
Summary
This detection rule identifies attempts by adversaries to inhibit system recovery features on Windows systems, a common tactic during ransomware attacks to prevent recovery of infected systems. The rule looks for specific internal commands that can disable or delete key recovery features like Volume Shadow Copies, backup catalogs, and system repair options. Notable processes being monitored include 'vssadmin', 'wmic', 'bcdedit', and 'wbadmin', which play pivotal roles in managing system backups and recovery. The logic combines various regular expression matches to identify commands that indicate malicious intention based on common patterns used by known ransomware groups like Babuk and Conti. The alerts generated can help security teams take timely actions to mitigate the potential impact of a ransomware infection.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1490
Created: 2024-02-09