SigmaHQ/rules/windows/builtin/win_eventlog_cleared.yml

22 lines
581 B
YAML
Raw Normal View History

title: Eventlog Cleared Experimental
2017-06-27 15:28:19 +00:00
status: experimental
description: Detects a cleared Windows Eventlog as e.g. caused by "wevtutil cl" command execution
author: Florian Roth
date: 2017/06/27
references:
- https://www.hybrid-analysis.com/sample/027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745?environmentId=100
2018-07-24 05:50:32 +00:00
tags:
- attack.defense_evasion
- attack.t1070
2017-06-27 15:28:19 +00:00
logsource:
product: windows
service: system
detection:
selection:
EventID: 104
Source: Eventlog
condition: selection
falsepositives:
- unknown
level: high