Shadow Copy as CSV

Overview

Evidence: Shadow Copy as CSV Description: Dump Latest Shadow Copy Files Information in CSV Format Category: System Platform: Windows Short Name: shdwcopy Is Parsed: Yes - File listing exported to CSV Sent to Investigation Hub: Yes Collect File(s): No

Background

Volume Shadow Copy Service (VSS) creates point-in-time snapshots of volumes. These snapshots preserve the state of files at the time the snapshot was created, allowing access to previous versions of files even if they have been modified or deleted.

Shadow copies can contain previous versions of files before ransomware encryption, deleted files, and historical system state. They provide a way to recover data and analyze system state from a specific point in time.

Data Collected

Field
Description
Example

Modified

File modification timestamp

2023-10-15T14:30:00Z

Accessed

File access timestamp

2023-10-15T15:45:00Z

Created

File creation timestamp

2023-10-01T10:00:00Z

IsDirectory

Whether entry is directory

+ or empty

FileSize

File size in bytes

1048576

Attributes

File attributes (R=ReadOnly, H=Hidden, S=System, C=Compressed, E=Encrypted)

RHS

FilePath

Full path within shadow copy

\?\HarddiskVolumeShadowCopy1\Users\user\Documents\file.txt

Collection Method

This collector:

  • Identifies the most recent shadow copy using GetLatestSnapshotDeviceName

  • Enumerates all files recursively in the shadow copy

  • Captures file metadata (timestamps, size, attributes)

  • Exports to CSV format for analysis

Shadow copies are accessed via special device paths like \\?\HarddiskVolumeShadowCopy{N}\.

Usage

Shadow copies are invaluable for recovering evidence and analyzing historical system state. Investigators use this data to recover files before ransomware encryption, access deleted files preserved in snapshots, analyze previous system configurations, compare current state with historical snapshots, recover overwritten evidence, and establish what files existed at snapshot time.

Known Limitations

  • Only processes the most recent shadow copy

  • Shadow copies may not exist on all systems

  • VSS may be disabled or snapshots deleted

  • Snapshot age depends on creation schedule

  • Large file listings can take time to generate

Notes

Shadow copies are often targeted by ransomware for deletion. The presence or absence of shadow copies can itself be evidence. Multiple shadow copies may exist but only the most recent is processed.

Last updated

Was this helpful?