
Summary
This rule is focused on detecting suspicious executions of the BitLocker Access Agent Update Utility (baaupdate.exe). The rule highlights that baaupdate.exe is an unusual parent process for other processes, which could indicate malicious activity. The detection targets any child processes spawned by baaupdate.exe that are recognized for their use in lateral movement techniques, such as exploitation of BitLocker's DCOM and COM interfaces. The child processes, including bitsadmin.exe, cmd.exe, cscript.exe, mshta.exe, powershell_ise.exe, powershell.exe, regsvr32.exe, rundll32.exe, schtasks.exe, wmic.exe, and wscript.exe, are often leveraged by attackers to execute commands remotely or to facilitate other malicious operations. The rule is currently classified as experimental and is flagged at a high detection level due to the potential severity of the activity.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2025-10-18