Suspicious Process Suspension via WERFaultSecure through EDR-Freeze

Detects attempts to freeze a process likely an EDR or an antimalware service process through EDR-Freeze that abuses the WerFaultSecure.exe process to suspend security software.

Sigma rule (View on GitHub)

 1title: Suspicious Process Suspension via WERFaultSecure through EDR-Freeze
 2id: 1f0b4cac-9c81-41f4-95d0-8475ff46b3e2
 3status: experimental
 4description: |
 5        Detects attempts to freeze a process likely an EDR or an antimalware service process through EDR-Freeze that abuses the WerFaultSecure.exe process to suspend security software.
 6references:
 7    - https://www.zerosalarium.com/2025/09/EDR-Freeze-Puts-EDRs-Antivirus-Into-Coma.html
 8    - https://github.com/TwoSevenOneT/EDR-Freeze/blob/a7f61030b36fbde89871f393488f7075d2aa89f6/EDR-Freeze.cpp#L53
 9author: Jason (https://github.com/0xbcf)
10date: 2025-09-23
11tags:
12    - attack.defense-evasion
13    - attack.t1562.001
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection:
19        Image: 'C:\Windows\System32\WerFaultSecure.exe'
20        CommandLine|contains|all:
21            - ' /h '
22            - ' /pid ' # Antimalware or EDR process pid will be after this line
23            - ' /tid '
24            - ' /encfile '
25            - ' /cancel '
26            - ' /type '
27            - ' 268310'
28    condition: selection
29falsepositives:
30    - Legitimate usage of WerFaultSecure for debugging purposes
31level: high

References

Related rules

to-top