heroui logo

Deletion of Volume Shadow Copies via WMI with PowerShell

Sigma Rules

View Source
Summary
This detection rule aims to identify malicious activities associated with the deletion of Windows Volume Shadow Copies, commonly executed via PowerShell commands that utilize Windows Management Instrumentation (WMI). Volume Shadow Copies serve as backup snapshots, making them a target for ransomware attacks seeking to erase recovery options. The rule is built to trigger on command line invocations that include specific PowerShell commands, such as `Get-WmiObject`, `Get-CimInstance`, and methods associated with the `Win32_ShadowCopy` class, particularly looking for indicators that suggest an attempt to delete these copies using commands like `.Delete()` or `Remove-WmiObject`. Given that various ransomware families, such as Sodinokibi/REvil, employ this tactic, the rule is crucial for early threat detection and response.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Process
ATT&CK Techniques
  • T1490
Created: 2022-09-20