Skip to content

Suspicious BitLocker Access Agent Update Utility Execution #5502

@BIitzkrieg

Description

@BIitzkrieg

Description of the Idea of the Rule

title: Suspicious BitLocker Access Agent Update Utility Execution
description: This analytic looks for suspicious BitLocker Access Agent Update Utility Execution. 
tags:
    - attack.t1574.002
author: @andrewdanis
references:
    - https://github.com/rtecCyberSec/BitlockMove
logsource:
    category: process_creation
    product: windows
detection:
    condition: 'Section_1'
    Section_1:
        ParentImage|endswith: \baaupdate.exe
falsepositives:
  - None noted. baaupdate seems to never legitimately spawn as a parent process.
level: high
status: test

Public References / Example Event Log

https://github.com/rtecCyberSec/BitlockMove

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions