Event ID 4660 — An object was deleted.
Description
An object was deleted.
Message #
Fields #
| Name | Description |
|---|---|
Security_ID | [Subject] Security ID. |
Account_Name | [Subject] Account Name. |
Account_Domain | [Subject] Account Domain. |
Logon_ID | [Subject] Logon ID. |
Object_Server | [Object] Object Server. |
Handle_ID | [Object] Handle ID. |
Process_ID | [Process Information] Process ID. |
Process_Name | [Process Information] Process Name. |
Transaction_ID | [Process Information] Transaction ID. |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Auditing",
"guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
"event_source_name": "",
"event_id": 4660,
"version": 0,
"level": 0,
"task": 12804,
"opcode": 0,
"keywords": 9232379236109516800,
"time_created": "2022-01-24T17:03:25.009874Z",
"event_record_id": 1934527,
"correlation": {},
"execution": {
"process_id": 4,
"thread_id": 4488
},
"channel": "Security",
"computer": "fs03vuln.offsec.lan",
"security": {
"user_id": ""
}
},
"event_data": {
"SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
"SubjectUserName": "admmig",
"SubjectDomainName": "OFFSEC",
"SubjectLogonId": "0x14f509e2",
"ObjectServer": "Security Account Manager",
"HandleId": "0xe9a9292e70",
"ProcessId": "0x1e0",
"ProcessName": "C:\\Windows\\System32\\lsass.exe",
"TransactionId": "00000000-0000-0000-0000-000000000000"
}
}
Detection Patterns #
Uac Bypass
Defender-DeviceRegistryEvents Event ID 9005000: Registry activity→Event ID 9005002: Registry key deleted→Event ID 9005003: Registry value set→Event ID 9005004: Registry value deleted→Security-Auditing Event ID 4657: A registry value was modified.→Event ID 4660: An object was deleted.→Event ID 4663: An attempt was made to access an object.→Sysmon Event ID 12: RegistryEvent→Event ID 13: RegistryEvent→Event ID 14: RegistryEvent
5 rules
Kusto Query Language
Community Notes #
Could be a filesystem, kernel, or registry object. Does not track names, but is generated only during real deletes (pair with 4663).
References #
- Microsoft Learn https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4660
- Microsoft Learn Audit Policy https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-file-system
- Ultimate Windows Security https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4660
- Example event sourced from https://github.com/Yamato-Security/hayabusa-sample-evtx