heroui logo

Modification of Boot Configuration

Elastic Detection Rules

View Source
Summary
This rule identifies the execution of `bcdedit.exe` with specific arguments indicative of potentially malicious activity on Windows systems. Specifically, the usage of `bcdedit.exe` to disable Windows Error Recovery and ignore errors related to boot failures is a behavior that may indicate a destructive technique employed by malware or attackers. The rule captures events from various logs, especially focusing on the Windows environment and integrates with platforms like M365 Defender and Crowdstrike. It calls attention to the parent process tree for unknown processes, requires scrutiny of user actions, and advocates for thorough investigative steps and incident response based on its findings. While the use of `bcdedit.exe` is not inherently malicious, it can lead to destructive outcomes typical of ransomware attacks; hence, this rule plays an essential role in threat detection and incident response environments.
Categories
  • Endpoint
  • Windows
  • Cloud
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
  • Scheduled Job
ATT&CK Techniques
  • T1490
Created: 2020-03-16