mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-28 15:58:24 +01:00
Added new technique: wevtutil.exe
This commit is contained in:
parent
baaa5bbc73
commit
0986609c4b
43
yml/OSBinaries/Wevtutil.yml
Normal file
43
yml/OSBinaries/Wevtutil.yml
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
---
|
||||||
|
Name: Wevtutil.exe
|
||||||
|
Description: Wevtutil.exe is a built-in Windows utility for managing event logs. It allows querying, exporting, clearing, and configuring event logs, making it a versatile tool for system administrators. However, its capabilities can be abused by attackers to evade detection by selectively clearing or manipulating logs.
|
||||||
|
Author: Tonmoy Jitu
|
||||||
|
Created: 2024-11-25
|
||||||
|
Commands:
|
||||||
|
- Command: wevtutil cl Application
|
||||||
|
Description: Used to erase evidence of malicious activity or cleanup post-exploitation traces in application logs.
|
||||||
|
Usecase: Clears all entries from the Application event log.
|
||||||
|
Category: Dump
|
||||||
|
Privileges: Administrator
|
||||||
|
MitreID: T1070
|
||||||
|
OperatingSystem: Windows Vista and later
|
||||||
|
- Command: wevtutil qe Security /q:"*[System[EventID=4624]]" /f:text
|
||||||
|
Description: Queries the Security log for specific events (e.g., Event ID 4624) and outputs results in text format.
|
||||||
|
Usecase: Used to extract relevant log details to analyze or selectively target events before log clearing.
|
||||||
|
Category: Reconnaissance
|
||||||
|
Privileges: User (Event Log Reader)
|
||||||
|
MitreID: T1218
|
||||||
|
OperatingSystem: Windows Vista and later
|
||||||
|
- Command: wevtutil qe Security /f:xml > exported_logs.xml
|
||||||
|
Description: Queries the Security event log and exports its contents in XML format to a file.
|
||||||
|
Usecase: sed to exfiltrate Security log data for analysis. The XML format allows attackers to parse and extract detailed information about audit events, user activity, or security configurations.
|
||||||
|
Category: Dump
|
||||||
|
Privileges: Administrator
|
||||||
|
MitreID: T1005
|
||||||
|
OperatingSystem: Windows Vista and later
|
||||||
|
Full_Path:
|
||||||
|
- Path: C:\Windows\System32\wevtutil.exe
|
||||||
|
- Path: C:\Windows\SysWOW64\wevtutil.exe
|
||||||
|
Code_Sample:
|
||||||
|
- Code:
|
||||||
|
Detection:
|
||||||
|
- IOC: Use of wevtutil cl in command-line logs.
|
||||||
|
- IOC: Multiple wevtutil qe commands targeting specific Event IDs.
|
||||||
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_eventlog_clear.yml
|
||||||
|
- Splunk: https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_a_ransomware_attack/Wevtutil.exe_abuse
|
||||||
|
Resources:
|
||||||
|
- Link: https://denwp.com/unexplored-lolbas-technique-wevtutil-exe/
|
||||||
|
- Link: https://x.com/tonmoy0010/status/1860963760774713805
|
||||||
|
Acknowledgement:
|
||||||
|
- Person: Tonmoy Jitu
|
||||||
|
Handle: '@tonmoy0010'
|
Loading…
Reference in New Issue
Block a user