TeamViewer Log File Deleted
Detects the deletion of the TeamViewer log files which may indicate an attempt to destroy forensic evidence
Sigma rule (View on GitHub)
1title: TeamViewer Log File Deleted
2id: b1decb61-ed83-4339-8e95-53ea51901720
3status: test
4description: Detects the deletion of the TeamViewer log files which may indicate an attempt to destroy forensic evidence
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.004/T1070.004.md
7author: frack113
8date: 2022-01-16
9modified: 2023-02-15
10tags:
11 - attack.defense-evasion
12 - attack.t1070.004
13logsource:
14 product: windows
15 category: file_delete
16detection:
17 selection:
18 TargetFilename|contains: '\TeamViewer_'
19 TargetFilename|endswith: '.log'
20 filter:
21 Image: C:\Windows\system32\svchost.exe
22 condition: selection and not filter
23falsepositives:
24 - Unknown
25level: low
References
Related rules
- ADS Zone.Identifier Deleted By Uncommon Application
- Backup Catalog Deleted
- Cisco File Deletion
- Directory Removal Via Rmdir
- File Deleted Via Sysinternals SDelete