heroui logo

Eventlog Cleared

Sigma Rules

View Source
Summary
The 'Eventlog Cleared' rule is designed to detect instances where Windows Event Logs have been cleared, which can be indicative of malicious activity aimed at covering tracks by an attacker. The rule specifically looks for the execution of the command 'wevtutil cl', which is commonly used to clear specific event logs. In its detection mechanism, the rule identifies EventID 104 from the 'Microsoft-Windows-Eventlog' provider. In addition to the main selection criteria, it applies a filtering condition that excludes events from certain channels such as operational logs from PowerShell and Sysmon, the Security log, and more, ensuring that only relevant logs are captured. As part of the false positive considerations, the rule acknowledges scenarios like the rollout of log collection agents and system provisioning processes that may also result in cleared logs, hence requiring further analysis. This detection can aid in identifying potential evasive maneuvers by adversaries during their operations.
Categories
  • Windows
  • Endpoint
  • Cloud
Data Sources
  • Windows Registry
  • Application Log
  • Logon Session
Created: 2017-01-10