EventPeeker

Ransomware Indicators — Pre-Encryption Activity

Ransomware attacks follow a predictable pattern in Windows event logs — disabling defenses, establishing persistence, spreading laterally, and then clearing logs before encrypting. Recognizing the pre-encryption activity pattern gives defenders a window to intervene before data is lost.

Severity

Critical

ATT&CK Tactic

Impact

Common attacker usage

Ransomware-as-a-Service operators (LockBit, BlackCat, Cl0p) · Double-extortion groups · Ransomware affiliates · Wiper malware

Investigate immediately if

  • !Audit log cleared (1102) across multiple systems in a short window
  • !WinDefend or VSS (Volume Shadow Copy Service) stopped
  • !New service with a random or suspicious name installed in a temp directory
  • !Defender detections (1116) appear on multiple endpoints simultaneously

MITRE ATT&CK

Technique

T1486 · Data Encrypted for Impact

Tactic

Impact

View on attack.mitre.org →

Security Relevance

Modern ransomware attacks are not spontaneous — they follow a structured intrusion methodology that can take days or weeks from initial access to encryption. The pre-encryption phase leaves a trail of Windows events that, if detected early, allow defenders to eject the attacker before any data is encrypted. The attack typically progresses: initial access → lateral movement → privilege escalation → defense evasion (Defender disable, log clear) → persistence → encryption. Each stage is visible in Windows event logs.

Indicators of Malicious Use

  • Event ID 1102 (audit log cleared) across multiple systems — attackers clear logs immediately before or after encryption to destroy forensic evidence.
  • Event ID 7036: VSS (Volume Shadow Copy Service) stopped — ransomware deletes shadow copies to prevent recovery. This happens minutes before encryption starts.
  • Event ID 4688: vssadmin.exe delete shadows /all or wmic shadowcopy delete in process creation logs — the shadow copy deletion command.
  • Event ID 7045: New service with a random name (e.g. abcdef12.exe) in C:\Windows\Temp — ransomware payload installed as a service for execution.
  • Event ID 1116: Mass Defender detections across multiple endpoints in a short window — ransomware binary triggering AV on many systems simultaneously.
  • Event ID 4698: Scheduled tasks created with encoded PowerShell commands — persistence mechanism deployed before encryption.
  • Event ID 4624 Type 3: Wave of lateral movement across the network from a single source — ransomware spreading to reach all accessible systems.
  • Sudden silence in all logs followed by system unavailability — encryption has started and event logging is disrupted.

Example Log Entry

[Pre-encryption activity sequence — look for this pattern:]

T-60 min  Event ID 7036  WinDefend service: stopped
T-55 min  Event ID 4657  DisableAntiSpyware registry key set to 1
T-40 min  Event ID 4624  (Type 3) — lateral movement wave to 12 hosts
T-30 min  Event ID 7045  Service "svchostXX.exe" installed in C:\Windows\Temp
T-20 min  Event ID 4688  vssadmin.exe delete shadows /all /quiet
T-15 min  Event ID 1102  Security audit log cleared
T-00 min  [Encryption begins — no further events logged normally]

Log Name: System
Event ID:  7036
The Volume Shadow Copy service entered the stopped state.

Log Name: Security
Event ID:  4688
New Process Name:  C:\Windows\System32\vssadmin.exe
Process Command Line: vssadmin  delete shadows /all /quiet

Investigation Steps

  1. 1.Establish the timeline — find the earliest suspicious event and work forward. Ransomware pre-encryption sequences typically span 15–60 minutes.
  2. 2.Check all systems for the same pattern — ransomware encrypts the network, not just one machine. Look for 4624 Type 3 lateral movement events as the spread vector.
  3. 3.Look for the initial access event — phishing (Defender detection on email attachment), VPN logon from unusual IP, or RDP brute force (4625 spike) days or weeks earlier.
  4. 4.Check VSS status immediately: vssadmin list shadows. If shadow copies are gone, recovery options are limited to backups.
  5. 5.Identify patient zero — which host had the first unusual event? That is the initial compromise point and most valuable forensic artifact.
  6. 6.Do not reboot infected systems — memory forensics may still be possible. Isolate from the network instead.
  7. 7.Check backup systems — verify backup integrity before attempting restoration. Some ransomware specifically targets and corrupts backup infrastructure.

Check your own logs for this technique — upload an EVTX file for instant detection, no account required.

Common False Positives

  • VSS stopping during Windows Update — updates occasionally pause VSS temporarily. This generates a 7036 stop event but VSS restarts within minutes.
  • Backup software operations — Veeam, Acronis, and similar products interact heavily with VSS. Scheduled backup jobs generate VSS state changes.
  • Log archival and rotation — some organizations clear event logs as part of a documented archival process. Should always be accompanied by export to a SIEM.
  • Security testing and DR exercises — tabletop exercises or red team engagements may simulate ransomware indicators. Verify against your testing calendar.

Remediation

  • Isolate affected systems immediately — disconnect from the network to stop ongoing encryption and lateral spread.
  • Do not pay the ransom without consulting law enforcement and legal counsel — payment does not guarantee decryption and may violate sanctions.
  • Restore from clean, offline backups — verify backup integrity before restoring (test restores on isolated systems first).
  • Enable Tamper Protection on all endpoints to prevent Defender from being disabled without admin consent.
  • Implement the 3-2-1 backup rule: 3 copies, 2 different media types, 1 offsite — ransomware targets network-connected backups.
  • Deploy Controlled Folder Access in Defender to block unauthorized processes from writing to protected directories.
  • Engage an incident response firm if the attack is active — contain and eradicate before restoring to avoid re-infection.

Related Event IDs

1102Audit log cleared — the clearest pre-encryption indicator
7045New service installed — ransomware payload deployed as a service
4698Scheduled task created — persistence before encryption
1116Defender detection — ransomware binary caught on multiple hosts
4688Process creation — look for vssadmin.exe delete shadows

Related Detection Guides

Analyze your Windows Event Logs

Upload an .evtx file from servers, domain controllers, or endpoints — get instant detections, MITRE mappings, and an AI-generated triage report.

Detect this technique in your logs →