Creation Of Shadow Copy

Description

Monitor for signs that Ntdsutil, Vssadmin, or Wmic has been used to create a shadow copy.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection

Category

Adversary Tactics,

Alert Volume

Monitor for signs that Ntdsutil, Vssadmin, or Wmic has been used to create a shadow copy.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Credential Access

MITRE ATT&CK Techniques

OS Credential Dumping

NTDS

MITRE Threat Groups

Chimera
Dragonfly 2.0
FIN6
Wizard Spider

Kill Chain Phases

Actions On Objectives

Data Sources

Endpoint Detection and Response

   Help

Creation Of Shadow Copy Help

You must be ingesting endpoint data that tracks process activity, including parent-child relationships from your endpoints, to populate the Endpoint data model in the Processes node. The command-line arguments are mapped to the "process" field in the Endpoint data model.

   Search

Open in Search