
Summary
This rule detects the execution of wbadmin.exe with specific arguments that suggest the restoration of files from backups, which could indicate malicious activity. WBAdmin is a legitimate Microsoft tool designed for backup management, but threat actors may exploit it to retrieve sensitive files or software artifacts from backups post-compromise. By monitoring for these specific execution patterns, organizations can gain insights into unauthorized attempts to restore deleted or sensitive data, which could be a sign of attackers seeking to regain access or re-establish footholds inside networks after a cleanup or encryption event. Suspicious utilization of wbadmin.exe can undermine remediation efforts, making it crucial to log and analyze such activities. Validations against legitimate administrative recovery actions are required to mitigate false positives, focusing on context and user identity.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1490
- T1565.001
Created: 2025-10-15