File Recovery From Backup Via Wbadmin.EXE
Detects the recovery of files from backups via "wbadmin.exe". Attackers can restore sensitive files such as NTDS.DIT or Registry Hives from backups in order to potentially extract credentials.
Sigma rule (View on GitHub)
1title: File Recovery From Backup Via Wbadmin.EXE
2id: 6fe4aa1e-0531-4510-8be2-782154b73b48
3related:
4 - id: 84972c80-251c-4c3a-9079-4f00aad93938
5 type: derived
6status: test
7description: |
8 Detects the recovery of files from backups via "wbadmin.exe".
9 Attackers can restore sensitive files such as NTDS.DIT or Registry Hives from backups in order to potentially extract credentials.
10references:
11 - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/wbadmin-start-recovery
12 - https://lolbas-project.github.io/lolbas/Binaries/Wbadmin/
13author: Nasreddine Bencherchali (Nextron Systems), frack113
14date: 2024-05-10
15tags:
16 - attack.impact
17 - attack.t1490
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection_img:
23 - Image|endswith: '\wbadmin.exe'
24 - OriginalFileName: 'WBADMIN.EXE'
25 selection_cli:
26 CommandLine|contains|all:
27 - ' recovery'
28 - 'recoveryTarget'
29 - 'itemtype:File'
30 condition: all of selection_*
31falsepositives:
32 - Unknown
33level: medium
References
Related rules
- New File Exclusion Added To Time Machine Via Tmutil - MacOS
- Time Machine Backup Deletion Attempt Via Tmutil - MacOS
- Time Machine Backup Disabled Via Tmutil - MacOS
- Backup Files Deleted
- Potentially Suspicious Volume Shadow Copy Vsstrace.dll Load