ATT&CK coverage › Technique

Inhibit System Recovery T1490

Adversaries may delete or remove built-in data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery. This may deny access to available backups and recovery options.

Events covered

10 catalog events are tagged with this technique by at least one rule.

ProviderEvent IDTitle
Sysmon1Process creation
Sysmon7Image loaded
Sysmon13RegistryEvent (Value Set)
Sysmon23FileDelete (File Delete archived)
Sysmon26FileDeleteDetected (File Delete logged)
Security-Auditing4688A new process has been created.
Defender-DeviceProcessEvents9001000Process activity (any)
PowerShell4104Creating Scriptblock text (MessageNumber of MessageTotal).
PowerShell400
Service-Control-Manager7036The Microsoft Software Shadow Copy Provider service entered the stopped state.

Authoring guide

Patterns shared across the 26 rules above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.

Fields filtered most (19 distinct)

The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.

FieldRulesHowSample values
CommandLine13match 12, starts_with 1, eq 1keepVersions:0, backup, \\\\\?\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy, D2E7041B-2927-42fb-8E9F-7CE93B6DC937, E9495B87-D950-4AB5-87A5-FF6D70BF3E90
Image10ends_with 8, is_null 3, starts_with 3, eq 2, match 2\wbadmin.exe, \pwsh.exe, C:\Program Files\, \rundll32.exe, \regsvr32.exe
OriginalFileName6eq 6WBADMIN.EXE, bcdedit.exe, PowerShell.EXE, VSSADMIN.EXE, pwsh.dll
IntegrityLevel3eq 3High
InitiatingProcessFileName3eq 3changepk.exe, dllhost.exe, wsreset.exe
Details3eq 3, is_not_null 1Binary Data, DWORD (0x00000001), "0x00000001"
ImageLoaded3ends_with 3\vsstrace.dll, \vss_ps.dll, \vssapi.dll
ScriptBlockText2match 1, eq 1rcim, Remove-CimInstance, Remove-WmiObject, "*Delete*", "*Remove*"
TargetObject2match 2, ends_with 2\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates\, \SOFTWARE\Microsoft\EnterpriseCertificates\CA\Certificates\, \SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\, DisableSR, \Policies\Microsoft\Windows NT\SystemRestore
EventID2eq 24104, 7036
display_name2in 1, match 1"ImmunetSelfProtectDriver", "CiscoAMPHeurDriver", "ImmunetProtectDriver", "(?i)(Volume Shadow...
ParentImage1eq 1slui.exe
TargetFilename1ends_with 1.VHD, .win, .bkf
Data1match 1Delete(), Remove-WmiObject, Get-WmiObject
registry_path1eq 1"*\\SOFTWARE\\Policies\\Microsoft\\Windows..., "*\\SOFTWARE\\Policies\\Microsoft\\Windows..., "*\\SOFTWARE\\Microsoft\\Windows...

Top indicator values (166 distinct)

Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.

FieldKindValueRules (here)Corpus reach
OriginalFileNameeqWBADMIN.EXE46
Imageends_with\wbadmin.exe46
IntegrityLeveleqHigh316
Imagestarts_withC:\Program Files (x86)\314
Imagestarts_withC:\Program Files\315
CommandLinematchdelete27
CommandLinematchbackup24
CommandLinematchkeepVersions:022
Imageends_with\powershell.exe2143
Imageends_with\rundll32.exe276
Imageends_with\pwsh.exe2140
CommandLinematch\\\\\?\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy22
ImageeqC:\Windows\ImmersiveControlPanel\SystemSettings.exe24
Imagestarts_withC:\Windows\SysWOW64\216
Imagematch\temp\is-22
Imagematch\avira_system_speedup.tmp22
Imagestarts_withC:\Windows\WinSxS\213
Imagestarts_withC:\Windows\Temp\{22
ImageeqC:\Windows\explorer.exe29
Imagestarts_withC:\Windows\System32\216

Rules under this technique

Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.

Sigma 17 rules

Splunk 5 rules

Kusto Query Language 4 rules