Skip to content

Commit e6645a8

Browse files
Samirbousbrokensound77dstepanic
authored
[Rule Tuning] Clearing or Disabling Windows Event Logs (#393)
* [Rule Tuning] Clearing or Disabling Windows Event Logs * added tags * Update defense_evasion_clearing_windows_event_logs.toml * Update rules/windows/defense_evasion_clearing_windows_event_logs.toml Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com> * updated the rule update date * linted * fixing unit test error * Update rules/windows/defense_evasion_clearing_windows_event_logs.toml Co-authored-by: dstepanic17 <57736958+dstepanic17@users.noreply.github.com> * ecs_version Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com> Co-authored-by: dstepanic17 <57736958+dstepanic17@users.noreply.github.com>
1 parent db2d17c commit e6645a8

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

rules/windows/defense_evasion_clearing_windows_event_logs.toml

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
[metadata]
22
creation_date = "2020/02/18"
33
maturity = "production"
4-
updated_date = "2020/11/03"
4+
updated_date = "2020/11/30"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
9-
Identifies attempts to clear Windows event log stores. This is often done by attackers in an attempt to evade detection
10-
or destroy forensic evidence on a system.
9+
Identifies attempts to clear or disable Windows event log stores using Windows wevetutil command. This is often done by
10+
attackers in an attempt to evade detection or destroy forensic evidence on a system.
1111
"""
1212
from = "now-9m"
1313
index = ["winlogbeat-*", "logs-endpoint.events.*"]
@@ -21,9 +21,9 @@ tags = ["Elastic", "Host", "Windows", "Threat Detection", "Defense Evasion"]
2121
type = "query"
2222

2323
query = '''
24-
event.category:process and event.type:(start or process_started) and
25-
process.name:wevtutil.exe and process.args:cl or
26-
process.name:powershell.exe and process.args:Clear-EventLog
24+
event.category:process and event.type:(process_started or start) and
25+
(process.name:"wevtutil.exe" or process.pe.original_file_name:"wevtutil.exe") and
26+
process.args:("/e:false" or cl or "clear-log") or process.name:"powershell.exe" and process.args:"Clear-EventLog"
2727
'''
2828

2929

@@ -39,4 +39,3 @@ reference = "https://attack.mitre.org/techniques/T1070/"
3939
id = "TA0005"
4040
name = "Defense Evasion"
4141
reference = "https://attack.mitre.org/tactics/TA0005/"
42-

0 commit comments

Comments
 (0)