Query Details
//This query detects attempts to enumerate Windows Security Logs using wevtutil //Part of T1654 - Log Collection technique let TimeFrame = 7d; DeviceProcessEvents | where ActionType contains "ProcessCreated" and FileName contains "wevtutil.exe" and ProcessCommandLine contains "enum-logs" | project DeviceName, ActionType, FileName, ProcessCommandLine, AccountDomain, AccountName, InitiatingProcessAccountUpn, InitiatingProcessCommandLine
This query is designed to identify any attempts to list or enumerate Windows Security Logs using the command-line tool "wevtutil." It focuses on detecting a specific technique known as "Log Collection" (T1654). Here's a simple breakdown of what the query does:
DeviceProcessEvents).ActionType contains "ProcessCreated").DeviceName).ActionType).FileName).ProcessCommandLine).AccountDomain, AccountName).InitiatingProcessAccountUpn, InitiatingProcessCommandLine).In summary, this query helps security analysts detect and investigate potential unauthorized attempts to access or list Windows Security Logs using the "wevtutil" tool.

Andre Zeemering
Released: November 10, 2024
Tables
Keywords
Operators