Windows event logs were cleared with PowerShell

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Indicator Removal: Clear Windows Event Logs (T1070.001)

Severity

Low

Description

Windows event logs were cleared or deleted with PowerShell.

Attacker's Goals

Attackers may clear events from Windows event logs to remove traces of their malicious activity.

Investigative actions

  • Validate if the script that was executed is from a legitimate IT activity.
  • Look for additional suspicious actions that were executed on the host.

Variations

Suspicious clear or delete security provider event logs with PowerShell

Synopsis

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Indicator Removal: Clear Windows Event Logs (T1070.001)

Severity

High

Description

Windows event logs were cleared or deleted with PowerShell.

Attacker's Goals

Attackers may clear events from Windows event logs to remove traces of their malicious activity.

Investigative actions

  • Validate if the script that was executed is from a legitimate IT activity.
  • Look for additional suspicious actions that were executed on the host.


Suspicious clear or delete default providers event logs with PowerShell

Synopsis

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Indicator Removal: Clear Windows Event Logs (T1070.001)

Severity

Medium

Description

Windows event logs were cleared or deleted with PowerShell.

Attacker's Goals

Attackers may clear events from Windows event logs to remove traces of their malicious activity.

Investigative actions

  • Validate if the script that was executed is from a legitimate IT activity.
  • Look for additional suspicious actions that were executed on the host.