
Summary
This detection rule identifies the deletion of Windows Volume Shadow Copies through the use of PowerShell scripts leveraging WMI (Windows Management Instrumentation). Volume Shadow Copies are critical for system recovery and are often targeted by ransomware, such as Sodinokibi/REvil, to prevent victims from restoring systems to a previous state. The detection strategy involves monitoring execution of specific PowerShell commands that interact with Volume Shadow Copies. Key actions monitored include retrieving instances of shadow copies, and any command invoking deletion methods such as `Remove-WmiObject` or `Remove-CimInstance`. This detection aims to capture malicious behaviors indicative of ransomware activities that seek to disrupt data recovery options during an attack.
Categories
- Windows
- Endpoint
Data Sources
- Script
- WMI
- Process
ATT&CK Techniques
- T1490
Created: 2022-09-20