Skip to content

[Rule Tuning] Clearing or Disabling Windows Event Logs #393

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 11 commits into from
Dec 2, 2020
13 changes: 6 additions & 7 deletions rules/windows/defense_evasion_clearing_windows_event_logs.toml
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
[metadata]
creation_date = "2020/02/18"
maturity = "production"
updated_date = "2020/11/03"
updated_date = "2020/11/30"

[rule]
author = ["Elastic"]
description = """
Identifies attempts to clear Windows event log stores. This is often done by attackers in an attempt to evade detection
or destroy forensic evidence on a system.
Identifies attempts to clear or disable Windows event log stores using Windows wevetutil command. This is often done by
attackers in an attempt to evade detection or destroy forensic evidence on a system.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-endpoint.events.*"]
Expand All @@ -21,9 +21,9 @@ tags = ["Elastic", "Host", "Windows", "Threat Detection", "Defense Evasion"]
type = "query"

query = '''
event.category:process and event.type:(start or process_started) and
process.name:wevtutil.exe and process.args:cl or
process.name:powershell.exe and process.args:Clear-EventLog
event.category:process and event.type:(process_started or start) and
(process.name:"wevtutil.exe" or process.pe.original_file_name:"wevtutil.exe") and
process.args:("/e:false" or cl or "clear-log") or process.name:"powershell.exe" and process.args:"Clear-EventLog"
'''


Expand All @@ -39,4 +39,3 @@ reference = "https://attack.mitre.org/techniques/T1070/"
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"