Adversaries may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. Locations and format of logs are platform or product-specific, however standard operating system logs are captured as Windows events or Linux/macOS files such as Bash History and /var/log/*.
These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.
ID | Name | Description |
---|---|---|
G0016 | APT29 |
APT29 removed evidence of email export requests using |
S0239 | Bankshot |
Bankshot deletes all artifacts associated with the malware from the infected machine.[3] |
S0534 | Bazar |
Bazar's loader can delete scheduled tasks created by a previous instance of the malware.[4] |
S0089 | BlackEnergy |
BlackEnergy has removed the watermark associated with enabling the |
S0527 | CSPY Downloader |
CSPY Downloader has the ability to remove values it writes to the Registry.[6] |
S0568 | EVILNUM |
EVILNUM has a function called "DeleteLeftovers" to remove certain artifacts of the attack.[7] |
S0477 | Goopy |
Goopy has the ability to delete emails used for C2 once the content has been copied.[8] |
S0632 | GrimAgent |
GrimAgent can delete previously created tasks on a compromised host.[9] |
S0449 | Maze |
Maze has used the "Wow64RevertWow64FsRedirection" function following attempts to delete the shadow volumes, in order to leave the system in the same state as it was prior to redirection.[10] |
S0500 | MCMD | |
S0455 | Metamorfo |
Metamorfo has a command to delete a Registry key it uses, |
S0083 | Misdat |
Misdat is capable of deleting Registry keys used for persistence.[13] |
S0385 | njRAT |
njRAT is capable of deleting objects related to itself (registry keys, files, and firewall rules) on the victim.[14][15] |
S0229 | Orz |
Orz can overwrite Registry settings to reduce its visibility on the victim.[16] |
S0517 | Pillowmint |
Pillowmint can uninstall the malicious service from an infected machine.[17] |
S0428 | PoetRAT |
PoetRAT has the ability to overwrite scripts and delete itself if a sandbox environment is detected.[18] |
S0113 | Prikormka |
After encrypting its own log files, the log encryption module in Prikormka deletes the original, unencrypted files from the host.[19] |
S0448 | Rising Sun |
Rising Sun can clear process memory by overwriting it with junk bytes.[20] |
S0148 | RTM |
RTM has the ability to remove Registry entries that it created during execution.[21] |
S0461 | SDBbot |
SDBbot has the ability to clean up and remove data structures from a compromised host.[22] |
S0596 | ShadowPad | |
S0589 | Sibot |
Sibot will delete an associated registry key if a certain server response is received.[24] |
S0603 | Stuxnet |
Stuxnet removes itself from the system through a DLL export by deleting specific files and stored procedures.[25] |
S0559 | SUNBURST |
SUNBURST removed IFEO values to clean up traces of execution.[26] |
ID | Mitigation | Description |
---|---|---|
M1041 | Encrypt Sensitive Information |
Obfuscate/encrypt event files locally and in transit to avoid giving feedback to an adversary. |
M1029 | Remote Data Storage |
Automatically forward events to a log server or data repository to prevent conditions in which the adversary can locate and manipulate data on the local system. When possible, minimize time delay on event reporting to avoid prolonged storage on the local system. |
M1022 | Restrict File and Directory Permissions |
Protect generated event files that are stored locally with proper permissions and authentication and limit opportunities for adversaries to increase privileges by preventing Privilege Escalation opportunities. |
File system monitoring may be used to detect improper deletion or modification of indicator files. Events not stored on the file system may require different detection mechanisms.