<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Log-Manipulation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/log-manipulation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/log-manipulation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Wevtutil Usage for Clearing Windows Event Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-wevtutil/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-wevtutil/</guid><description>Detection of wevtutil.exe being used with parameters to clear event logs, indicating potential attempts to evade detection and hinder forensic investigations by adversaries.</description><content:encoded><![CDATA[<p>The following analytic detects the suspicious usage of <code>wevtutil.exe</code> to clear Windows event logs, including critical logs like Application, Security, Setup, Trace, and System. This behavior is often associated with threat actors attempting to remove evidence of their activities, thereby hindering incident response and forensic analysis. The detection leverages data from Endpoint Detection and Response (EDR) agents, focusing on process names and command-line arguments. This activity is significant because clearing event logs can be an attempt to cover tracks after malicious actions, hindering forensic investigations. If confirmed malicious, this behavior could allow an attacker to erase evidence of their activities, making it difficult to trace their actions and understand the full scope of the compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a system through various means (e.g., phishing, exploiting vulnerabilities).</li>
<li>Privilege Escalation: The attacker elevates privileges to gain the necessary permissions to manipulate event logs.</li>
<li>Credential Access: The attacker attempts to obtain valid credentials.</li>
<li>Defense Evasion: The attacker uses <code>wevtutil.exe</code> with specific parameters to clear security, application, system, or other event logs. The command line includes arguments such as &ldquo;cl&rdquo; or &ldquo;clear-log&rdquo; followed by the name of the log to clear (e.g., <code>wevtutil cl Security</code>).</li>
<li>Persistence: The attacker may establish persistence mechanisms to maintain access to the compromised system.</li>
<li>Lateral Movement: The attacker moves laterally to other systems within the network, repeating the steps of privilege escalation and log clearing.</li>
<li>Exfiltration/Impact: Depending on the attacker&rsquo;s objectives, they may exfiltrate sensitive data or cause damage to the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful clearing of event logs can severely impair an organization&rsquo;s ability to detect and respond to security incidents. This can lead to delayed detection of breaches, increased dwell time for attackers, and difficulty in understanding the full extent of a compromise. The loss of log data can also hinder compliance efforts and legal investigations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Wevtutil Usage</code> to your SIEM and tune for your environment to detect the clearing of event logs using <code>wevtutil.exe</code>.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) and Windows Event Log Security logging (Event ID 4688) to ensure the necessary data is available for the detection rule.</li>
<li>Investigate any detected instances of <code>wevtutil.exe</code> being used to clear logs, focusing on the parent process, user account, and affected system.</li>
<li>Monitor endpoint logs for unusual or unauthorized use of command-line tools for log manipulation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>log-manipulation</category></item></channel></rss>