diff --git a/yml/OSBinaries/wevtutil.yml b/yml/OSBinaries/wevtutil.yml new file mode 100644 index 00000000..3f047151 --- /dev/null +++ b/yml/OSBinaries/wevtutil.yml @@ -0,0 +1,45 @@ +--- +Name: wevtutil.exe +Description: Windows command-line utility to manage event logs. +Author: Furkan Celik, Pure7 +Created: 2025-08-22 +Commands: + - Command: wevtutil.exe cl Security + Description: Clears the Security event log using wevtutil.exe. + Usecase: Remove event logs to evade detection, bypassing AV/EDR/SIEM logging, or remove indicators of compromise through legitimate signed binary execution. + Category: Anti-Forensics + Privileges: Admin + MitreID: T1070 + OperatingSystem: Windows 10, Windows 11 + - Command: wevtutil.exe cl Security + Description: Clears the Security event log, evading defenses by using a signed Microsoft binary. + Usecase: Remove indicators of compromise while evading AV/EDR detection. + Category: AWL Bypass + Privileges: Admin + MitreID: T1218 + OperatingSystem: Windows 10, Windows 11 + - Command: wevtutil.exe epl Security malicious.evtx + Description: Exports the Security event log to a malicious.evtx file using wevtutil.exe. + Usecase: Extract sensitive security events or create a backup for log manipulation, bypassing AV/EDR/SIEM logging. + Category: Collection + Privileges: Admin + MitreID: T1005 + OperatingSystem: Windows 10, Windows 11 +Full_Path: + - Path: C:\Windows\System32\wevtutil.exe + - Path: C:\Windows\SysWOW64\wevtutil.exe +Detection: + - IOC: wevtutil.exe clearing event logs (e.g., cl parameter) + - IOC: wevtutil.exe exporting logs to unexpected .evtx files + - IOC: Event ID 1 with Image: wevtutil.exe and CommandLine: *cl* + - IOC: Event ID 1 with Image: wevtutil.exe and CommandLine: *epl* and CommandLine: *Security* and CommandLine: *.evtx* + - IOC: Event ID 4688 with New Process Name: wevtutil.exe and Process Command Line: *cl* + - IOC: Event ID 4688 with New Process Name: wevtutil.exe and Process Command Line: *epl* and Process Command Line: *Security* and Process Command Line: *.evtx* + - Sigma: https://github.com/frknclk34/SigmaRule/blob/main/Suspicious%20Windows%20Event%20Log%20Manipulation%20via%20Wevtutil +Resources: + - Link: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil +Acknowledgement: + - Person: Furkan Celik + Handle: '@fkrnclk34' + - Person: Bogac Kaya + Handle: '@bogackaya' \ No newline at end of file