heroui logo

Sensitive File Access Via Volume Shadow Copy Backup

Sigma Rules

View Source
Summary
This detection rule targets potentially malicious access to sensitive files through Volume Shadow Copy, specifically searching for commands that attempt to retrieve critical system files such as the Security, SAM registry hives, and the Active Directory database (ntds.dit). The rule utilizes process creation logs from Windows to capture such activities by monitoring the command line arguments used by processes. If a command line contains a reference to the Volume Shadow Copy or any of the specified sensitive files, it flags the event for further analysis. Given the nature of these files, access attempts can often indicate an ongoing attack or post-exploitation activities aimed at gaining further control or extracting credentials from a compromised system. This rule is particularly relevant for environments where Windows servers are deployed, as they commonly store sensitive user and authentication information.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2021-08-09