Detection rules › Sigma
Suspicious Volume Shadow Copy Vssapi.dll Load
Detects the image load of VSS DLL by uncommon executables
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Impact | T1490 Inhibit System Recovery |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 7 | Image loaded |
Stages and Predicates
Stage 1: selection
ImageLoaded|endswith: '\vssapi.dll'
Stage 2: not 1 of filter_main_*
or:
Image: 'C:\Windows\ImmersiveControlPanel\SystemSettings.exe'
Image: 'C:\Windows\explorer.exe'
Image: null
Image|startswith: 'C:\Program Files (x86)\'
Image|startswith: 'C:\Program Files\'
Image|startswith: 'C:\Windows\SysWOW64\'
Image|startswith: 'C:\Windows\System32\'
Image|startswith: 'C:\Windows\Temp\{'
Image|startswith: 'C:\Windows\WinSxS\'
Stage 3: not 1 of filter_optional_*
or:
Image|contains: '\avira_system_speedup.tmp'
Image|contains: '\temp\is-'
Image|startswith: 'C:\ProgramData\Package Cache\'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Image | eq |
|
Image | match |
|
Image | starts_with |
|
ImageLoaded | ends_with |
|