Windows shadow copies deletion using operating systems utilities

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects attempts to delete or manipulate Volume Shadow Copies using native Windows utilities, a common technique used by ransomware and other attackers to prevent recovery.

Strategy

This rule monitors Windows event logs for command line executions of native Windows utilities that can be used to delete or manipulate Volume Shadow Copies. The detection looks for usage of utilities such as powershell.exe, pwsh.exe, wmic.exe, vssadmin.exe, or diskshadow.exe with specific command line parameters including "shadow" and "delete". Volume Shadow Copy Service (VSS) is a Windows feature that creates backup copies or snapshots of files or volumes, even when they’re in use.

Triage & Response

  • Review the full command line to understand exactly which shadow copy manipulation was attempted on {{host}}.
  • Identify the user account that executed the command and determine if they have a legitimate reason to manage shadow copies.
  • Examine process lineage to determine the parent process that initiated the shadow copy deletion command.
  • Investigate for other suspicious activities around the same timeframe, particularly file encryption operations or ransomware indicators.