<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Wevtutil — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/wevtutil/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/wevtutil/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Event Log Disabling via WevtUtil</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-logs-wevtutil/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-logs-wevtutil/</guid><description>Detection of the 'wevtutil.exe' command-line utility being used to disable event logs, a common tactic employed by ransomware actors to evade detection and hinder forensic analysis on compromised Windows systems.</description><content:encoded><![CDATA[<p>This brief focuses on the detection of adversaries disabling Windows event logs using the <code>wevtutil.exe</code> utility. Disabling or clearing event logs is a common defense evasion technique employed by ransomware actors and other malicious actors to remove evidence of their activities and impede incident response. The detection logic centers around identifying specific command-line parameters used with <code>wevtutil.exe</code> that indicate an attempt to disable or clear logs. This activity, if successful, allows attackers to operate with reduced visibility, complicating investigations and potentially extending the duration of the compromise. The activity is detected via process monitoring data from EDR solutions and Windows Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the target system through various means, such as phishing, exploitation of a vulnerability, or compromised credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain necessary permissions to disable event logs, typically requiring local administrator rights.</li>
<li>Defense Evasion: The attacker executes <code>wevtutil.exe</code> with specific command-line arguments to disable or clear event logs, such as <code>wevtutil.exe sl &lt;logname&gt; /e:false</code> or <code>wevtutil.exe set-log &lt;logname&gt; /enabled:false</code>.</li>
<li>Log Manipulation: The attacker targets specific event logs, such as the Security, Application, or System logs, to remove traces of their activity.</li>
<li>Persistence: In some cases, the attacker might establish persistence through scheduled tasks or registry modifications to ensure continued access even after system reboots.</li>
<li>Lateral Movement: The attacker might use the compromised system as a pivot point to move laterally to other systems on the network, repeating the log disabling process to cover their tracks.</li>
<li>Data Encryption/Exfiltration: After disabling logs and moving laterally, the attacker deploys ransomware to encrypt data, or exfiltrates sensitive information from the compromised environment.</li>
<li>Impact: The attacker achieves their final objective, whether it&rsquo;s data encryption for ransom or exfiltration of sensitive information, with reduced chances of detection and successful investigation due to disabled logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling or clearing event logs allows attackers to operate undetected for extended periods, increasing the dwell time and potential for damage. This activity can lead to significant data loss, financial losses due to ransomware demands, reputational damage, and increased costs associated with incident response and recovery. In cases like the Ransom X ransomware attack (referenced in the original source), disabling logs was a key step in hiding malicious activity. The lack of log data makes incident response significantly more difficult and time-consuming.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM or EDR solution to detect instances of <code>wevtutil.exe</code> being used to disable event logs.</li>
<li>Enable and monitor process creation logs (Sysmon Event ID 1 or Windows Event Log Security 4688) with command-line arguments to capture the execution of <code>wevtutil.exe</code> with potentially malicious parameters.</li>
<li>Investigate any alerts triggered by these rules promptly to determine if the activity is legitimate or indicative of malicious behavior.</li>
<li>Implement strict access controls and principle of least privilege to limit the number of users who can execute <code>wevtutil.exe</code> or modify event log settings.</li>
<li>Review and harden your endpoint detection and response (EDR) configurations to ensure comprehensive process monitoring and event logging capabilities.</li>
<li>Consider using an immutable logging solution to prevent attackers from tampering with log data, ensuring that audit trails remain intact.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ransomware</category><category>windows</category><category>wevtutil</category></item></channel></rss>