Detections
- Home
- - Detections
- -DT003
- ID: DT003
- Created: 25th May 2024
- Updated: 25th May 2024
- Platform: Windows
- Contributor: The ITM Team
Windows File Deleted, Event Logs
Windows Event Log ID 4660 “An object was deleted” is generated when an object was deleted, such as a file system, kernel, or registry object. This Event is not enabled by default, and requires “Delete” auditing to be enabled in the object’s System Access Control List (SACL). This event doesn’t contain the name of the deleted object, so investigators must also utilize Event ID 4663.
Windows Event Log ID 4663 “An attempt was made to access an object” can be used in combination with Event ID 4660 to track object deletion. This Event is not enabled by default, and requires “Delete” auditing to be enabled in the object’s System Access Control List (SACL).
This may represent an anti-forensics technique if there is no reasonable explanation for why the objected was deleted from the system.
Sections
ID | Name | Description |
---|---|---|
AF002 | Clear Operating System Logs | A subject clears operating system logs to hide evidence of their activities. |
AF002.001 | Clear Windows Event Logs | A subject clears Windows Event logs to conceal evidence of their activities. Windows Event Logs store various types of information, such as system errors, application events, security auditing messages, and other operational events. The logs are stored in Windows Event Logs can be cleared using the Event Viewer utility, provided the user account has administrative privileges. |