heroui logo

Windows DiskCryptor Usage

Splunk Security Content

View Source
Summary
The Windows DiskCryptor Usage rule identifies the execution of DiskCryptor, a tool used by attackers to encrypt disks, potentially leading to data loss and operational disruption. This rule uses analytical data from Endpoint Detection and Response (EDR) sources such as Sysmon and Windows Event Logs to capture process names 'dcrypt.exe' or 'dcinst.exe'. Successful detection indicates possible malicious activity, necessitating prompt investigation to prevent ransomware incidents. The search methodology includes leveraging Splunk data models to analyze and consolidate endpoint process data, emphasizing the importance of EDR agents in monitoring these critical security events.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • Sensor Health
  • Kernel
ATT&CK Techniques
  • T1486
Created: 2024-11-13