Volume Shadow Copy Deletion via WMIC
The rule detects the use of wmic.exe for shadow copy deletion on Windows endpoints, a common tactic used in ransomware or other destructive attacks to inhibit system recovery.
This detection identifies the use of wmic.exe to delete volume shadow copies on Windows endpoints. Adversaries, especially ransomware operators, often perform this action to hinder system recovery efforts. The detection logic focuses on monitoring process creations where wmic.exe is used with arguments indicating shadow copy deletion. This activity is typically observed in conjunction with other malicious actions, such as disabling security tools, encrypting files, or exfiltrating sensitive data. The rule aims to provide early warning of potential ransomware attacks or destructive activities within the monitored environment. The rule is designed to work with data from Elastic Defend, Crowdstrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.
Attack Chain
- An attacker gains initial access to a Windows endpoint, possibly through phishing or exploiting a vulnerability.
- The attacker executes
wmic.exewith the argumentshadowcopy deleteto remove volume shadow copies. - The command targets all shadow copies or specific snapshots. The full command line may contain filters such as
ID=orVolumeName=. - This deletion inhibits system recovery by removing restore points that could be used to revert to a previous state.
- After deleting shadow copies, the attacker may disable or tamper with backup systems to further impede recovery efforts.
- The attacker then deploys ransomware or other destructive payloads to encrypt or damage data on the system.
- Data exfiltration may occur prior to encryption to further extort the victim.
- The final impact is data loss, system unavailability, and potential financial loss for the victim organization.
Impact
Successful deletion of volume shadow copies significantly impairs an organization’s ability to recover from ransomware attacks or other destructive events. Without shadow copies, restoring systems to a clean state becomes much more difficult, potentially leading to extended downtime, data loss, and increased recovery costs. Organizations across various sectors are at risk, particularly those with valuable data and critical systems. The widespread use of ransomware makes this a prevalent and high-impact attack vector.
Recommendation
- Deploy the Sigma rule “Detect WMIC Shadow Copy Deletion” to your SIEM and tune for your environment to detect suspicious uses of
wmic.exe. - Enable Sysmon process creation logging (Event ID 1) to enhance visibility of command-line arguments.
- Investigate any alerts generated by the Sigma rule, focusing on the command-line arguments used with
wmic.exeand the parent processes. - Restrict access to
wmic.exeand VSS-management functionalities on sensitive hosts to prevent unauthorized modifications. - Monitor for related activity, such as the use of
vssadmin.exe,wbadmin.exe,bcdedit.exe,REAgentC.exe, anddiskshadow.exe, as ransomware often combines these tools. - Correlate the “Detect WMIC Shadow Copy Deletion” rule with the investigation guides to improve triage and response efficiency.
Detection coverage 3
Detect WMIC Shadow Copy Deletion
highDetects the use of wmic.exe to delete shadow copies, a common tactic used by ransomware.
Detect Renamed WMIC Shadow Copy Deletion
highDetects renamed executable being used to delete shadow copies.
Detect WMIC Shadow Copy Deletion with Specific Filters
mediumDetects the use of wmic.exe to delete shadow copies with specific filters in command line.
Detection queries are available on the platform. Get full rules →