SNAKE Malware Service Persistence
Detects the creation of a service named "WerFaultSvc" which seems to be used by the SNAKE malware as a persistence mechanism as described by CISA in their report
Sigma rule (View on GitHub)
1title: SNAKE Malware Service Persistence
2id: b2e60816-96b2-45bd-ba91-b63578c03ef6
3status: test
4description: Detects the creation of a service named "WerFaultSvc" which seems to be used by the SNAKE malware as a persistence mechanism as described by CISA in their report
5references:
6 - https://media.defense.gov/2023/May/09/2003218554/-1/-1/0/JOINT_CSA_HUNTING_RU_INTEL_SNAKE_MALWARE_20230509.PDF
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-05-10
9tags:
10 - attack.persistence
11 - detection.emerging-threats
12logsource:
13 product: windows
14 service: system
15detection:
16 selection:
17 Provider_Name: 'Service Control Manager'
18 EventID: 7045
19 ServiceName|contains: 'WerFaultSvc' # Note: The report contains a "," in the name ("WerFaultSvc,"). Since we can't confirm if its a typo or not we don't use it
20 ImagePath|startswith: 'C:\Windows\WinSxS\'
21 ImagePath|endswith: '\WerFault.exe'
22 condition: selection
23falsepositives:
24 - Unknown
25level: critical
References
Related rules
- COLDSTEEL Persistence Service Creation
- COLDSTEEL RAT Anonymous User Process Execution
- COLDSTEEL RAT Cleanup Command Execution
- COLDSTEEL RAT Service Persistence Execution
- CVE-2021-40539 Zoho ManageEngine ADSelfService Plus Exploit