
Summary
This rule identifies attempts to delete or modify critical system files that are essential during the boot process, potentially indicating a destructive attack behavior. The rule specifically targets changes to files such as `winload.exe`, `winlod.efi`, `ntoskrnl.exe`, and `bootmgr` located within the Windows directory and critical system paths. It checks for file deletion or modification events and generates an alert if such actions are initiated by suspicious or unidentified processes. The rule also contains a detailed triage and analysis guide for potential investigative steps and preemptive measures to safeguard system integrity. These insights include examining process execution chains and assessing user account activities to quickly disable unauthorized accounts. Furthermore, it advises on incident response protocols to mitigate possible impacts from destructive actions, including credential exposure recovery, system isolation to prevent further damage, and initiating data recovery plans as needed.
Categories
- Endpoint
- Windows
- Cloud
- Infrastructure
Data Sources
- Windows Registry
- File
- Process
- Application Log
ATT&CK Techniques
- T1485
- T1490
Created: 2025-09-01