<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.t1685.005 on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.t1685.005/</link>
    <description>Recent content in attack.t1685.005 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.t1685.005/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Eventlog Cleared</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_eventlog/win_system_eventlog_cleared/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_eventlog/win_system_eventlog_cleared/</guid>
      <description>
        
          
            One of the Windows Eventlogs has been cleared. e.g. caused by &#34;wevtutil cl&#34; command execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Important Windows Eventlog Cleared</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_eventlog/win_system_susp_eventlog_cleared/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_eventlog/win_system_susp_eventlog_cleared/</guid>
      <description>
        
          
            Detects the clearing of one of the Windows Core Eventlogs. e.g. caused by &#34;wevtutil cl&#34; command execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>NotPetya Ransomware Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/notpetya/proc_creation_win_malware_notpetya/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/notpetya/proc_creation_win_malware_notpetya/</guid>
      <description>
        
          
            Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and Windows eventlogs are cleared using wevtutil
          
          
        
      </description>
    </item>
    
    <item>
      <title>Security Eventlog Cleared</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_audit_log_cleared/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_audit_log_cleared/</guid>
      <description>
        
          
            One of the Windows Eventlogs has been cleared. e.g. caused by &#34;wevtutil cl&#34; command execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Eventlog Clear</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_clear_eventlog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_clear_eventlog/</guid>
      <description>
        
          
            Detects usage of known powershell cmdlets such as &#34;Clear-EventLog&#34; to clear the Windows event logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Eventlog Clearing or Configuration Change Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_eventlog_clear/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_eventlog_clear/</guid>
      <description>
        
          
            Detects the clearing or configuration tampering of EventLog using utilities such as &#34;wevtutil&#34;, &#34;powershell&#34; and &#34;wmic&#34;.
This technique were seen used by threat actors and ransomware strains in order to evade defenses.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Trace ETW Session Tamper Via Logman.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_logman_disable_eventlog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_logman_disable_eventlog/</guid>
      <description>
        
          
            Detects the execution of &#34;logman&#34; utility in order to disable or delete Windows trace sessions
          
          
        
      </description>
    </item>
    
  </channel>
</rss>
