Files
blue-team-tools/rules/windows/process_creation/win_pc_susp_reg_bitlocker.yml
T
frack113 51744b31b4 fix name
2021-11-15 13:38:38 +01:00

37 lines
936 B
YAML

title: Suspicious Reg Add BitLocker
id: 0e0255bf-2548-47b8-9582-c0955c9283f5
status: experimental
description: Suspicious add key for BitLocker
references:
- https://thedfirreport.com/2021/11/15/exchange-exploit-leads-to-domain-wide-ransomware/
tags:
- attack.impact
- attack.t1486
author: frack113
date: 2021/11/15
logsource:
category: process_creation
product: windows
detection:
set:
CommandLine|contains|all:
- 'REG'
- 'ADD'
- 'HKLM\SOFTWARE\Policies\Microsoft\FVE'
- '/v'
- '/f'
key:
CommandLine|contains:
- 'EnableBDEWithNoTPM'
- 'UseAdvancedStartup'
- 'UseTPM'
- 'UseTPMKey'
- 'UseTPMKeyPIN'
- 'RecoveryKeyMessageSource'
- 'UseTPMPIN'
- 'RecoveryKeyMessage'
condition: set and key
falsepositives:
- unknown
level: medium