SigmaHQ/rules/windows/process_creation/win_susp_bcdedit.yml
2019-11-12 23:12:27 +01:00

26 lines
706 B
YAML

title: Possible Ransomware or unauthorized MBR modifications
id: c9fbe8e9-119d-40a6-9b59-dd58a5d84429
status: experimental
description: Detects, possibly, malicious unauthorized usage of bcdedit.exe
references:
- https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/bcdedit--set
author: '@neu5ron'
date: 2019/02/07
tags:
- attack.defense_evasion
- attack.t1070
- attack.persistence
- attack.t1067
logsource:
category: process_creation
product: windows
detection:
selection:
NewProcessName: '*\bcdedit.exe'
ProcessCommandLine:
- '*delete*'
- '*deletevalue*'
- '*import*'
condition: selection
level: medium