Windows Defender Malware Detection History Deletion
Windows Defender logs when the history of detected infections is deleted.
Sigma rule (View on GitHub)
1title: Windows Defender Malware Detection History Deletion
2id: 2afe6582-e149-11ea-87d0-0242ac130003
3status: test
4description: Windows Defender logs when the history of detected infections is deleted.
5references:
6 - https://learn.microsoft.com/en-us/defender-endpoint/troubleshoot-microsoft-defender-antivirus
7 - https://web.archive.org/web/20160727113019/https://answers.microsoft.com/en-us/protect/forum/mse-protect_scanning/microsoft-antimalware-has-removed-history-of/f15af6c9-01a9-4065-8c6c-3f2bdc7de45e
8author: Cian Heasley
9date: 2020-08-13
10modified: 2023-11-24
11tags:
12 - attack.defense-evasion
13logsource:
14 product: windows
15 service: windefend
16detection:
17 selection:
18 EventID: 1013 # The antimalware platform deleted history of malware and other potentially unwanted software.
19 condition: selection
20falsepositives:
21 - Deletion of Defender malware detections history for legitimate reasons
22level: informational
References
Related rules
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity