UEFI Persistence Via Wpbbin - FileCreation
Detects creation of a file named "wpbbin" in the "%systemroot%\system32" directory. Which could be indicative of UEFI based persistence method
Sigma rule (View on GitHub)
1title: UEFI Persistence Via Wpbbin - FileCreation
2id: e94b9ddc-eec5-4bb8-8a58-b9dc5f4e185f
3status: test
4description: Detects creation of a file named "wpbbin" in the "%systemroot%\system32\" directory. Which could be indicative of UEFI based persistence method
5references:
6 - https://grzegorztworek.medium.com/using-uefi-to-inject-executable-files-into-bitlocker-protected-drives-8ff4ca59c94c
7 - https://persistence-info.github.io/Data/wpbbin.html
8author: Nasreddine Bencherchali (Nextron Systems)
9date: 2022-07-18
10tags:
11 - attack.persistence
12 - attack.defense-evasion
13 - attack.t1542.001
14logsource:
15 product: windows
16 category: file_event
17detection:
18 selection:
19 TargetFilename: 'C:\Windows\System32\wpbbin.exe'
20 condition: selection
21falsepositives:
22 - Legitimate usage of the file by hardware manufacturer such as lenovo (Thanks @0gtweet for the tip)
23level: high
References
Related rules
- UEFI Persistence Via Wpbbin - ProcessCreation
- Abuse of Service Permissions to Hide Services Via Set-Service
- Abuse of Service Permissions to Hide Services Via Set-Service - PS
- Account Tampering - Suspicious Failed Logon Reasons
- Activity From Anonymous IP Address