File Deletion
https://attack.mitre.org/techniques/T1070/004/
Last updated
Was this helpful?
https://attack.mitre.org/techniques/T1070/004/
Last updated
Was this helpful?
ATT&CK ID:
Description
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.
[]
Monitor executed commands and arguments for actions that could be utilized to unlink, rename, or delete files.
Monitor for unexpected deletion of files from the system
URL:
del:
Remove-Item: