Detection rules › Sigma

PUA - CleanWipe Execution

Severity
high
Author
Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects the use of CleanWipe a tool usually used to delete Symantec antivirus.

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1562.001 Impair Defenses: Disable or Modify Tools

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: 1 of selection1

Image|endswith: '\SepRemovalToolNative_x64.exe'

Stage 2: 1 of selection2

CommandLine|contains: --uninstall
Image|endswith: '\CATClean.exe'

Stage 3: 1 of selection3

CommandLine|contains: -r
Image|endswith: '\NetInstaller.exe'

Stage 4: 1 of selection4

CommandLine|contains: '/enterprise'
CommandLine|contains: '/uninstall'
Image|endswith: '\WFPUnins.exe'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • --uninstall
  • -r corpus 3 (sigma 3)
  • /enterprise
  • /uninstall
Imageends_with
  • \CATClean.exe
  • \NetInstaller.exe
  • \SepRemovalToolNative_x64.exe
  • \WFPUnins.exe