Skip to content

Commit

Permalink
Generated docs from job=generate-docs branch=master [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
Atomic Red Team doc generator committed Feb 5, 2024
1 parent 12f5d9d commit 02c7d02
Show file tree
Hide file tree
Showing 3 changed files with 44 additions and 16 deletions.
22 changes: 16 additions & 6 deletions atomics/Indexes/index.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -107678,14 +107678,24 @@ impact:
elevation_required: true
- name: Windows - Delete Volume Shadow Copies via WMI
auto_generated_guid: 6a3ff8dd-f49c-4272-a658-11c2fe58bd88
description: |
Deletes Windows Volume Shadow Copies via WMI. This technique is used by numerous ransomware families and APT malware such as Olympic Destroyer.
prereq_command: |
if(!(vssadmin.exe list shadows | findstr "No items found that satisfy the query.")) { exit 0 } else { exit 1 }
get_prereq_command: |
wmic shadowcopy call create Volume='C:\'
description: 'Deletes Windows Volume Shadow Copies via WMI. This technique is
used by numerous ransomware families and APT malware such as Olympic Destroyer.

'
supported_platforms:
- windows
dependency_executor_name: powershell
dependencies:
- description: 'Create volume shadow copy of C:\ .

'
prereq_command: 'if(!(vssadmin.exe list shadows | findstr "No items found
that satisfy the query.")) { exit 0 } else { exit 1 }

'
get_prereq_command: 'wmic shadowcopy call create Volume=''C:\''

'
executor:
command: 'wmic.exe shadowcopy delete

Expand Down
22 changes: 16 additions & 6 deletions atomics/Indexes/windows-index.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -88429,14 +88429,24 @@ impact:
elevation_required: true
- name: Windows - Delete Volume Shadow Copies via WMI
auto_generated_guid: 6a3ff8dd-f49c-4272-a658-11c2fe58bd88
description: |
Deletes Windows Volume Shadow Copies via WMI. This technique is used by numerous ransomware families and APT malware such as Olympic Destroyer.
prereq_command: |
if(!(vssadmin.exe list shadows | findstr "No items found that satisfy the query.")) { exit 0 } else { exit 1 }
get_prereq_command: |
wmic shadowcopy call create Volume='C:\'
description: 'Deletes Windows Volume Shadow Copies via WMI. This technique is
used by numerous ransomware families and APT malware such as Olympic Destroyer.

'
supported_platforms:
- windows
dependency_executor_name: powershell
dependencies:
- description: 'Create volume shadow copy of C:\ .

'
prereq_command: 'if(!(vssadmin.exe list shadows | findstr "No items found
that satisfy the query.")) { exit 0 } else { exit 1 }

'
get_prereq_command: 'wmic shadowcopy call create Volume=''C:\''

'
executor:
command: 'wmic.exe shadowcopy delete

Expand Down
16 changes: 12 additions & 4 deletions atomics/T1490/T1490.md
Original file line number Diff line number Diff line change
Expand Up @@ -90,10 +90,6 @@ vssadmin.exe create shadow /for=c:

## Atomic Test #2 - Windows - Delete Volume Shadow Copies via WMI
Deletes Windows Volume Shadow Copies via WMI. This technique is used by numerous ransomware families and APT malware such as Olympic Destroyer.
prereq_command: |
if(!(vssadmin.exe list shadows | findstr "No items found that satisfy the query.")) { exit 0 } else { exit 1 }
get_prereq_command: |
wmic shadowcopy call create Volume='C:\'

**Supported Platforms:** Windows

Expand All @@ -115,6 +111,18 @@ wmic.exe shadowcopy delete



#### Dependencies: Run with `powershell`!
##### Description: Create volume shadow copy of C:\ .
##### Check Prereq Commands:
```powershell
if(!(vssadmin.exe list shadows | findstr "No items found that satisfy the query.")) { exit 0 } else { exit 1 }
```
##### Get Prereq Commands:
```powershell
wmic shadowcopy call create Volume='C:\'
```




<br/>
Expand Down

0 comments on commit 02c7d02

Please sign in to comment.