Detect Attempts to Delete Shadow Copies CM0097
Detect Attempts to Delete Shadow Copies (CM0097)
In PlaybookDetails
- ID: CM0097
- Version: 1.0
- Created: 14 March 2025
- Modified: 14 March 2025
- Type: Examine
- Status: Active
Intended Outcome
Detecting the deletion of shadow copies will alert defenders to an adversary attempting to destroy volume backups.Introduction
Shadow copies are a form of Windows data backup. Ransomware actors commonly attempt to delete shadow copies before deploying ransomware to inhibit system recovery and make victim data inaccessible until a ransom is paid. This is typically accomplished using native Windows binaries (Vssadmin.exe, PowerShell.exe, and WMIC.exe).Preparation
- Ensure systems are frequently performing backups. Backups should be securely stored on a separate device that is inaccessible from the network.
- Ensure comprehensive endpoint protection and response. Logs should be aggregated and processed in a centralized location to enable analysis and response efforts.
Risks
- No Risks content identified.
Guidance
- Monitor endpoint protection and event logs for process creation `Event ID 4688`
- Vssadmin.exe
- Monitor endpoints for the following command line parameters:
- Vssadmin.exe `Delete Shadows`
- Vssadmin.exe `resize shadowstorage`
- Wmic.exe `shadowcopy delete`
- PowerShell.exe `win32_shadowcopy`
- `delete shadows`
- `list shadows`
References
- Volume Shadow Copy Service | https://learn.microsoft.com/en-us/windows-server/storage/file-server/volume-shadow-copy-service
- How Can I Protect Against Ransomware? | https://www.cisa.gov/stopransomware/how-can-i-protect-against-ransomware
- CAR-2021-01-009: Detecting Shadow Copy Deletion or Resize | https://car.mitre.org/analytics/CAR-2021-01-009/
- Its All Fun and Games Until Ransomware Deletes the Shadow Copies | https://redcanary.com/blog/threat-detection/its-all-fun-and-games-until-ransomware-deletes-the-shadow-copies/
- ID: CM0097
- Version: 1.0
- Created: 13 March 2025
- Modified: 13 March 2025
- Type: Examine