
Summary
This rule detects modifications to Windows error recovery boot configurations through the use of the 'bcdedit.exe' command, particularly targeting the 'recoveryenabled' flag set to 'no'. Such modifications raise alarm as they may be indicative of ransomware attempting to disable recovery options, thus obstructing administrative recovery efforts if an infection occurs. The detection relies on collection from Endpoint Detection and Response (EDR) tools, specifically monitoring for relevant process names, parental relationships, and executed command-line inputs. Investigating such events is crucial for security analysts to evaluate potential threats and take necessary remediation actions before extensive damage occurs. Logging must include essential telemetry like process GUIDs, names, and complete command-line strings, mapped appropriately within Splunk's data model for effective analysis.
Categories
- Windows
- Endpoint
- Cloud
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1490
Created: 2024-12-10