020fc8061f
chore: Upgrade status level from `experimental` to `test` for rules that have not changed in 300 days --------- Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com> Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
37 lines
993 B
YAML
37 lines
993 B
YAML
title: Suspicious Reg Add BitLocker
|
|
id: 0e0255bf-2548-47b8-9582-c0955c9283f5
|
|
status: test
|
|
description: Detects suspicious addition to BitLocker related registry keys via the reg.exe utility
|
|
references:
|
|
- https://thedfirreport.com/2021/11/15/exchange-exploit-leads-to-domain-wide-ransomware/
|
|
author: frack113
|
|
date: 2021/11/15
|
|
modified: 2022/09/09
|
|
tags:
|
|
- attack.impact
|
|
- attack.t1486
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
CommandLine|contains|all:
|
|
- 'REG'
|
|
- 'ADD'
|
|
- '\SOFTWARE\Policies\Microsoft\FVE'
|
|
- '/v'
|
|
- '/f'
|
|
CommandLine|contains:
|
|
- 'EnableBDEWithNoTPM'
|
|
- 'UseAdvancedStartup'
|
|
- 'UseTPM'
|
|
- 'UseTPMKey'
|
|
- 'UseTPMKeyPIN'
|
|
- 'RecoveryKeyMessageSource'
|
|
- 'UseTPMPIN'
|
|
- 'RecoveryKeyMessage'
|
|
condition: selection
|
|
falsepositives:
|
|
- Unlikely
|
|
level: high
|