EXPLORE
← Back to Explore
T1070.004

File Deletion

Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint. There are tools available from the host operatin...

ESXiLinuxmacOSWindows
40
Detections
3
Sources
46
Threat Actors

BY SOURCE

15splunk_escu13sigma12elastic

PROCEDURES (17)

General Monitoring9 detections

Auto-extracted: 9 detections for general monitoring

Process Creation Monitoring8 detections

Auto-extracted: 8 detections for process creation monitoring

Event Log4 detections

Auto-extracted: 4 detections for event log

File Monitoring4 detections

Auto-extracted: 4 detections for file monitoring

Service2 detections

Auto-extracted: 2 detections for service

Ransomware2 detections

Auto-extracted: 2 detections for ransomware

Unusual1 detections

Auto-extracted: 1 detections for unusual

Evasion1 detections

Auto-extracted: 1 detections for evasion

Lateral1 detections

Auto-extracted: 1 detections for lateral

Registry1 detections

Auto-extracted: 1 detections for registry

Evasion1 detections

Auto-extracted: 1 detections for evasion

Lateral1 detections

Auto-extracted: 1 detections for lateral

Persist1 detections

Auto-extracted: 1 detections for persist

Persist1 detections

Auto-extracted: 1 detections for persist

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Authentication Monitoring1 detections

Auto-extracted: 1 detections for authentication monitoring

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

DETECTIONS (40)

ADS Zone.Identifier Deleted By Uncommon Application
sigmamedium
Backup Catalog Deleted
sigmamedium
Cisco File Deletion
sigmamedium
Clear Unallocated Sector Using Cipher App
splunk_escu
Delete Volume USN Journal with Fsutil
elasticlow
Directory Removal Via Rmdir
sigmalow
File Creation, Execution and Self-Deletion in Suspicious Directory
elastichigh
File Deleted Via Sysinternals SDelete
sigmamedium
File Deletion
sigmainformational
File Deletion Via Del
sigmalow
File Deletion via Shred
elasticmedium
Greedy File Deletion Using Del
sigmamedium
Ingress Tool Transfer Followed by Execution and Deletion Detected via Defend for Containers
elastichigh
Kubernetes Events Deleted
elasticlow
Linux Account Manipulation Of SSH Config and Keys
splunk_escu
Linux Deletion Of Cron Jobs
splunk_escu
Linux Deletion Of Init Daemon Script
splunk_escu
Linux Deletion Of Services
splunk_escu
Linux Deletion of SSL Certificate
splunk_escu
Linux High Frequency Of File Deletion In Boot Folder
splunk_escu
Linux High Frequency Of File Deletion In Etc Folder
splunk_escu
Linux Indicator Removal Service File Deletion
splunk_escu
Potential REMCOS Trojan Execution
elastichigh
Potential Secure Deletion with SDelete
sigmamedium
Potential Secure File Deletion via SDelete Utility
elasticlow
Potentially Suspicious Ping/Copy Command Combination
sigmamedium
Prefetch File Deleted
sigmahigh
Recursive Delete of Directory In Batch CMD
splunk_escu
Sdelete Application Execution
splunk_escu
SSH Authorized Keys File Deletion
elasticlow
SSL Certificate Deletion
elasticlow
Suspicious Ping/Del Command Combination
sigmahigh
Suspicious Print Spooler File Deletion
elasticmedium
System Log File Deletion
elasticmedium
TeamViewer Log File Deleted
sigmalow
WebServer Access Logs Deleted
elasticmedium
Windows Default Rdp File Deletion
splunk_escu
Windows Rdp AutomaticDestinations Deletion
splunk_escu
Windows RDP Cache File Deletion
splunk_escu
Windows RDP Server Registry Deletion
splunk_escu