Suspicious Volume Shadow Copy VSS_PS.dll Load
Detects the image load of vss_ps.dll by uncommon executables
Sigma rule (View on GitHub)
1title: Suspicious Volume Shadow Copy VSS_PS.dll Load
2id: 333cdbe8-27bb-4246-bf82-b41a0dca4b70
3related:
4 - id: 48bfd177-7cf2-412b-ad77-baf923489e82 # vsstrace.dll
5 type: similar
6 - id: 37774c23-25a1-4adb-bb6d-8bb9fd59c0f8 # vssapi.dll
7 type: similar
8status: test
9description: Detects the image load of vss_ps.dll by uncommon executables
10references:
11 - https://www.virustotal.com/gui/file/ba88ca45589fae0139a40ca27738a8fc2dfbe1be5a64a9558f4e0f52b35c5add
12 - https://twitter.com/am0nsec/status/1412232114980982787
13author: Markus Neis, @markus_neis
14date: 2021-07-07
15modified: 2024-03-28
16tags:
17 - attack.defense-evasion
18 - attack.impact
19 - attack.t1490
20logsource:
21 category: image_load
22 product: windows
23detection:
24 selection:
25 ImageLoaded|endswith: '\vss_ps.dll'
26 filter_legit:
27 Image|startswith: 'C:\Windows\'
28 Image|endswith:
29 - '\clussvc.exe'
30 - '\dismhost.exe'
31 - '\dllhost.exe'
32 - '\inetsrv\appcmd.exe'
33 - '\inetsrv\iissetup.exe'
34 - '\msiexec.exe'
35 - '\rundll32.exe'
36 - '\searchindexer.exe'
37 - '\srtasks.exe'
38 - '\svchost.exe'
39 - '\System32\SystemPropertiesAdvanced.exe'
40 - '\taskhostw.exe'
41 - '\thor.exe'
42 - '\thor64.exe'
43 - '\tiworker.exe'
44 - '\vssvc.exe'
45 - '\WmiPrvSE.exe'
46 - '\wsmprovhost.exe'
47 filter_programfiles:
48 # When using this rule in your environment replace the "Program Files" folder by the exact applications you know use this. Examples would be software such as backup solutions
49 Image|startswith:
50 - 'C:\Program Files\'
51 - 'C:\Program Files (x86)\'
52 filter_update:
53 CommandLine|startswith: 'C:\$WinREAgent\Scratch\'
54 CommandLine|contains: '\dismhost.exe {'
55 filter_image_null:
56 Image: null
57 condition: selection and not 1 of filter_*
58falsepositives:
59 - Unknown
60level: high
References
Related rules
- Suspicious Volume Shadow Copy Vssapi.dll Load
- Suspicious Volume Shadow Copy Vsstrace.dll Load
- WannaCry Ransomware Activity
- All Backups Deleted Via Wbadmin.EXE
- Audit CVE Event