diff --git a/rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml b/rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml index a676aad0563..8c1e77cc3b5 100644 --- a/rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml +++ b/rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml @@ -2,13 +2,13 @@ creation_date = "2020/02/18" integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"] maturity = "production" -updated_date = "2025/03/20" +updated_date = "2025/05/09" [rule] author = ["Elastic"] description = """ -Identifies use of the wbadmin.exe to delete the backup catalog. Ransomware and other malware may do this to prevent -system recovery. +Detects use of wbadmin.exe to delete backup catalogs, system state backups, or other backup data. Ransomware and other +malware may do this to prevent system recovery. """ from = "now-9m" index = [ @@ -24,10 +24,10 @@ index = [ ] language = "eql" license = "Elastic License v2" -name = "Deleting Backup Catalogs with Wbadmin" +name = "Backup Deletion with Wbadmin" note = """## Triage and analysis -### Investigating Deleting Backup Catalogs with Wbadmin +### Investigating Backup Deletion with Wbadmin Windows Server Backup stores the details about your backups (what volumes are backed up and where the backups are located) in a file called a backup catalog, which ransomware victims can use to recover corrupted backup files. Deleting these files is a common step in threat actor playbooks. @@ -87,7 +87,7 @@ type = "eql" query = ''' process where host.os.type == "windows" and event.type == "start" and (process.name : "wbadmin.exe" or ?process.pe.original_file_name == "WBADMIN.EXE") and - process.args : "catalog" and process.args : "delete" + process.args : ("catalog", "backup", "systemstatebackup") and process.args : "delete" '''