
Summary
The 'Windows Diskshadow Proxy Execution' detection rule identifies the execution of DiskShadow.exe in scripting mode, which can be abused to run arbitrary, unsigned code on Windows environments. This analytic utilizes data from Endpoint Detection and Response (EDR) agents—specifically Sysmon and Windows Event Logs—to capture command-line executions involving the DiskShadow process. While DiskShadow is primarily used for legitimate backup purposes, unauthorized usage can signal potential security breaches through the execution of malicious scripts. The detection relies on command-line argument scrutiny, particularly identifying the use of '-s' or '/s' flags that indicate scripting utilization. Given the nature of this activity, it is crucial for security teams to investigate such instances thoroughly, as they may facilitate unauthorized code execution that compromises system integrity. Importantly, the rule supports filtering to minimize false positives, especially from administrators who legitimately employ DiskShadow scripts for backup operations.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- File
- Process
- Scheduled Job
ATT&CK Techniques
- T1218
Created: 2024-11-13