Suspicious Wevtutil Usage for Clearing Windows Event Logs
Detection of wevtutil.exe being used with parameters to clear event logs, indicating potential attempts to evade detection and hinder forensic investigations by adversaries.
The following analytic detects the suspicious usage of wevtutil.exe to clear Windows event logs, including critical logs like Application, Security, Setup, Trace, and System. This behavior is often associated with threat actors attempting to remove evidence of their activities, thereby hindering incident response and forensic analysis. The detection leverages data from Endpoint Detection and Response (EDR) agents, focusing on process names and command-line arguments. This activity is significant because clearing event logs can be an attempt to cover tracks after malicious actions, hindering forensic investigations. If confirmed malicious, this behavior could allow an attacker to erase evidence of their activities, making it difficult to trace their actions and understand the full scope of the compromise.
Attack Chain
- Initial Access: An attacker gains initial access to a system through various means (e.g., phishing, exploiting vulnerabilities).
- Privilege Escalation: The attacker elevates privileges to gain the necessary permissions to manipulate event logs.
- Credential Access: The attacker attempts to obtain valid credentials.
- Defense Evasion: The attacker uses
wevtutil.exewith specific parameters to clear security, application, system, or other event logs. The command line includes arguments such as “cl” or “clear-log” followed by the name of the log to clear (e.g.,wevtutil cl Security). - Persistence: The attacker may establish persistence mechanisms to maintain access to the compromised system.
- Lateral Movement: The attacker moves laterally to other systems within the network, repeating the steps of privilege escalation and log clearing.
- Exfiltration/Impact: Depending on the attacker’s objectives, they may exfiltrate sensitive data or cause damage to the system or network.
Impact
Successful clearing of event logs can severely impair an organization’s ability to detect and respond to security incidents. This can lead to delayed detection of breaches, increased dwell time for attackers, and difficulty in understanding the full extent of a compromise. The loss of log data can also hinder compliance efforts and legal investigations.
Recommendation
- Deploy the Sigma rule
Suspicious Wevtutil Usageto your SIEM and tune for your environment to detect the clearing of event logs usingwevtutil.exe. - Enable Sysmon process-creation logging (Event ID 1) and Windows Event Log Security logging (Event ID 4688) to ensure the necessary data is available for the detection rule.
- Investigate any detected instances of
wevtutil.exebeing used to clear logs, focusing on the parent process, user account, and affected system. - Monitor endpoint logs for unusual or unauthorized use of command-line tools for log manipulation.
Detection coverage 2
Suspicious Wevtutil Usage
highDetects the usage of wevtutil.exe with parameters for clearing event logs.
Suspicious Wevtutil Usage - Alternate
highDetects the usage of wevtutil.exe with parameters for clearing event logs using alternate syntax.
Detection queries are kept inside the platform. Get full rules →