Windows Backup Deletion via Wbadmin
Adversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.
Attackers, including ransomware groups, often attempt to remove or impair an organization’s ability to recover from an attack. One method to achieve this is by deleting Windows backup catalogs and system state backups using the wbadmin.exe utility. Windows Server Backup stores details about backups (what volumes are backed up and where the backups are located) in a backup catalog. Removing these catalogs renders backups unusable for recovery, increasing the impact of the attack. This technique is frequently observed in ransomware playbooks and other destructive attacks targeting Windows environments. This activity can be detected using endpoint detection and response (EDR) solutions, Windows Security Event Logs, and Sysmon.
Attack Chain
- The attacker gains initial access to the system via phishing, exploiting a vulnerability, or using compromised credentials.
- The attacker escalates privileges to administrator level to execute wbadmin.exe.
- The attacker executes
wbadmin.exewith thedelete catalogcommand to remove backup catalogs. - The attacker executes
wbadmin.exewith thedelete systemstatebackupcommand to remove system state backups. - The attacker may also delete shadow copies using
vssadmin.exeorwmic.exeto further hinder recovery. - The attacker deploys ransomware or initiates other destructive actions.
- The attacker encrypts or destroys data on the system and connected network shares.
- The attacker demands a ransom payment for data recovery, which is complicated by the deleted backups.
Impact
Successful deletion of backup catalogs and system state backups significantly impairs an organization’s ability to recover from a ransomware attack or other destructive event. This can lead to prolonged downtime, data loss, and financial losses associated with incident response and recovery efforts. While the number of direct victims of this specific technique is difficult to quantify, the impact is typically observed in conjunction with broader ransomware campaigns affecting organizations across various sectors.
Recommendation
- Enable Sysmon process creation logging with Event ID 1 to capture
wbadmin.exeexecutions and activate the first Sigma rule. - Deploy the Sigma rules in this brief to your SIEM and tune for your environment.
- Monitor Windows Security Event Logs for process creation events related to
wbadmin.exe. - Investigate any instances of
wbadmin.exeexecuting withdeletearguments. - Review and harden account access controls to prevent unauthorized use of
wbadmin.exe.
Detection coverage 2
Wbadmin Backup Catalog Deletion
highDetects the execution of wbadmin.exe to delete backup catalogs, a common tactic used by ransomware.
Wbadmin System State Backup Deletion
highDetects the execution of wbadmin.exe to delete system state backups, a tactic used to inhibit system recovery.
Detection queries are kept inside the platform. Get full rules →