heroui logo

Delete ShadowCopy With PowerShell

Splunk Security Content

View Source
Summary
This detection rule identifies instances where PowerShell is used to delete shadow copies through the WMIC PowerShell module, which can indicate malicious activity associated with ransomware, such as DarkSide. The rule specifically looks at Event Code 4104 related to PowerShell script block logging and filters for script blocks that contain the terms 'ShadowCopy', 'Delete', or 'Remove'. Deleting shadow copies is a tactic employed by ransomware to undermine data recovery efforts. By monitoring these PowerShell events, this rule helps alert cybersecurity teams to potential ransomware activities that could lead to significant data loss and disruptions in business continuity.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
ATT&CK Techniques
  • T1490
  • T1059.001
Created: 2024-11-13