Suspicious writes to System Volume Information

Original Source: [splunk source]
Name:Suspicious writes to System Volume Information
id:cd6297cd-2bdd-4aa1-84aa-5d2f84228fac
version:4
date:2024-10-17
author:Rico Valdez, Splunk
status:deprecated
type:Hunting
Description:This search detects writes to the 'System Volume Information' folder by something other than the System process.
Data_source:
  • -Sysmon EventID 1
search:(`sysmon` OR tag=process) EventCode=11 process_id!=4 file_path=*System\ Volume Information*
| stats count min(_time) as firstTime max(_time) as lastTime by dest, Image, file_path
| `security_content_ctime(firstTime)`| `security_content_ctime(lastTime)`
| `suspicious_writes_to_system_volume_information_filter`


how_to_implement:You need to be ingesting logs with both the process name and command-line from your endpoints. If you are using Sysmon, you must have at least version 6.0.4 of the Sysmon TA.
known_false_positives:It is possible that other utilities or system processes may legitimately write to this folder. Investigate and modify the search to include exceptions as appropriate.
References:
drilldown_searches:
  :
tags:
  analytic_story:
    - 'Collection and Staging'
  asset_type:Windows
  confidence:50
  impact:50
  message:tbd
  mitre_attack_id:
    - 'T1036'
  observable:
    name:'dest'
    type:'Hostname'
    - role:
      - 'Victim'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - '_time'
  risk_score:25
  security_domain:endpoint

tests:
  :
manual_test:None

Related Analytic Stories


Collection and Staging