
Summary
The Crowdstrike Systemlog Tampering rule is designed to detect attempts by users to clear system logs on Windows operating systems, a common tactic employed by attackers to cover their tracks. The rule monitors specific command executions known to clear the event log, specifically watching for the invocation of the 'wevtutil.exe' utility with the 'cl' command, which clears a specified log. Given the potentially high impact of log clearing on forensic investigations, this rule carries a high severity rating. The detection mechanism hinges on observing the command line arguments of processes, as well as checking the integrity and authenticity of those processes by their hashes and other identification metrics. If the command related to system log clearing is executed, it raises an alert for further investigation, thus enhancing the overall security posture against log tampering tactics.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1070
Created: 2023-05-01