T1003.003 Shadow Copies Creation Using Operating Systems Utilities
T1003.003 - Shadow Copies Creation Using Operating Systems Utilities¶
DESCRIPTION¶
Detects Shadow Copies creation using operating systems utilities, possible precursor to credential access.
Example:¶
vssadmin create shadow /for=C:
vssadmin create shadow /for=D:
Related¶
LOLBins
Mustang Panda
Reference:¶
https://github.com/SigmaHQ/sigma/blob/583f08ecaca532c7bff6e56e73c2e25c5b184796/rules/windows/process_creation/proc_creation_win_susp_shadow_copies_creation.yml
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/tutorial-for-ntds-goodness-vssadmin-wmis-ntdsdit-system/
ATT&CK TACTICS¶
T1003.003 - OS Credential Dumping: NTDS
Data Source(s): Command, Process
SENTINEL RULE QUERY¶
Triage¶
- Use the summarize statement for logs deduplication when results > 10 logs
- Verify if the activities were expected and approved, examined the Account, host, and initiating command lines.
FalsePositive¶
- Legitimate administrator working with shadow copies, access for backup purposes
VERSION¶
Version 1.0 (date: 20/03/2024)