Volume Shadow Copy Deletion via VSSAdmin or WMIC (E8-08 Backups)
E8-08 — Regular Backups
ML1
critical
experimental
Description
Detects deletion of Windows Volume Shadow Copies using vssadmin.exe, wmic.exe,
or PowerShell. This is a near-universal step in ransomware deployment — removing
VSS copies prevents recovery without paying the ransom. E8-08 (Regular Backups)
is undermined entirely if shadow copies are deleted before the backup state is
recognised as compromised.
Rule Source (Sigma YAML)
title: Volume Shadow Copy Deletion via VSSAdmin or WMIC (E8-08 Backups)
id: 5b12f946-5a70-4082-9159-583846e566c0
status: experimental
description: |
Detects deletion of Windows Volume Shadow Copies using vssadmin.exe, wmic.exe,
or PowerShell. This is a near-universal step in ransomware deployment — removing
VSS copies prevents recovery without paying the ransom. E8-08 (Regular Backups)
is undermined entirely if shadow copies are deleted before the backup state is
recognised as compromised.
references:
- https://attack.mitre.org/techniques/T1490/
- https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model
author: Roni Biju
date: 2026-03-02
modified: 2026-03-02
tags:
- e8.control.08
- e8.maturity.ml1
- attack.impact
- attack.t1490
logsource:
category: process_creation
product: windows
detection:
selection_vssadmin:
Image|endswith: '\vssadmin.exe'
CommandLine|contains|all:
- 'delete'
- 'shadows'
selection_wmic:
Image|endswith: '\wmic.exe'
CommandLine|contains|all:
- 'shadowcopy'
- 'delete'
selection_powershell:
Image|endswith:
- '\powershell.exe'
- '\pwsh.exe'
CommandLine|contains:
- 'Get-WmiObject Win32_Shadowcopy'
- 'Get-CimInstance Win32_ShadowCopy'
CommandLine|contains: 'Delete()'
selection_wbadmin:
Image|endswith: '\wbadmin.exe'
CommandLine|contains|all:
- 'delete'
- 'catalog'
condition: selection_vssadmin or selection_wmic or selection_powershell or selection_wbadmin
falsepositives:
- Disk cleanup tools that manage shadow copy storage (Disk Cleanup wizard)
- Backup software that rotates shadow copy snapshots
- Administrative scripts managing disk space
level: critical
custom:
e8_control: E8-08
e8_maturity: ML1
e8_bypass_technique: VSS deletion to prevent backup recovery (pre-ransomware)
false_positive_rate: low
tuning_notes: |
This is a critical-priority rule. Very few legitimate operations delete
ALL shadow copies. Consider automated containment (host isolation) on
this alert in environments with SOAR capability.
Correlate with high volume file rename events (.locked, .encrypted
extensions) for ransomware confirmation.
Tuning Notes
This is a critical-priority rule. Very few legitimate operations delete
ALL shadow copies. Consider automated containment (host isolation) on
this alert in environments with SOAR capability.
Correlate with high volume file rename events (.locked, .encrypted
extensions) for ransomware confirmation.