Following is a list of recognized log sources.
Log Source | Desc |
---|---|
etw/windows/kernel | Events from the `NT Kernel Logger` provider |
etw/windows/file | Log source based on the `Microsoft-Windows-Kernel-File` provider. |
etw/windows/registry | Log source based on the `Microsoft-Windows-Kernel-Registry` provider. |
etw/windows/process | Log source based on the `Microsoft-Windows-Kernel-Registry` provider |
etw/windows/sysmon | Log source to read Sysmon events via ETW |
etw/windows/etw | Log source to monitor ETW system states |
etw/windows/wmi | Log source to monitor WMI activity |
etw/windows/dns | Log source to monitor DNS Lookups |
Field Mappings #
The following field mappings can be used to access fields within the
event. Note that it is also possible to access the fields directly
(e.g. EventData.AccessMask
)
Name | Mapping |
---|---|
Channel | x=>x.System.Channel |
CommandLine | x=>x.EventData.ProcInfo.CommandLine |
Computer | x=>x.System.Computer |
EventType | x=>x.System.EventType |
FileName | x=>x.EventData.FileName || x.EventData.OpenPath |
KeyName | x=>x.EventData.KeyName |
Offset | x=>int(int=x.EventData.Offset) |
ProcessExe | x=>x.EventData.ProcInfo.Exe |
ProcessName | x=>x.EventData.ProcInfo.Name |
RegistryPath | x=>x.EventData.RegistryPath |
Username | x=>x.EventData.ProcInfo.Username |
etw/windows/kernel
#
Events from the NT Kernel Logger
provider
The NT Kernel Logger
ETW source is a special purpose ETW
provider that reports details about network/registry and file.
This provider enriches events with process information from the process tracker.
This provider is special: Enabling this provider implicitly
triggers many other ETW providers such as File, Process,
Registry and Network monitoring. Velociraptor’s ETW subsystem
recognizes the Kernel Logger
provider automatically and
performs additional processing:
Resolves full files paths from kernel space (uses device notation) to regular filesystem paths (e.g.
C:\Windows
).Collects rundown events to determine the initial system state. This allows Velociraptor to resolve file and registry paths from events that refer to kernel object addresses.
For these reasons it is preferable to use this provider over
the Microsoft-Windows-Kernel-File
or
Microsoft-Windows-Kernel-Registry
providers.
VQL Query #
SELECT * FROM delay(
query={
SELECT timestamp(epoch=now()) AS Timestamp,
System + dict(Channel="NT-Kernel-Logger",
Computer=Hostname,
EventType=System.KernelEventType,
EventID=dict(Value=System.ID)) AS System,
System.KernelEventType AS EventType,
EventData + dict(
ProcInfo=GetProcInfo(PID=System.ProcessID)
) AS EventData
FROM watch_etw(guid='{9E814AAD-3204-11D2-9A82-006008A86939}',
capture_state=TRUE,
level=5,
description="NT-Kernel-Logger",
kernel_tracer_type=["registry", "process", "network", "driver", "file"])
WHERE EventType
}, delay=1)
Sample Events #
WriteFile #
{"Timestamp":"2025-01-30T14:13:08Z","EventType":"WriteFile","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"WriteFile","EventID":{"Value":0}},"EventData":{"Offset":"450608","IrpPtr":"0xFFFF8203632DFB48","FileObject":"0xFFFF82036AFDE270","FileKey":"0xFFFFB189591D4700","TTID":"11240", "IoSize":"318","IoFlags":"395776","FileName":"C:\\datastore\\clients\\C.34365d02e4e1aa77\\monitoring_logs\\Windows.ETW.KernelFile\\2025-01-30.json","ProcInfo":{"Name":"velociraptor.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\velociraptor.exe","CommandLine":"c:\\velociraptor.exe gui --datastore c:\\datastore\\ --nobrowser --debug -v"}}}
ReadFile #
