heroui logo

Suspicious Reg Add BitLocker

Sigma Rules

View Source
Summary
This detection rule targets potentially malicious changes to the BitLocker settings in Windows systems, specifically monitoring for suspicious activities concerning the addition of registry keys related to BitLocker. The rule utilizes the reg.exe command-line utility to add keys under the path \SOFTWARE\Policies\Microsoft\FVE, which could be indicative of an attacker attempting to modify encryption settings or disable protections. The command line is analyzed for specific patterns such as 'REG ADD' along with various flags and parameters related to BitLocker configurations, like enabling TPM or configuring recovery keys. Given its ability to detect detrimental modifications that could compromise system security, such actions raise high alert levels and warrant further scrutiny. This rule is particularly relevant in scenarios where domain-wide ransomware attacks have exploited vulnerabilities in systems, as referenced in published reports. Analysts should flag any instances that trigger this rule for deeper investigation and potential remediation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
Created: 2021-11-15