Sysmon and Ransomware Detection for ICS/OT

This guide explains how Sysmon detects ransomware activity, what it cannot detect, and how ICS Watch Dog configurations provide ransomware-relevant telemetry across all tiers.

Important: Sysmon is primarily a detection and forensic telemetry tool, not a prevention tool. It generates event logs that reveal ransomware activity, but it does not block or quarantine threats. Two exceptions exist: Event ID 27 (FileBlockExecutable) and Event ID 28 (FileBlockShredding) in schema 4.90 configs can block specific file operations. Defense in depth is required -- see the Defense in Depth section.

How Ransomware Attacks Work

Ransomware attacks follow a predictable progression. Understanding each stage helps explain which Sysmon Event IDs provide detection at each point.

Kill Chain Stage What Happens Sysmon Event IDs
Initial Access Phishing attachment, exploit, or compromised credentials deliver the payload 11 (FileCreate), 15 (FileStreamHash), 22 (DnsQuery)
Execution Ransomware binary or script runs, often via LOLBins (certutil, mshta, PowerShell) 1 (ProcessCreate), 7 (ImageLoad), 19-21 (WmiEvent)
Persistence Registry autostart keys, scheduled tasks, malicious drivers installed 12-14 (RegistryEvent), 11 (FileCreate), 6 (DriverLoad)
Privilege Escalation Credential dumping (LSASS), process injection, vulnerable driver loading (BYOVD) 10 (ProcessAccess), 8 (CreateRemoteThread), 6 (DriverLoad)
Lateral Movement SMB/RDP/WinRM connections, PsExec, WMI-based remote execution 3 (NetworkConnect), 17-18 (PipeEvent), 1 (ProcessCreate)
Impact Shadow copy deletion, recovery inhibition, file encryption, ransom note creation 1 (ProcessCreate), 11 (FileCreate), 26 (FileDeleteDetected), 25 (ProcessTampering), 27 (FileBlockExecutable), 29 (FileExecutableDetected)

What ICS Watch Dog Configs Detect

All ICS Watch Dog configurations include ransomware detection indicators. The following sections describe each detection category with the specific Sysmon Event IDs and rule patterns used.

Recovery Inhibition (Event ID 1: ProcessCreate)

Nearly all ransomware families delete shadow copies and disable recovery before encrypting files. ICS Watch Dog configs detect these commands via ProcessCreate include rules with named RuleNames for SIEM alerting:

MITRE ATT&CK: T1490 - Inhibit System Recovery

Ransomware families: WannaCry, Ryuk, Conti, LockBit, REvil, BlackCat/ALPHV, EKANS, Black Basta, Akira

Security Tool Disablement (Event ID 1 + Events 12-14)

Ransomware disables Windows Defender and other security tools before encrypting. Detected via ProcessCreate command line patterns and registry changes:

MITRE ATT&CK: T1562.001 - Disable or Modify Tools

Credential Dumping (Event ID 10: ProcessAccess)

Virtually all human-operated ransomware campaigns dump credentials from LSASS to obtain domain admin access for lateral movement. All ICS Watch Dog configs monitor for any non-system process accessing lsass.exe:

MITRE ATT&CK: T1003 - OS Credential Dumping

Process Injection and Tampering (Event IDs 8, 25)

Ransomware injects code into legitimate processes to evade detection and encrypt from trusted contexts:

MITRE ATT&CK: T1055 - Process Injection

C2 Named Pipes (Event IDs 17-18: PipeEvent)

Ransomware operators typically use C2 frameworks like Cobalt Strike to manage compromised networks before deploying ransomware. ICS Watch Dog configs include named pipe detection rules for known C2 indicators:

MITRE ATT&CK: T1021 - Remote Services

Ransom Note Detection (Event ID 11: FileCreate)

OT configurations and the Jump Host config include FileCreate rules that detect common ransom note filename patterns. On an OT system, files with names containing DECRYPT, RANSOM, or RECOVER are highly suspicious:

Note: These rules are included in OT configs and the Jump Host config but not IT baseline configs, where filenames containing these terms are more common in normal business use.

MITRE ATT&CK: T1486 - Data Encrypted for Impact

Backup and Database File Deletion (Event ID 26: FileDeleteDetected)

Ransomware deletes backup files and database data files to prevent recovery. All ICS Watch Dog configs monitor deletion of:

These deletions, combined with shadow copy deletion commands, are a strong indicator of ransomware activity in progress.

