← Back to Explore
sigmainformationalHunting
VSSAudit Security Event Source Registration
Detects the registration of the security event source VSSAudit. It would usually trigger when volume shadow copy operations happen.
Detection Query
selection:
AuditSourceName: VSSAudit
EventID:
- 4904
- 4905
condition: selection
Author
Roberto Rodriguez @Cyb3rWard0g, Open Threat Research (OTR)
Created
2020-10-20
Data Sources
windowssecurity
Platforms
windows
Tags
attack.credential-accessattack.t1003.002
Raw Content
title: VSSAudit Security Event Source Registration
id: e9faba72-4974-4ab2-a4c5-46e25ad59e9b
status: test
description: Detects the registration of the security event source VSSAudit. It would usually trigger when volume shadow copy operations happen.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003.002/T1003.002.md#atomic-test-3---esentutlexe-sam-copy
author: Roberto Rodriguez @Cyb3rWard0g, Open Threat Research (OTR)
date: 2020-10-20
modified: 2022-04-28
tags:
- attack.credential-access
- attack.t1003.002
logsource:
product: windows
service: security
detection:
selection:
AuditSourceName: VSSAudit
EventID:
- 4904
- 4905
condition: selection
falsepositives:
- Legitimate use of VSSVC. Maybe backup operations. It would usually be done by C:\Windows\System32\VSSVC.exe.
level: informational