heroui logo

Suspicious Eventlog Clear

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the use of specific PowerShell cmdlets that are commonly associated with malicious activity, particularly attempts to clear the Windows event logs. The rule captures script executions containing keywords like 'Clear-EventLog', 'Remove-EventLog', 'Limit-EventLog', and 'Clear-WinEvent'. Such actions can indicate an attempt to erase evidence of malicious actions from the system logs, which is a common tactic used by threat actors to evade detection.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Script
ATT&CK Techniques
  • T1070.001
Created: 2022-09-12