(YARA) YARA_wiping_event
rule UNPROTECT_wiping_event
{
meta:
description = "Rule to detect wiping events logs"
author = "McAfee ATR team | Thomas Roccia"
date = "2020-11-10"
rule_version = "v1"
mitre = "T1070"
hash = "c063c86931c662c1a962d08915d9f3a8"
strings:
$s1 = "wevtutil.exe" ascii wide nocase
$s2 = "cl Application" ascii wide nocase
$s3 = "cl System" ascii wide nocase
$s4 = "cl Setup" ascii wide nocase
$s5 = "cl Security" ascii wide nocase
$s6 = "sl Security /e:false" ascii wide nocase
$s7= "usn deletejournal /D" ascii wide nocase
condition:
uint16(0) == 0x5a4d and 4 of them
}
Associated Techniques
No associated technique found so far.
Created
June 20, 2022
Last Revised
June 20, 2022