Prefetch File Deleted
Detects the deletion of a prefetch file which may indicate an attempt to destroy forensic evidence
Sigma rule (View on GitHub)
1title: Prefetch File Deleted
2id: 0a1f9d29-6465-4776-b091-7f43b26e4c89
3status: test
4description: Detects the deletion of a prefetch file which may indicate an attempt to destroy forensic evidence
5references:
6 - Internal Research
7 - https://www.group-ib.com/blog/hunting-for-ttps-with-prefetch-files/
8author: Cedric MAURUGEON
9date: 2021-09-29
10modified: 2024-01-25
11tags:
12 - attack.defense-evasion
13 - attack.t1070.004
14logsource:
15 product: windows
16 category: file_delete
17detection:
18 selection:
19 TargetFilename|contains: ':\Windows\Prefetch\'
20 TargetFilename|endswith: '.pf'
21 filter_main_svchost:
22 Image|endswith: ':\windows\system32\svchost.exe'
23 User|contains: # covers many language settings
24 - 'AUTHORI'
25 - 'AUTORI'
26 condition: selection and not 1 of filter_main_*
27falsepositives:
28 - Unknown
29level: high
References
Related rules
- ADS Zone.Identifier Deleted By Uncommon Application
- Backup Catalog Deleted
- Cisco File Deletion
- Directory Removal Via Rmdir
- File Deleted Via Sysinternals SDelete