{"Timestamp":"2025-01-30T14:13:08Z","EventType":"ReadFile","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"ReadFile","EventID":{"Value":0}},"EventData":{"Offset":"0","IrpPtr":"0xFFFF82036378AB48","FileObject":"0xFFFF82036AFDE270","FileKey":"0xFFFFB189591D4700","TTID":"11240","IoSize":"2","IoFlags":"0","FileName":"C:\\datastore\\clients\\C.34365d02e4e1aa77\\monitoring_logs\\Windows.ETW.KernelFile\\2025-01-30.json","ProcInfo":{"Name":"velociraptor.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\velociraptor.exe","CommandLine":"c:\\velociraptor.exe gui --datastore c:\\datastore\\ --nobrowser --debug -v"}}}
CloseFile #
{"Timestamp":"2025-01-30T14:13:08Z","EventType":"CloseFile","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"CloseFile","EventID":{"Value":0}},"EventData":{"IrpPtr":"0xFFFF82036378AB48","FileObject":"0xFFFF82035B7263B0","FileKey":"0xFFFFB189591D4700","TTID":"11240","FileName":"C:\\datastore\\clients\\C.34365d02e4e1aa77\\monitoring_logs\\Windows.ETW.KernelFile\\2025-01-30.json","ProcInfo":{"Name":"velociraptor.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\velociraptor.exe","CommandLine":"c:\\velociraptor.exe gui --datastore c:\\datastore\\ --nobrowser --debug -v"}}}
ReleaseFile #
{"Timestamp":"2025-01-30T14:06:21Z","EventType":"ReleaseFile","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"ReleaseFile","EventID":{"Value":0}},"EventData":{"IrpPtr":"0xFFFF8203597030F8","FileObject":"0xFFFF820378327250","FileKey":"0xFFFFB1893BC871B0","TTID":"4928","FileName":"C:\\datastore\\1\\VelociraptorClient_info.log.202501270000","ProcInfo":{"Name":"velociraptor.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\velociraptor.exe","CommandLine":"c:\\velociraptor.exe gui --datastore c:\\datastore\\ --nobrowser --debug -v"}}}
CreateFile #
{ "Timestamp": "2025-02-10T14:53:28Z", "EventType": "CreateFile", "System": { "Channel": "NT-Kernel-Logger", "Computer": "Hostname", "EventType": "CreateFile", "EventID": { "Value": 0 } }, "EventData": { "IrpPtr": "0xFFFFBB0CCAF9D0F8", "FileObject": "0xFFFFBB0CCED8D220", "TTID": "6772", "CreateOptions": "21119008", "FileAttributes": "0", "ShareAccess": "7", "OpenPath": "C:\\Windows\\System32\\psapi.dll", "ProcInfo": { "Pid": 3896, "Ppid": 1160, "Name": "MsMpEng.exe", "Threads": 86, "Username": "NT AUTHORITY\\SYSTEM", "OwnerSid": "S-1-5-18", "CommandLine": "\"C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.24090.11-0\\MsMpEng.exe\"", "Exe": "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.24090.11-0\\MsMpEng.exe", "TokenIsElevated": true, "CreateTime": "2025-02-09T12:57:23.9023563Z", "User": 343.9949132, "System": 2.9596658, "IoCounters": { "ReadOperationCount": 267063, "WriteOperationCount": 78945, "OtherOperationCount": 3306593, "ReadTransferCount": 7729991705, "WriteTransferCount": 793027416, "OtherTransferCount": 843561371 }, "Memory": { "PageFaultCount": 108663785, "PeakWorkingSetSize": 998694912, "WorkingSetSize": 209084416, "QuotaPeakPagedPoolUsage": 1543600, "QuotaPagedPoolUsage": 698424, "QuotaPeakNonPagedPoolUsage": 535768, "QuotaNonPagedPoolUsage": 254496, "PagefileUsage": 331485184, "PeakPagefileUsage": 1064894464 }, "PebBaseAddress": 513193275392, "IsWow64": false } } }
RegQueryValue #
{"Timestamp":"2025-01-30T14:06:21Z","EventType":"RegQueryValue","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"RegQueryValue","EventID":{"Value":0}},"EventData":{"InitialTime":"4597740950432","Status":"0","Index":"1","KeyHandle":"0xFFFFB189314B9200","KeyName":"StandardName","RegistryPath":"\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Control\\TimeZoneInformation\\StandardName","ProcInfo":{"Name":"velociraptor.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\velociraptor.exe","CommandLine":"c:\\velociraptor.exe gui --datastore c:\\datastore\\ --nobrowser --debug -v"}}}
RegOpenKey #
