
Summary
The detection rule identifies potentially malicious behavior associated with the BitLocker Access Agent Update Utility (BaaUpdate.exe) by monitoring for the loading of dynamic link libraries (DLLs) from suspicious locations that are publicly writable. This could indicate attempts at lateral movement through BitLocker COM and DCOM hijacking, exploiting the BDEUILauncher COM class, which is designed to run under the context of the logged-on user. By targeting BaaUpdate.exe—particularly in scenarios where it starts with user-supplied parameters—attackers could execute arbitrary code with the privileges of the user without needing to compromise credentials. The rule tracks various directories known for being the target of malicious file placements, such as specific user folders and temporary directories, to flag unauthorized DLL loads that might indicate exploitation attempts. This rule is tagged with relevant attack techniques, including defense evasion and lateral movement strategies, enhancing its relevance in threat detection within Windows environments.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Image
- File
Created: 2025-10-18