SigmaHQ/rules/windows/builtin/win_susp_backup_delete.yml
2020-01-30 16:07:37 +01:00

24 lines
678 B
YAML

title: Backup Catalog Deleted
id: 9703792d-fd9a-456d-a672-ff92efe4806a
status: experimental
description: Detects backup catalog deletions
references:
- https://technet.microsoft.com/en-us/library/cc742154(v=ws.11).aspx
- https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
author: Florian Roth (rule), Tom U. @c_APT_ure (collection)
date: 2017/05/12
tags:
- attack.defense_evasion
- attack.t1107
logsource:
product: windows
service: application
detection:
selection:
EventID: 524
Source: Backup
condition: selection
falsepositives:
- Unknown
level: medium