{"Timestamp":"2025-01-30T14:06:28Z","EventType":"RegOpenKey","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"RegOpenKey","EventID":{"Value":0}},"EventData":{"InitialTime":"4597800728147","Status":"0","Index":"0","KeyHandle":"0xFFFFB1892A2E3050","KeyName":"SOFTWARE\\Microsoft\\Ole\\Extensions","RegistryPath":"\\REGISTRY\\MACHINE\\SOFTWARE\\Microsoft\\Ole\\Extensions","ProcInfo":{"Name":"chrome.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe","CommandLine":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" "}}}
RegCloseKey #
{"Timestamp":"2025-01-30T14:06:28Z","EventType":"RegCloseKey","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"RegCloseKey","EventID":{"Value":0}},"EventData":{"InitialTime":"4597800729177","Status":"0","Index":"0","KeyHandle":"0xFFFFB18933C408B0","KeyName":"","RegistryPath":"\\REGISTRY\\MACHINE\\SOFTWARE\\Microsoft\\Ole\\Extensions","ProcInfo":{"Name":"chrome.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe","CommandLine":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" "}}}
RegCreateKey #
{"Timestamp":"2025-01-30T14:06:36Z","EventType":"RegCreateKey","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"RegCreateKey","EventID":{"Value":0}},"EventData":{"InitialTime":"4597827001762","Status":"0","Index":"0","KeyHandle":"0xFFFFB189314C06D0","KeyName":"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections","RegistryPath":"\\REGISTRY\\USER\\S-1-5-21-241402409-3571345782-2557608070-500\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections","ProcInfo":{"Name":"chrome.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe","CommandLine":"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" "}}}
SendTCPv4 #
{"Timestamp":"2025-01-30T14:06:22Z","EventType":"SendTCPv4","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"SendTCPv4","EventID":{"Value":0}},"EventData":{"PID":"1596","size":"1652","daddr":"192.168.1.5","saddr":"192.168.1.237","dport":"37890","sport":"3389","startime":"45977585","endtime":"45977585","seqnum":"0","connid":null,"ProcInfo":null}}
RecvTCPv4 #
{"Timestamp":"2025-01-30T14:06:22Z","EventType":"RecvTCPv4","System":{"Channel":"NT Kernel Logger","Computer":"WIN-SJE0CKQO83P","EventType":"RecvTCPv4","EventID":{"Value":0}},"EventData":{"PID":"1596","size":"74","daddr":"192.168.1.5","saddr":"192.168.1.237","dport":"37890","sport":"3389","seqnum":"0","connid":null,"ProcInfo":null}}
CreateProcess #
{ "Timestamp": "2025-01-30T13:59:46Z", "EventType": "CreateProcess", "System": { "Channel": "NT Kernel Logger", "Computer": "WIN-SJE0CKQO83P", "EventType": "CreateProcess", "EventID": { "Value": 0 } }, "EventData": { "UniqueProcessKey": "0xFFFF82035F210380", "ProcessId": "0x1C5C", "ParentId": "0x524", "SessionId": "0", "ExitStatus": "259", "DirectoryTableBase": "0x1050BD000", "Flags": "0", "UserSID": "\\\\NT AUTHORITY\\SYSTEM", "ImageFileName": "WmiPrvSE.exe", "CommandLine": "C:\\Windows\\system32\\wbem\\wmiprvse.exe -Embedding", "PackageFullName": "", "ApplicationId": "", "ProcInfo": { "Pid": 1316, "Ppid": 1172, "Name": "svchost.exe", "Threads": 14, "Username": "NT AUTHORITY\\SYSTEM", "OwnerSid": "S-1-5-18", "CommandLine": "C:\\Windows\\system32\\svchost.exe -k DcomLaunch -p", "Exe": "C:\\Windows\\System32\\svchost.exe", "TokenIsElevated": true, "CreateTime": "2025-01-03T15:14:38.8669202Z", "User": 5.859375, "System": 14.65625, "IoCounters": { "ReadOperationCount": 12, "WriteOperationCount": 0, "OtherOperationCount": 161602, "ReadTransferCount": 49152, "WriteTransferCount": 0, "OtherTransferCount": 4860956 }, "Memory": { "PageFaultCount": 72766, "PeakWorkingSetSize": 27328512, "WorkingSetSize": 25452544, "QuotaPeakPagedPoolUsage": 743528, "QuotaPagedPoolUsage": 743288, "QuotaPeakNonPagedPoolUsage": 37128, "QuotaNonPagedPoolUsage": 21304, "PagefileUsage": 8261632, "PeakPagefileUsage": 8978432 }, "PebBaseAddress": 93408378880, "IsWow64": false } } }
Sample use in a sigma rule: #
logsource:
category: etw
product: windows
service: kernel
etw/windows/file
#
Log source based on the Microsoft-Windows-Kernel-File
provider.
