File Deleted Via Sysinternals SDelete
Detects the deletion of files by the Sysinternals SDelete utility. It looks for the common name pattern used to rename files.
Sigma rule (View on GitHub)
1title: File Deleted Via Sysinternals SDelete
2id: 6ddab845-b1b8-49c2-bbf7-1a11967f64bc
3status: test
4description: Detects the deletion of files by the Sysinternals SDelete utility. It looks for the common name pattern used to rename files.
5references:
6 - https://github.com/OTRF/detection-hackathon-apt29/issues/9
7 - https://github.com/OTRF/ThreatHunter-Playbook/blob/2d4257f630f4c9770f78d0c1df059f891ffc3fec/docs/evals/apt29/detections/4.B.4_83D62033-105A-4A02-8B75-DAB52D8D51EC.md
8author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
9date: 2020-05-02
10modified: 2023-02-15
11tags:
12 - attack.defense-evasion
13 - attack.t1070.004
14logsource:
15 product: windows
16 category: file_delete
17detection:
18 selection:
19 TargetFilename|endswith:
20 - '.AAA'
21 - '.ZZZ'
22 filter_wireshark:
23 TargetFilename|endswith: '\Wireshark\radius\dictionary.alcatel-lucent.aaa'
24 condition: selection and not 1 of filter_*
25falsepositives:
26 - Legitimate usage
27level: medium
yaml
References
Related rules
- Potentially Suspicious Ping/Copy Command Combination
- Potential Secure Deletion with SDelete
- Backup Catalog Deleted
- Cisco File Deletion
- Directory Removal Via Rmdir