
Summary
This detection rule targets the deletion of TeamViewer log files on Windows systems, which may serve as an indicator of malicious activity aimed at erasing forensic evidence. By monitoring file deletions for files that both start with 'TeamViewer_' and end with '.log', the rule aims to identify potentially suspicious activity. The detection is specifically weighted towards entries where the deletion is executed by 'C:\Windows\system32\svchost.exe', which generally represents a benign system process. The presence of such behavior could indicate an attempt to cover tracks by deleting logs that may contain evidence of unauthorized access or configuration changes. Overall, this rule is part of a broader strategy to detect defense evasion tactics employed by attackers. The low threat level assigned to this rule suggests that while it may indicate suspicious behavior, it is not necessarily indicative of an immediate threat when activated. The detection logic ensures that alerts are triggered only under strict conditions to minimize false positives alongside specific filtering of benign processes.
Categories
- Windows
- Endpoint
Data Sources
- File
ATT&CK Techniques
- T1070.004
Created: 2022-01-16