Query Details
//Look for potential instances of BitLocker used to encrypt data maliciously. Defender for Endpoint connected to Sentinel.
DeviceProcessEvents
| where FileName =~ "reg.exe"
and ProcessCommandLine has "EnableBDEWithNoTPM"
and (ProcessCommandLine has "true" or ProcessCommandLine contains "1")
| where InitiatingProcessCommandLine has_all (@"C:\Windows\", ".bat")
This query is looking for potential instances of BitLocker being used to encrypt data maliciously. It specifically focuses on devices where Defender for Endpoint is connected to Sentinel. The query filters for events where the file name is "reg.exe" and the process command line includes the phrase "EnableBDEWithNoTPM" and either "true" or "1". Additionally, it checks if the initiating process command line includes both "C:\Windows" and ".bat".

Rod Trent
Released: August 12, 2021
Tables
Keywords
Operators