BYOVD: Vulnerable Driver Loading (Event ID 6: DriverLoad)

Modern ransomware groups load vulnerable legitimate drivers to disable EDR and antivirus at the kernel level (Bring Your Own Vulnerable Driver). All ICS Watch Dog configs log non-Microsoft driver loads. Notable vulnerable drivers used in ransomware attacks:

Cross-reference driver hashes against the LOLDrivers database for known vulnerable drivers.

MITRE ATT&CK: T1562.001 - Disable or Modify Tools

Executable File Detection (Event IDs 27, 29 -- Advanced OT and Jump Host)

Configs using schema 4.90 (Advanced OT and Jump Host) include additional detection capabilities:

ICS-Specific Ransomware

Several ransomware families have specifically targeted ICS/OT environments. The techniques used in these attacks inform the detection rules in ICS Watch Dog configurations.

EKANS / Snake

EKANS is the most ICS-specific ransomware to date. Unlike generic ransomware, EKANS contains a hard-coded kill list of ICS processes including GE Proficy and Honeywell HMIWeb. Before encrypting, it:

Sysmon detection: Event ID 1 (process termination commands, shadow copy deletion), Event ID 22 (internal domain DNS resolution), Event ID 11 (ransom note creation)

MITRE ATT&CK: S0605 - EKANS

LockerGoga (Norsk Hydro, 2019)

LockerGoga was deployed via Active Directory Group Policy, forcing password changes to lock out users and encrypting files with a .locked extension. This attack demonstrated how ransomware can leverage AD infrastructure for deployment -- a reason why monitoring domain controllers with the Server AD/DC config is critical.

Colonial Pipeline (DarkSide, 2021)

The Colonial Pipeline attack targeted the IT network, but the loss of billing and monitoring capability forced OT operations to shut down. This demonstrates that IT-side ransomware can have OT impact even without directly touching OT systems -- and why IT baseline monitoring matters for ICS/OT organizations.

What Makes ICS Ransomware Different

What Sysmon Cannot Detect

Sysmon is a powerful telemetry tool, but it has limitations. Being honest about these limitations helps organizations build appropriate defense in depth.

Config Coverage by Tier

The following table shows which ransomware detection capabilities are available in each ICS Watch Dog configuration tier.

Detection IT Baseline OT Baseline OT Enhanced OT Advanced Jump Host Server AD Server Services
Shadow copy deletion Yes Yes Yes Yes Yes Yes Yes
Recovery inhibition (bcdedit) Yes Yes Yes Yes Yes Yes Yes
Defender/security tool disablement Yes Yes Yes Yes Yes Yes Yes
LSASS credential dumping Yes Yes Yes Yes Yes Yes Yes
Process injection/tampering Yes Yes Yes Yes Yes Yes Yes
C2 named pipes Yes Yes Yes Yes Yes (log all) Yes Yes
SafeBoot/WDigest/Sysmon registry Yes Yes Yes Yes Yes Yes Yes
Backup file deletion Yes Yes Yes Yes Yes Yes Yes
BYOVD driver detection Yes Yes Yes Yes Yes Yes Yes
Ransom note filenames -- Yes Yes Yes Yes -- --
FileBlockExecutable (Event 27) -- -- -- Yes -- -- --
FileExecutableDetected (Event 29) -- -- -- Yes Yes -- --
Industrial port monitoring -- -- Yes Yes -- -- --

Defense in Depth

Sysmon alone is not sufficient to protect against ransomware. It provides critical detection telemetry, but effective ransomware defense requires multiple layers:

Complementary Controls

Sysmon's Role in OT

In OT environments, Sysmon's detection-only approach (Events 1-26) is well-suited because automated response is dangerous. Isolating an HMI or engineering workstation mid-operation could cause process safety issues. Sysmon informs human operators without interfering with operations, enabling informed manual response decisions.

Event IDs 27-28 (blocking) in the Advanced OT config should be used cautiously -- block only in directories where executables should never appear, not in active software directories during maintenance windows.

MITRE ATT&CK Reference

Key MITRE ATT&CK techniques relevant to ransomware, mapped to Sysmon Event IDs:

Technique Description Sysmon Events
T1486 Data Encrypted for Impact 11, 26, 29
T1490 Inhibit System Recovery 1
T1489 Service Stop (ICS process kill) 1, 5
T1562.001 Disable or Modify Tools 1, 6, 12-14
T1003 OS Credential Dumping 10
T1055 Process Injection 8, 25
T1021 Remote Services (lateral movement) 3, 17-18
T1112 Modify Registry 12-14

References

Next steps: Review the Configuration Files to select the right tier for your environment. Read the Deployment Considerations guide for phased rollout planning. All ICS Watch Dog configurations include the ransomware detection indicators described on this page.