SNAKE Malware WerFault Persistence File Creation
Detects the creation of a file named "WerFault.exe" in the WinSxS directory by a non-system process, which can be indicative of potential SNAKE malware activity
Sigma rule (View on GitHub)
1title: SNAKE Malware WerFault Persistence File Creation
2id: 64827580-e4c3-4c64-97eb-c72325d45399
3status: test
4description: Detects the creation of a file named "WerFault.exe" in the WinSxS directory by a non-system process, which can be indicative of potential SNAKE malware activity
5references:
6 - https://media.defense.gov/2023/May/09/2003218554/-1/-1/0/JOINT_CSA_HUNTING_RU_INTEL_SNAKE_MALWARE_20230509.PDF
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-05-10
9modified: 2023-05-18
10tags:
11 - attack.execution
12 - detection.emerging-threats
13logsource:
14 category: file_event
15 product: windows
16detection:
17 selection:
18 TargetFilename|startswith: 'C:\Windows\WinSxS\'
19 TargetFilename|endswith: '\WerFault.exe'
20 filter_main_system_location:
21 Image|startswith:
22 - 'C:\Windows\System32\'
23 - 'C:\Windows\SysWOW64\'
24 - 'C:\Windows\WinSxS\'
25 condition: selection and not 1 of filter_main_*
26falsepositives:
27 - Unknown
28level: high
References
Related rules
- APT29 2018 Phishing Campaign CommandLine Indicators
- Adwind RAT / JRAT
- Blue Mockingbird
- CVE-2021-1675 Print Spooler Exploitation
- CVE-2021-1675 Print Spooler Exploitation IPC Access