Potentially Suspicious Call To Win32_NTEventlogFile Class

Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script

Sigma rule (View on GitHub)

 1title: Potentially Suspicious Call To Win32_NTEventlogFile Class
 2id: caf201a9-c2ce-4a26-9c3a-2b9525413711
 3related:
 4    - id: e2812b49-bae0-4b21-b366-7c142eafcde2
 5      type: similar
 6status: experimental
 7description: Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script
 8references:
 9    - https://learn.microsoft.com/en-us/previous-versions/windows/desktop/legacy/aa394225(v=vs.85)
10author: Nasreddine Bencherchali (Nextron Systems)
11date: 2023/07/13
12tags:
13    - attack.defense_evasion
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection_class:
19        CommandLine|contains: 'Win32_NTEventlogFile'
20    selection_function:
21        CommandLine|contains:
22            - '.BackupEventlog('
23            - '.ChangeSecurityPermissions('
24            - '.ChangeSecurityPermissionsEx('
25            - '.ClearEventLog('
26            - '.Delete('
27            - '.DeleteEx('
28            - '.Rename('
29            - '.TakeOwnerShip('
30            - '.TakeOwnerShipEx('
31    condition: all of selection_*
32falsepositives:
33    - Unknown
34level: high

References

Related rules

to-top