<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Event-Logs — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/event-logs/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/event-logs/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Eventlog Cleared Via Wevtutil</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-eventlog-cleared-wevtutil/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-eventlog-cleared-wevtutil/</guid><description>Adversaries may clear Windows event logs using `wevtutil.exe` to remove evidence of their activity and hinder forensic investigations.</description><content:encoded><![CDATA[<p>Attackers may attempt to clear Windows event logs to evade detection and hinder forensic investigations. Clearing logs removes evidence of malicious activity, making it difficult to trace attacker actions and understand the scope of a compromise. This activity is often performed after other malicious actions to remove traces of those actions. The tool <code>wevtutil.exe</code>, a legitimate Windows utility, can be used to clear event logs when invoked with the <code>clear-log</code> parameter. Detecting the use of <code>wevtutil.exe</code> with this parameter can indicate an attempt to cover tracks after malicious activities. This behavior is significant because it can prevent defenders from fully understanding the attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through unspecified means (e.g., exploiting a vulnerability or through phishing).</li>
<li>The attacker executes commands to perform reconnaissance and privilege escalation.</li>
<li>After achieving desired privileges and completing their objectives, the attacker uses <code>wevtutil.exe</code> to clear specific event logs.</li>
<li>The attacker executes <code>wevtutil.exe</code> with the <code>clear-log</code> parameter, specifying the log to clear (e.g., Security, Application, System). For example: <code>wevtutil cl Security</code>.</li>
<li>The command execution is logged by endpoint detection and response (EDR) agents, capturing the process name (<code>wevtutil.exe</code>) and command-line arguments (<code>clear-log</code>).</li>
<li>Windows Event Logs, such as the Security log, are cleared of their contents, removing entries related to the attacker&rsquo;s activities.</li>
<li>Forensic investigations are hampered due to missing event log data, making it difficult to trace the attacker&rsquo;s actions and understand the full scope of the compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful clearing of event logs can significantly impede incident response efforts. By removing evidence of their actions, attackers can prolong their presence in the compromised environment and make it more difficult to identify the extent of the damage. In cases of ransomware attacks, this could delay recovery efforts and increase the overall impact. The detection is based on data that originates from Endpoint Detection and Response (EDR) agents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging, specifically Sysmon Event ID 1 or Windows Event Log Security 4688, to capture <code>wevtutil.exe</code> executions.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect the execution of <code>wevtutil.exe</code> with the <code>clear-log</code> parameter.</li>
<li>Investigate any detected instances of <code>wevtutil.exe</code> being used to clear logs, as this could indicate malicious activity.</li>
<li>Tune the Sigma rules for false positives based on legitimate administrator usage of <code>wevtutil.exe</code> in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>event-logs</category></item></channel></rss>