heroui logo

Windows EventLog Recon Activity Using Log Query Utilities

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect reconnaissance activity involving Windows Event Logs, using various command-line utilities like `wevtutil.exe`, `wmic.exe`, PowerShell cmdlets such as `Get-WinEvent`, or WMI queries that target `Win32_NTLogEvent`. These utilities, while legitimate for administrative tasks, can signify malicious intent if executed with specific parameters or focused on sensitive logs, especially the `Security` log. An adversary might utilize these methods to extract critical data such as usernames, IP addresses, and session information during attempts to access credentials or maintain awareness for lateral movements within a network. The detection employs data collected from Endpoint Detection and Response (EDR) agents, focusing on associated process names and command-line arguments. It aims to identify patterns characteristic of reconnaissance behavior, thereby enabling early intervention against potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • File
ATT&CK Techniques
  • T1654
Created: 2025-04-23