title: Shadow Copies Access via Symlink id: 40b19fa6-d835-400c-b301-41f3a2baacaf description: Shadow Copies storage symbolic link creation using operating systems utilities author: Teymur Kheirkhabarov, oscd.community date: 2019/10/22 references: - https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment tags: - attack.credential_access - attack.t1003 # an old one - attack.t1003.002 - attack.t1003.003 logsource: category: process_creation product: windows detection: selection: CommandLine|contains|all: - mklink - HarddiskVolumeShadowCopy condition: selection falsepositives: - Legitimate administrator working with shadow copies, access for backup purposes status: experimental level: medium