Skip to content

Hide Navigation Hide TOC

Deletion of Volume Shadow Copies via WMI with PowerShell (21ff4ca9-f13a-41ad-b828-0077b2af2e40)

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

Cluster A Galaxy A Cluster B Galaxy B Level
Inhibit System Recovery - T1490 (f5d8eed6-48a9-4cdf-a3d7-d1ffa99c3d2a) Attack Pattern Deletion of Volume Shadow Copies via WMI with PowerShell (21ff4ca9-f13a-41ad-b828-0077b2af2e40) Sigma-Rules 1