Skip to content

Hide Navigation Hide TOC

Potentially Suspicious EventLog Recon Activity Using Log Query Utilities (beaa66d6-aa1b-4e3c-80f5-e0145369bfaf)

Detects execution of different log query utilities and commands to search and dump the content of specific event logs or look for specific event IDs. This technique is used by threat actors in order to extract sensitive information from events logs such as usernames, IP addresses, hostnames, etc.

Cluster A Galaxy A Cluster B Galaxy B Level
Unsecured Credentials - T1552 (435dfb86-2697-4867-85b5-2fef496c0517) Attack Pattern Potentially Suspicious EventLog Recon Activity Using Log Query Utilities (beaa66d6-aa1b-4e3c-80f5-e0145369bfaf) Sigma-Rules 1