heroui logo

Prevent Automatic Repair Mode using Bcdedit

Splunk Security Content

View Source
Summary
This detection rule aims to identify the execution of the `bcdedit.exe` command with parameters that set the boot status policy to ignore all failures, indicating a potential ransomware attack. By monitoring data from Endpoint Detection and Response (EDR) systems, specifically focusing on the command-line arguments of processes, the rule seeks to flag actions that may obstruct automatic recovery measures on infected machines. Such behavior is crucial as it allows attackers to retain control over compromised systems, complicating recovery efforts. The rule leverages Sysmon and Windows Event Logs to procure relevant telemetry to facilitate detection.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1490
Created: 2024-11-13