
Summary
This rule is designed to detect the use of the vshadow.exe tool with the -exec parameter, which allows users to execute custom scripts or commands immediately after creating volume shadow copies. While this feature is often used for legitimate purposes such as backing up data or system administration, it can also be exploited by attackers to execute malicious commands without raising immediate suspicion. The detection is triggered when the command line of a process creation event contains the '-exec' flag and the executed image is confirmed to be vshadow.exe. False positives can occur from legitimate backup scripts or administrative actions, hence careful monitoring and context are recommended.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2025-05-26