Boot Configuration Tampering Via Bcdedit.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the use of the bcdedit command to tamper with the boot configuration data. This technique is often times used by malware or attackers as a destructive way before launching ransomware.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith "\bcdedit.exe" OR ORIGINALFILENAME = "bcdedit.exe") AND COMMANDLINE contains "set" AND ((COMMANDLINE contains "bootstatuspolicy" AND COMMANDLINE contains "ignoreallfailures") OR (COMMANDLINE contains "recoveryenabled" AND COMMANDLINE contains "no")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community