Update T1490.yaml (#2677)
* Update T1490.yaml Fixed a formatting error in #2676 * Update T1490.yaml add dependency_executor_name field --------- Co-authored-by: Michael Haag <5632822+MHaggis@users.noreply.github.com>
This commit is contained in:
@@ -29,12 +29,16 @@ atomic_tests:
|
||||
auto_generated_guid: 6a3ff8dd-f49c-4272-a658-11c2fe58bd88
|
||||
description: |
|
||||
Deletes Windows Volume Shadow Copies via WMI. This technique is used by numerous ransomware families and APT malware such as Olympic Destroyer.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: |
|
||||
Create volume shadow copy of C:\ .
|
||||
prereq_command: |
|
||||
if(!(vssadmin.exe list shadows | findstr "No items found that satisfy the query.")) { exit 0 } else { exit 1 }
|
||||
get_prereq_command: |
|
||||
wmic shadowcopy call create Volume='C:\'
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
command: |
|
||||
wmic.exe shadowcopy delete
|
||||
|
||||
Reference in New Issue
Block a user