
Summary
This detection rule targets the deletion of Windows Shadow Copies through various operating system utilities, which can indicate malicious activities such as ransomware trying to eliminate recoverable backups. The rule highlights specific processes that are commonly involved in this type of deletion, including 'powershell.exe', 'wmic.exe', 'vssadmin.exe', and 'diskshadow.exe'. It defines multiple detection criteria based on the execution of these images or command-line arguments associated with specific operations (e.g., 'shadow delete', 'wbadmin delete catalog quiet', or 'vssadmin resize shadowstorage'). True positives may suggest ransomware activity, whereas false positives may arise from legitimate administrative actions. The detection is crucial for identifying attempts to evade detection by removing backup copies. This rule showcases a high level of risk and integrates several references related to threat actors and methodologies employed in ransomware attacks.
Categories
- Windows
Data Sources
- Process
Created: 2019-10-22