
Summary
This detection rule aims to identify the loading of the Volume Shadow Copy Service (VSS) DLL, specifically 'vss_ps.dll', by atypical executable processes. The focus on uncommon executables raises alarms because 'vss_ps.dll' is primarily associated with legitimate system functions, especially in backup and recovery contexts. When processes that aren't part of standard operations attempt to load this DLL, it can indicate a malicious intent, such as evading detection mechanisms during an attack or attempting to manipulate system backups. The rule employs various filters to distinguish between legitimate usage and potential abuse: it filters out known legitimate executables located in 'C:\Windows\' or 'C:\Program Files\', while also checking command-line parameters for anomalies. This makes it effective for detecting misuse of the VSS functionality that is commonly exploited in various forms of attacks.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Image
Created: 2021-07-07