Potential ReflectDebugger Content Execution Via WerFault.EXE
Detects execution of "WerFault.exe" with the "-pr" commandline flag that is used to run files stored in the ReflectDebugger key which could be used to store the path to the malware in order to masquerade the execution flow
Sigma rule (View on GitHub)
1title: Potential ReflectDebugger Content Execution Via WerFault.EXE
2id: fabfb3a7-3ce1-4445-9c7c-3c27f1051cdd
3related:
4 - id: 0cf2e1c6-8d10-4273-8059-738778f981ad
5 type: derived
6status: test
7description: Detects execution of "WerFault.exe" with the "-pr" commandline flag that is used to run files stored in the ReflectDebugger key which could be used to store the path to the malware in order to masquerade the execution flow
8references:
9 - https://cocomelonc.github.io/malware/2022/11/02/malware-pers-18.html
10 - https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/
11author: X__Junior (Nextron Systems)
12date: 2023/06/30
13tags:
14 - attack.execution
15 - attack.defense_evasion
16 - attack.t1036
17logsource:
18 product: windows
19 category: process_creation
20detection:
21 selection_img:
22 - Image|endswith: '\WerFault.exe'
23 - OriginalFileName: 'WerFault.exe'
24 selection_cli:
25 CommandLine|contains: ' -pr '
26 condition: all of selection_*
27falsepositives:
28 - Unknown
29level: medium
References
Related rules
- Interactive Bash Suspicious Children
- Potential Adplus.EXE Abuse
- Potential ShellDispatch.DLL Functionality Abuse
- Potentially Suspicious Child Process Of ClickOnce Application
- UNC4841 - Barracuda ESG Exploitation Indicators