T1518.002
Backup Software Discovery
Adversaries may attempt to get a listing of backup software or configurations installed on a system. This discovery technique is commonly performed as pre-ransomware reconnaissance to identify backup solutions (Veeam, Acronis, Backup Exec, Commvault, Windows Server Backup) so attackers can disable, destroy, or encrypt them before deploying ransomware payloads. Methods include registry queries (reg query), process enumeration (tasklist, wmic), service enumeration (sc query, net start), directory listings, and PowerShell-based enumeration scripts such as the Get-DataInfo.ps1 script used by Wizard Spider (FIN12).
Microsoft Sentinel / Defender
kusto
let BackupSoftwareNames = dynamic([
"veeam", "acronis", "backup exec", "commvault", "simpana", "arcserve",
"paragon", "cobian", "backupassist", "bacula", "carbonite",
"backblaze", "crashplan", "barracuda", "datto", "zerto",
"veritas", "symantec backup", "wbadmin", "ntbackup"
]);
let BackupRegistryPaths = dynamic([
"veeam", "acronis", "backup exec", "commvault", "arcserve", "paragon",
"cobian backup", "backupassist", "windowsbackup"
]);
let BackupServiceNames = dynamic([
"veeambackup", "veeamtransport", "veeamagent", "acronisagent", "acrsch2svc",
"backupexecagent", "backupexecdevice", "backupexecjobengine", "backupexecmgmt",
"cbvscsvc", "gxclmgrs", "gxcvd", "wbengine", "sdrsvc"
]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where (
(FileName =~ "reg.exe" and ProcessCommandLine has_any ("query", "QUERY") and ProcessCommandLine has_any (BackupRegistryPaths))
or (FileName =~ "sc.exe" and ProcessCommandLine has_any ("query", "QUERY") and ProcessCommandLine has_any (BackupServiceNames))
or (FileName =~ "net.exe" and ProcessCommandLine has "start" and ProcessCommandLine has_any (BackupServiceNames))
or (FileName =~ "net1.exe" and ProcessCommandLine has "start" and ProcessCommandLine has_any (BackupServiceNames))
or (FileName =~ "wmic.exe" and ProcessCommandLine has_any ("product", "process", "service") and ProcessCommandLine has_any (BackupSoftwareNames))
or (FileName in~ ("powershell.exe", "pwsh.exe") and ProcessCommandLine has_any (
"Get-DataInfo", "Get-Service", "Get-ItemProperty", "Get-WmiObject", "Get-CimInstance"
) and ProcessCommandLine has_any (BackupSoftwareNames))
or (FileName =~ "tasklist.exe" and ProcessCommandLine has_any (BackupSoftwareNames))
or (FileName =~ "cmd.exe" and ProcessCommandLine has_any ("dir", "DIR") and ProcessCommandLine has_any (BackupSoftwareNames))
)
| extend DiscoveryMethod = case(
FileName =~ "reg.exe", "Registry Query",
FileName =~ "sc.exe", "Service Control Query",
FileName in~ ("net.exe", "net1.exe"), "Net Service Enumeration",
FileName =~ "wmic.exe", "WMI Query",
FileName in~ ("powershell.exe", "pwsh.exe"), "PowerShell Enumeration",
FileName =~ "tasklist.exe", "Process List Enumeration",
FileName =~ "cmd.exe", "Directory Listing",
"Other"
)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine, DiscoveryMethod
| sort by Timestamp desc high severity
medium confidence
Data Sources
Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents
False Positives
- Backup administrators running legitimate inventory or health-check scripts to verify backup agent status across endpoints
- IT asset management tools (Lansweeper, PDQ Inventory, Snipe-IT) that enumerate installed software and services during scheduled discovery scans
- Monitoring agents (Zabbix, PRTG, SolarWinds) checking backup service health and process status as part of regular infrastructure monitoring
- Backup software itself performing self-checks or compatibility validation during installation, upgrade, or scheduled maintenance windows
Last updated: 2026-04-20 Research depth: deep
References (5)
- https://attack.mitre.org/techniques/T1518/002/
- https://www.mandiant.com/resources/blog/fin12-ransomware-intrusion-actor-targeting-healthcare
- https://www.security.com/threat-intelligence/play-ransomware-volume-shadow-copy
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-deviceprocessevents-table
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1518.002/T1518.002.md
Unlock Pro Content
Get the full detection package for T1518.002 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance