
Summary
This analytic rule is designed to detect the creation of Windows shadow copies, an activity that can indicate malicious attempts to manipulate data for nefarious purposes, such as ransomware attacks or data exfiltration. It leverages telemetry from Endpoint Detection and Response (EDR) agents, capturing significant logs from systems where shadow copy creation may occur. Specifically, it focuses on process execution logs for the use of tools like Vssadmin and Wmic, examining command-line activity to identify when these tools are used to create shadow copies. By correlating this data, the rule aims to flag potential threats and assist security analysts in recognizing suspicious behavior that may lead to data breaches or persistent intrusions. Given the context, monitoring for this activity is critical, as attackers often utilize shadow copies to circumvent traditional protection mechanisms and gain access to sensitive information. Therefore, understanding the underlying processes and system interactions is crucial for maintaining system integrity and security.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1003.003
- T1003
Created: 2024-12-10