Skip to content

Commit 8ad1637

Browse files
authored
Create file_delete_detected.md
1 parent dac3cce commit 8ad1637

1 file changed

Lines changed: 32 additions & 0 deletions

File tree

file_delete_detected.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
File Delete Detected
2+
====================
3+
4+
On version 13.10 of Sysmon added the capability to log file deletions without archiving the deleted file, the event is identical to **EventID 23** File Delete, for filtering the same fields are used. The File Delete Detected uses **EventID 26**.
5+
6+
It leverages the Sysmon minidriver and we should considered it altitude number when other security products are present.
7+
8+
![minifilter](./media/image36.png)
9+
10+
The minidriver monitors for three I/O request packets (IRP) IRP_MJ_CREATE, IRP_MJ_CLEANUP, and IRP_MJ_WRITE for file creates, complete handle closes, and writes respectively.
11+
12+
13+
### Event information
14+
15+
The file delete event fields are:
16+
17+
* **RuleName**: Name of rule that triggered the event
18+
19+
* **UtcTime**: Time in UTC when event was created
20+
21+
* **ProcessGuid**: Process Guid of the process that deletec the file
22+
23+
* **ProcessId**: Process ID used by the OS to identify the process that deleted the file (child)
24+
25+
* **Image**: File path of the process that deleted the file
26+
27+
* **TargetFilename**: Name of the file that was deleted
28+
29+
**Hashes**: Full hash of the file with the algorithms in the HashType field. This is also the filename of the saved file in the ArchiveDirectory
30+
31+
This event type is recomended for those cases where there is a large number of false positive for a given rule but still it is of value to log the action or the rule has false positives for files that could be of great size like archive file or image files like ISO, IMG and others.
32+

0 commit comments

Comments
 (0)