Techniques
Sample rules
IIS WebServer Log Deletion via CommandLine Utilities
- source: sigma
- technicques:
- t1070
Description
Detects attempts to delete Internet Information Services (IIS) log files via command line utilities, which is a common defense evasion technique used by attackers to cover their tracks. Threat actors often abuse vulnerabilities in web applications hosted on IIS servers to gain initial access and later delete IIS logs to evade detection.
Detection logic
condition: all of selection_*
selection_cli_del:
CommandLine|contains:
- 'del '
- 'erase '
- 'rm '
- 'remove-item '
- 'rmdir '
selection_cli_iis_dir:
CommandLine|contains: \inetpub\logs\
selection_img:
- Image|endswith:
- \cmd.exe
- \powershell_ise.exe
- \powershell.exe
- \pwsh.exe
- OriginalFileName:
- cmd.exe
- powershell.exe
- powershell_ise.exe
- pwsh.dll