
Summary
The detection rule is designed to monitor and identify potentially malicious use of the Windows command-line utility "Diskshadow.exe" when it is executed in script mode using the "/s" flag. This is particularly important when the script is sourced from directories deemed suspicious, such as system temporary folders or common application data folders. The rule employs multiple criteria to establish the context of the execution, which includes the presence of "diskshadow.exe" as the executed file, and specific command-line parameters indicating script mode usage. Furthermore, it checks the paths from which the command is invoked to ensure it does not originate from legitimate directories. Overall, this rule plays a critical role in detecting potential evasion tactics utilized by threat actors to manipulate system snapshots and extract sensitive information.
Categories
- Windows
- Endpoint
- Cloud
- Infrastructure
Data Sources
- Process
Created: 2023-09-15