heroui logo

Windows Eventlog Cleared Via Wevtutil

Splunk Security Content

View Source
Summary
This detection rule monitors for the execution of wevtutil.exe with the "clear-log" parameter, which is a method often used by attackers to erase logs from Windows Event Logs. The rule analyzes data captured from Endpoint Detection and Response (EDR) systems, specifically evaluating command-line arguments and process names. Clearing logs can conceal malicious activities, making it crucial for forensic investigations to detect such actions. If an attacker uses wevtutil.exe to clear logs, it can indicate attempts to cover their tracks post-compromise. The rule is vital for identifying suspicious log-clearing behavior, which could suggest an ongoing attack or indicators of potential post-exploitation behavior.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1070.001
Created: 2025-04-15