heroui logo

Credential Dumping via Symlink to Shadow Copy

Splunk Security Content

View Source
Summary
This detection rule identifies potential credential dumping attempts through the creation of symbolic links to shadow copies. By analyzing data from the Endpoint.Processes data model in Splunk, it specifically looks for processes running commands that reference "mklink" in conjunction with "HarddiskVolumeShadowCopy". This method is significant as it may indicate that an attacker is manipulating or deleting shadow copies to interfere with backup recovery, which can lead to significant data loss or compromise. The rule advises analysts to scrutinize the process details, including the user, parent process, and associated artifacts to trace the attack origins more clearly.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1003.003
  • T1003
Created: 2024-12-10