heroui logo

Potential Ransomware or Unauthorized MBR Tampering Via Bcdedit.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the unauthorized and potentially malicious usage of the Windows utility `bcdedit.exe`, which can modify the boot configuration data, a critical component of system integrity. Automated ransomware often uses this utility to manipulate the Master Boot Record (MBR) to facilitate encryption of the machine's files, creating serious security risks. This rule specifically examines process creation events targeting `bcdedit.exe`, detecting variations such as command line arguments typically associated with malicious intent ('delete', 'deletevalue', 'import', or 'safeboot' and 'network'). The rule flags any instance where `bcdedit.exe` is executed with these command line options provided that the base executable is confirmed. This proactive monitoring can be an essential layer of defense against ransomware attacks and unauthorized system modifications.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
Created: 2019-02-07