Symbolic Link Creation to Shadow Copies for Credential Access
Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.
This rule identifies the creation of symbolic links to shadow copies on Windows systems. Attackers use this technique to gain access to sensitive files stored within shadow copies, including the ntds.dit file (containing password hashes), system boot keys, and browser offline credentials. This approach allows them to bypass normal file access controls and extract credentials for lateral movement or privilege escalation. The detection rule is designed to ingest data from various sources, including Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs, providing broad coverage across different endpoint security solutions. The activity is typically initiated by command-line tools like cmd.exe or powershell.exe, making detection through process monitoring feasible. This technique is particularly relevant as it targets credential dumping, a critical stage in many attack campaigns.
Attack Chain
- An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.
- The attacker elevates privileges to gain administrative rights, which are required to create shadow copies and symbolic links.
- The attacker creates a volume shadow copy using
vssadmin.exeor similar tools. - The attacker uses
mklinkcommand or PowerShellNew-Item -ItemType SymbolicLinkto create a symbolic link to the shadow copy path. - The symbolic link points to a directory within the shadow copy containing sensitive files like
ntds.ditor browser credential stores. - The attacker copies the targeted sensitive files (e.g.,
ntds.dit) from the shadow copy using the symbolic link. - The attacker removes the shadow copy to cover their tracks, although the symbolic link creation remains as evidence.
- The attacker extracts credentials from the copied
ntds.ditfile offline for use in lateral movement or further attacks.
Impact
Successful exploitation allows attackers to gain unauthorized access to sensitive credentials stored on the compromised system. This can lead to lateral movement within the network, privilege escalation, and ultimately, the compromise of critical assets. If the ntds.dit file is accessed, the entire Active Directory domain could be at risk, potentially affecting thousands of users and systems. This type of attack is particularly damaging as it allows attackers to operate undetected for extended periods while they harvest credentials.
Recommendation
- Deploy the provided Sigma rule “Symbolic Link to Shadow Copy Created via Cmd” to detect the creation of symbolic links to shadow copies via
cmd.exe(rules). - Deploy the provided Sigma rule “Symbolic Link to Shadow Copy Created via PowerShell” to detect the creation of symbolic links to shadow copies via
powershell.exe(rules). - Enable Sysmon Event ID 1 (Process Creation) logging to provide necessary data for the Sigma rules to function correctly (setup).
- Review the “Investigating Symbolic Link to Shadow Copy Created” section in the rule’s notes for triage and analysis steps when the rule triggers.
- Monitor for the usage of
mklinkcommand with theHarddiskVolumeShadowCopyargument in process command lines.
Detection coverage 2
Symbolic Link to Shadow Copy Created via Cmd
mediumDetects the creation of symbolic links to shadow copies using the mklink command via cmd.exe, often used to access sensitive files for credential dumping.
Symbolic Link to Shadow Copy Created via PowerShell
mediumDetects the creation of symbolic links to shadow copies using PowerShell, often used to access sensitive files for credential dumping.
Detection queries are kept inside the platform. Get full rules →