Suspicious Volume Shadow Copy VSS_PS.dll Load

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the image load of vss_ps.dll by uncommon executables. This DLL is used by the Volume Shadow Copy Service (VSS) to manage shadow copies of files and volumes. It is often abused by attackers to delete or manipulate shadow copies, which can hinder forensic investigations and data recovery efforts. The fact that it is loaded by processes that are not typically associated with VSS operations can indicate suspicious activity.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "sa_imageloaded" AND OBJECTNAME endswith "\vss_ps.dll" AND ((PROCESSNAME notstartswith "C:\Windows" OR PROCESSNAME notendswith "\clussvc.exe,\dismhost.exe,\dllhost.exe,\inetsrv\appcmd.exe,\inetsrv\iissetup.exe,\msiexec.exe,\rundll32.exe,\searchindexer.exe,\srtasks.exe,\svchost.exe,\System32\SystemPropertiesAdvanced.exe,\taskhostw.exe,\thor.exe,\thor64.exe,\tiworker.exe,\vssvc.exe,\vssadmin.exe,\WmiPrvSE.exe,\wsmprovhost.exe") AND (COMMANDLINE notstartswith "C:\$WinREAgent\Scratch" OR COMMANDLINE notcontains "\dismhost.exe {") AND isExist(PROCESSNAME)) AND PROCESSNAME notstartswith "C:\Program Files\,C:\Program Files (x86)" select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PRODUCT_NAME,Action1.OBJECTNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Markus Neis, @markus_neis