File Recovery From Backup Via Wbadmin.EXE

Detects the recovery of files from backups via "wbadmin.exe". Attackers can restore sensitive files such as NTDS.DIT or Registry Hives from backups in order to potentially extract credentials.

Sigma rule (View on GitHub)

 1title: File Recovery From Backup Via Wbadmin.EXE
 2id: 6fe4aa1e-0531-4510-8be2-782154b73b48
 3related:
 4    - id: 84972c80-251c-4c3a-9079-4f00aad93938
 5      type: derived
 6status: experimental
 7description: |
 8    Detects the recovery of files from backups via "wbadmin.exe".
 9    Attackers can restore sensitive files such as NTDS.DIT or Registry Hives from backups in order to potentially extract credentials.    
10references:
11    - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/wbadmin-start-recovery
12    - https://lolbas-project.github.io/lolbas/Binaries/Wbadmin/
13author: Nasreddine Bencherchali (Nextron Systems), frack113
14date: 2024-05-10
15tags:
16    - attack.impact
17    - attack.t1490
18logsource:
19    category: process_creation
20    product: windows
21detection:
22    selection_img:
23        - Image|endswith: '\wbadmin.exe'
24        - OriginalFileName: 'WBADMIN.EXE'
25    selection_cli:
26        CommandLine|contains|all:
27            - ' recovery'
28            - 'recoveryTarget'
29            - 'itemtype:File'
30    condition: all of selection_*
31falsepositives:
32    - Unknown
33level: medium

References

Related rules

to-top