Microsoft-Windows-Sysmon › Event 26

Event ID 26 — FileDeleteDetected (File Delete logged)

Provider
Microsoft-Windows-Sysmon
Channel
Operational
Level
Informational
Collection Priority
Recommended (JSCU-NL)
Task
File Delete logged (rule: FileDeleteDetected)
Opcode
Info

Description

A file was deleted.

Message #

File Delete logged:
RuleName: %1
UtcTime: %2
ProcessGuid: %3
ProcessId: %4
User: %5
Image: %6
TargetFilename: %7
Hashes: %8
IsExecutable: %9

Fields #

NameDescription
RuleName UnicodeString → stringCustom tag mapped to event, i.e. ATT&CK technique ID
UtcTime UnicodeString → stringTime in UTC when event was created
ProcessGuid GUID → GUIDProcess GUID of the process that deleted the file
ProcessId UInt32 → PIDProcess ID used by the OS to identify the process that deleted the file
User UnicodeString → stringName of the account who deleted the file.
Image UnicodeString → stringFile path of the process that deleted the file
TargetFilename UnicodeString → stringFull path name of the deleted file
Hashes UnicodeString → stringHashes captured by the Sysmon driver of the deleted file
IsExecutable Boolean → booleanWhether the deleted file is a PE executable

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Sysmon",
    "guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9",
    "event_source_name": "",
    "event_id": 26,
    "version": 5,
    "level": 4,
    "task": 26,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2023-11-06T02:04:29.353937+00:00",
    "event_record_id": 1441136,
    "correlation": {},
    "execution": {
      "process_id": 7064,
      "thread_id": 9788
    },
    "channel": "Microsoft-Windows-Sysmon/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-18"
    }
  },
  "event_data": {
    "RuleName": "-",
    "UtcTime": "2023-11-06 02:04:29.346",
    "ProcessGuid": "E56ADA26-3974-6548-1E08-000000000D00",
    "ProcessId": 18984,
    "User": "NT AUTHORITY\\SYSTEM",
    "Image": "C:\\Program Files\\Malwarebytes\\Anti-Malware\\MBAMService.exe",
    "TargetFilename": "C:\\ProgramData\\Malwarebytes\\MBAMService\\config\\MbamClientConfig.json",
    "Hashes": "SHA1=313DF92678806809A0DA4150870A71DEEEC67790,MD5=48523B42CDEEC91FF7020302F0EF58D5,SHA256=54A882E183B3882F54222737ED16BA98E06D91C30DECD478BF9C0EDBE6728BFB,IMPHASH=00000000000000000000000000000000",
    "IsExecutable": false
  },
  "message": ""
}

Detection Patterns #

15 rules

Sigma

Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Tim Rauch (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Show 6 more (9 total)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Nasreddine Bencherchali (Nextron Systems)

Splunk

Teoderick Contreras, Splunk
Teoderick Contreras, Splunk
Show 3 more (6 total)
Teoderick Contreras, Splunk, Steven Dick
Teoderick Contreras, Splunk, Steven Dick
14 rules

Sigma

Tim Rauch (Nextron Systems), Elastic (idea)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Show 8 more (11 total)
Tim Rauch (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Nasreddine Bencherchali (Nextron Systems)

Splunk

Teoderick Contreras, Splunk
Teoderick Contreras, Splunk

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Splunk # view in reference

  • Windows Rdp AutomaticDestinations Deletion source: This detection identifies the deletion of files within the AutomaticDestinations folder, located under a user’s AppData\Roaming\Microsoft\Windows\Recent directory. These files are part of the Windows Jump List feature, which records recently accessed files and folders tied to specific applications. Each .automaticDestinations-ms file corresponds to a program (e.g., Explorer, Word, Notepad) and can be valuable for forensic analysis of user activity. Adversaries may target this folder to erase evidence of their actions, such as which documents or directories were accessed during a session. This type of deletion is rarely seen during normal user activity and may indicate deliberate anti-forensic behavior. When correlated with suspicious logon events, RDP usage, or script execution, this activity may represent an attempt to cover tracks after data access, lateral movement, or staging for exfiltration. Detecting removal of these artifacts can highlight post-compromise cleanup efforts and help analysts reconstruct attacker behavior.↳ also matches:Event ID 23: FileDelete (File Delete archived)

References #