heroui logo

Potential Windows Error Manager Masquerading

Elastic Detection Rules

View Source
Summary
This rule is designed to detect potential masquerading behavior of Windows Error Reporting processes (WerFault.exe or Wermgr.exe) that exhibit unusual command-line and process executable values while establishing outbound network connections. Such behavior is indicative of potential malicious activities aimed at evading standard child process detection mechanisms. The rule is implemented using EQL (Event Query Language), and operates by monitoring specific process creation events along with their corresponding network traffic. The detection is configured to trigger when a monitored process is executed without command-line arguments followed by an outbound network connection that isn't a DNS request. False positives could occur due to legitimate application crashes. The rule includes various investigative steps such as analyzing parent process trees, inspecting executable files for validity, checking network activity, and examining the registry. A comprehensive response protocol is outlined, focusing on IOCs, malware containment, and incident response to establish a robust defense against potential threats.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Network Traffic
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1036
  • T1036.005
Created: 2020-08-24