title: PowerShell Deleted Mounted Share author: oscd.community, @redcanary, Zach Stanford @svch0st date: 2020/10/08 description: Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation detection: SELECTION_1: ScriptBlockText: '*Remove-SmbShare*' SELECTION_2: ScriptBlockText: '*Remove-FileShare*' condition: (SELECTION_1 or SELECTION_2) falsepositives: - Administrators or Power users may remove their shares via cmd line id: 66a4d409-451b-4151-94f4-a55d559c49b0 level: medium logsource: category: ps_script definition: Script block logging must be enabled product: windows modified: 2021/10/16 references: - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.005/T1070.005.md status: experimental tags: - attack.defense_evasion - attack.t1070.005 yml_filename: powershell_suspicious_mounted_share_deletion.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script