See etw/windows/kernel
for a better ETW provider.
VQL Query #
SELECT timestamp(epoch=now()) AS Timestamp,
System + dict(Channel="Microsoft-Windows-Kernel-File",
Computer=Hostname,
EventType=get(item=WindowsKernelFile_EIDLookup,
field=str(str=System.ID)),
EventID=dict(Value=System.ID)) AS System,
EventData + dict(
ProcInfo=GetProcInfo(PID=System.ProcessID)
) AS EventData
FROM delay(query={
SELECT * FROM watch_etw(
guid='{edd08927-9cc4-4e65-b970-c2560fb5c289}',
description="Microsoft-Windows-Kernel-File",
any=WindowsKernelFile_Keyword)
}, delay=1)
Sample Events #
FileOpen Event #
{"Timestamp":"2025-01-30T07:33:12Z","System":{"Channel":"Microsoft-Windows-Kernel-File","Computer":"WIN-SJE0CKQO83P","EventType":"FileOpen","EventID":{"Value":12}},"EventData":{"Irp":"0xFFFF8203746EAB08","FileObject":"0xFFFF8203783249B0","IssuingThreadId":"8924","CreateOptions":"0x1200000","CreateAttributes":"0x0","ShareAccess":"0x7","FileName":"\\Device\\HarddiskVolume3\\datastore\\1\\VelociraptorClient_info.log.202501270000","ProcInfo":{"Name":"velociraptor.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\velociraptor.exe","CommandLine":"c:\\velociraptor.exe gui --datastore c:\\datastore\\ --nobrowser --debug -v"}}}
CreateNewFile Event #
{"Timestamp":"2025-01-30T07:33:07Z","System":{"Channel":"Microsoft-Windows-Kernel-File","Computer":"WIN-SJE0CKQO83P","EventType":"CreateNewFile","EventID":{"Value":30}},"EventData":{"Irp":"0xFFFF82035D7F9C88","FileObject":"0xFFFF82035D145A80","IssuingThreadId":"8096","CreateOptions":"0x5000060","CreateAttributes":"0x80","ShareAccess":"0x3","FileName":"\\Device\\HarddiskVolume3\\datastore\\hunts\\H.CUDEISQSB5K60\\notebook\\N.H.CUDEISQSB5K60\\NC.CUDIKP2J653IQ-CUDIMC0CRIMHS.json.db","ProcInfo":{"Name":"velociraptor.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\velociraptor.exe","CommandLine":"c:\\velociraptor.exe gui --datastore c:\\datastore\\ --nobrowser --debug -v"}}}
NameCreate Event #
{"Timestamp":"2025-01-30T07:33:07Z","System":{"Channel":"Microsoft-Windows-Kernel-File","Computer":"WIN-SJE0CKQO83P","EventType":"NameCreate","EventID":{"Value":10}},"EventData":{"FileKey":"0xFFFFB18937D871B0","FileName":"\\Device\\HarddiskVolume3\\datastore\\hunts\\H.CUDEISQSB5K60\\notebook\\N.H.CUDEISQSB5K60\\NC.CUDIKP2J653IQ-CUDIMC0CRIMHS.json.db","ProcInfo":{"Name":"velociraptor.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\velociraptor.exe","CommandLine":"c:\\velociraptor.exe gui --datastore c:\\datastore\\ --nobrowser --debug -v"}}}
Sample use in a sigma rule: #
logsource:
category: etw
product: windows
service: file
etw/windows/registry
#
Log source based on the Microsoft-Windows-Kernel-Registry
provider.
See etw/windows/kernel
for a better ETW provider.
VQL Query #
SELECT timestamp(epoch=now()) AS Timestamp,
System + dict(Channel="Microsoft-Windows-Kernel-Registry",
Computer=Hostname,
EventType=get(item=WindowsKernelRegistry_EIDLookup,
field=str(str=System.ID)),
EventID=dict(Value=System.ID)) AS System,
EventData + dict(
ProcInfo=GetProcInfo(PID=System.ProcessID)
) AS EventData
FROM delay(query={
SELECT * FROM watch_etw(
guid='{70eb4f03-c1de-4f73-a051-33d13d5413bd}',
capture_state=TRUE,
description="Microsoft-Windows-Kernel-Registry",
any=WindowsKernelRegistry_Keyword)
}, delay=1)
Sample Events #
CreateKey Event #
{"Timestamp":"2025-01-30T08:10:20Z","System":{"Channel":"Microsoft-Windows-Kernel-Registry","Computer":"WIN-SJE0CKQO83P","EventType":"CreateKey","EventID":{"Value":1}},"EventData":{"BaseObject":"0xFFFFB1893D043AA0","KeyObject":"0x0","Status":"0x104","Disposition":"0","BaseName":"","RelativeName":"\\REGISTRY\\USER\\S-1-5-21-241402409-3571345782-2557608070-500_Classes\\Local Settings\\Software\\Microsoft\\Windows\\CurrentVersion\\AppModel\\SystemAppData\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy","ProcInfo":null,"ParentProcInfo":{"Name":"svchost.exe","Username":"NT AUTHORITY\\SYSTEM","Exe":"C:\\Windows\\System32\\svchost.exe","CommandLine":"C:\\Windows\\system32\\svchost.exe -k DcomLaunch -p"}}}
DeleteKey Event #
{"Timestamp":"2025-01-30T08:12:50Z","System":{"Channel":"Microsoft-Windows-Kernel-Registry","Computer":"WIN-SJE0CKQO83P","EventType":"DeleteKey","EventID":{"Value":3}},"EventData":{"KeyObject":"0xFFFFB189385B9BB0","Status":"0x0","KeyName":"","ProcInfo":null,"ParentProcInfo":{"Name":"regedit.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\Windows\\regedit.exe","CommandLine":"\"C:\\Windows\\regedit.exe\" "}}}
DeleteValueKey Event #
{"Timestamp":"2025-01-30T08:12:33Z","System":{"Channel":"Microsoft-Windows-Kernel-Registry","Computer":"WIN-SJE0CKQO83P","EventType":"DeleteValueKey","EventID":{"Value":6}},"EventData":{"KeyObject":"0xFFFFB1893D0460E0","Status":"0xC0000034","KeyName":"","ValueName":"CachedFeatureString","ProcInfo":null,"ParentProcInfo":{"Name":"SearchApp.exe","Username":"WIN-SJE0CKQO83P\\Administrator","Exe":"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApp.exe","CommandLine":"\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApp.exe\" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca"}}}
OpenKey Event #
{"Timestamp":"2025-01-30T08:08:51Z","System":{"Channel":"Microsoft-Windows-Kernel-Registry","Computer":"WIN-SJE0CKQO83P","EventType":"OpenKey","EventID":{"Value":2}},"EventData":{"BaseObject":"0xFFFFB1892A262AD0","KeyObject":"0xFFFFB1893C344100","Status":"0x0","Disposition":"0","BaseName":"","RelativeName":"\\Registry\\Machine\\Hardware\\DeviceMap\\VIDEO","ProcInfo":null,"ParentProcInfo":{"Name":"vm3dservice.exe","Username":"NT AUTHORITY\\SYSTEM","Exe":"C:\\Windows\\System32\\vm3dservice.exe","CommandLine":"vm3dservice.exe -n"}}}
SetValueKey Event #
{"Timestamp":"2025-01-30T08:10:20Z","System":{"Channel":"Microsoft-Windows-Kernel-Registry","Computer":"WIN-SJE0CKQO83P","EventType":"SetValueKey","EventID":{"Value":5}},"EventData":{"KeyObject":"0xFFFFB1893D043AA0","Status":"0x0","Type":"11","DataSize":"8","KeyName":"","ValueName":"PCT","CapturedDataSize":"0","CapturedData":"","PreviousDataType":"0","PreviousDataSize":"0","PreviousDataCapturedSize":"0","PreviousData":null,"ProcInfo":null,"ParentProcInfo":{"Name":"svchost.exe","Username":"NT AUTHORITY\\SYSTEM","Exe":"C:\\Windows\\System32\\svchost.exe","CommandLine":"C:\\Windows\\system32\\svchost.exe -k DcomLaunch -p"}}}
Sample use in a sigma rule: #
logsource:
category: etw
product: windows
service: registry
etw/windows/process
#
Log source based on the Microsoft-Windows-Kernel-Registry
provider
See etw/windows/kernel
for a better ETW provider.
