IIS WebServer Access Logs Deleted

Detects the deletion of IIS WebServer access logs which may indicate an attempt to destroy forensic evidence

Sigma rule (View on GitHub)

 1title: IIS WebServer Access Logs Deleted
 2id: 3eb8c339-a765-48cc-a150-4364c04652bf
 3related:
 4    - id: 0649be4a-aeb0-45b0-b89e-7f1668f6d9c0
 5      type: similar
 6status: test
 7description: Detects the deletion of IIS WebServer access logs which may indicate an attempt to destroy forensic evidence
 8references:
 9    - https://www.elastic.co/guide/en/security/current/webserver-access-logs-deleted.html
10author: Tim Rauch (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
11date: 2022-09-16
12modified: 2023-02-15
13tags:
14    - attack.defense-evasion
15    - attack.t1070
16logsource:
17    category: file_delete
18    product: windows
19detection:
20    selection:
21        TargetFilename|contains: '\inetpub\logs\LogFiles\'
22        TargetFilename|endswith: '.log'
23    condition: selection
24falsepositives:
25    - During uninstallation of the IIS service
26    - During log rotation
27level: medium

References

Related rules

to-top