
Summary
The rule "Windows BitLocker Suspicious Command Usage" is engineered to identify the execution of potentially harmful BitLocker commands associated with the infamous ShrinkLocker ransomware. ShrinkLocker leverages these commands to alter BitLocker settings, including the disablement of TPM (Trusted Platform Module) prerequisites, adjustment of encryption behavior, and management of startup keys or PIN configurations. The malicious modification of these settings can significantly deteriorate system security, making unauthorized access and data breaches more feasible. The rule accomplishes detection by monitoring specific process activities related to the command-line arguments of 'manage-bde.exe'. The search query is designed to capture instances where certain suspicious parameters that imply possible tampering with BitLocker are used. Knowing about these command outputs is crucial for organizations to maintain their encryption integrity and protect sensitive data.
Categories
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1486
- T1490
Created: 2025-02-10