
Summary
The rule titled 'Windows Process Injection Wermgr Child Process' is designed to identify suspicious activities where the Windows Error Reporting Manager (wermgr.exe) spawns a child process that is not directly related to error or fault handling. This analytic leverages data from Endpoint Detection and Response (EDR) agents and focuses on the relationships between processes and their command-line executions. The detection is significant in identifying potential Qakbot malware, which is known to inject malicious code into wermgr.exe to perform actions such as reconnaissance and execution of arbitrary code, ultimately aiming to maintain persistence within affected networks. By monitoring the parent-child process relationships and excluding known legitimate processes, this rule provides critical insights into potentially malicious behavior that could pose severe risks to organizational security.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- File
ATT&CK Techniques
- T1055
Created: 2024-11-13