VQL Query #
SELECT timestamp(epoch=now()) AS Timestamp,
System + dict(Channel="Microsoft-Windows-Kernel-Process",
Computer=Hostname,
EventType=get(item=WindowsKernelProcess_EIDLookup,
field=str(str=System.ID)),
EventID=dict(Value=System.ID)) AS System,
EventData + dict(
ProcInfo=GetProcInfo(PID=System.ProcessID)
) AS EventData
FROM delay(query={
SELECT * FROM watch_etw(
guid='{22fb2cd6-0e7b-422b-a0c7-2fad1fd0e716}',
description="Microsoft-Windows-Kernel-Process",
any=WindowsKernelProcess_Keyword)
}, delay=1)
Sample use in a sigma rule: #
logsource:
category: etw
product: windows
service: process
etw/windows/sysmon
#
Log source to read Sysmon events via ETW
This is better than reading the log files since it does not use the event log service.
VQL Query #
SELECT *
FROM delay(query={
SELECT System.TimeStamp AS Timestamp,
System + dict(
EventId=System.ID,
Computer=Hostname,
Channel="Microsoft-Windows-Sysmon/Operational") AS System,
EventData + dict(ProcInfo=process_tracker_get(
id=System.ProcessID).Data) AS EventData
FROM watch_etw(
guid='{5770385f-c22a-43e0-bf4c-06f5698ffbd9}',
description="Microsoft-Windows-Sysmon/Operational")
}, delay=1)
Sample use in a sigma rule: #
logsource:
category: etw
product: windows
service: sysmon
etw/windows/etw
#
Log source to monitor ETW system states
VQL Query #
SELECT *
FROM delay(query={
SELECT System.TimeStamp AS Timestamp,
System + dict(
EventId=System.ID,
Computer=Hostname,
Channel="Microsoft-Windows-Kernel-EventTracing") AS System,
EventData + dict(ProcInfo=process_tracker_get(
id=System.ProcessID).Data) AS EventData
FROM watch_etw(
guid='{B675EC37-BDB6-4648-BC92-F3FDC74D3CA2}', any=0x30,
description="Microsoft-Windows-Kernel-EventTracing")
}, delay=1)
Sample use in a sigma rule: #
logsource:
category: etw
product: windows
service: etw
etw/windows/wmi
#
Log source to monitor WMI activity
VQL Query #
SELECT *
FROM delay(query={
SELECT System.TimeStamp AS Timestamp,
System + dict(
EventId=System.ID,
Computer=Hostname,
Channel="Microsoft-Windows-WMI-Activity") AS System,
EventData + dict(ProcInfo=process_tracker_get(
id=System.ProcessID).Data) AS EventData
FROM watch_etw(
guid='{1418EF04-B0B4-4623-BF7E-D74AB47BBDAA}', any=0x30,
description="Microsoft-Windows-WMI-Activity")
}, delay=1)
Sample use in a sigma rule: #
logsource:
category: etw
product: windows
service: wmi
etw/windows/dns
#
Log source to monitor DNS Lookups
See full description here
VQL Query #
SELECT *
FROM delay(query={
SELECT System.TimeStamp AS Timestamp,
System + dict(
EventId=System.ID,
Computer=Hostname,
Channel="Microsoft-Windows-DNS-Client") AS System,
EventData + dict(ProcInfo=process_tracker_get(
id=System.ProcessID).Data) AS EventData
FROM watch_etw(
guid='{1C95126E-7EEA-49A9-A3FE-A378B03DDB4D}', any=0x30,
description="Microsoft-Windows-DNS-Client")
}, delay=1)
Sample use in a sigma rule: #
logsource:
category: etw
product: windows
service: dns