heroui logo

Wermgr Process Create Executable File

Splunk Security Content

View Source
Summary
The detection rule identifies the creation of executable files by the wermgr.exe process, which is atypical behavior for this Windows Error Reporting Manager process. Normally, wermgr.exe is involved in error reporting and should not engage in file generation. The rule operates by utilizing Sysmon Event Code 11 to capture instances of wermgr.exe generating .exe files. Such behavior may signal a compromise, particularly indicative of TrickBot malware activities, which manipulates wermgr.exe to perform malicious tasks including downloading additional payloads. If this behavior is detected and confirmed as malicious, it poses significant risks such as further malware infections, potential data exfiltration, or complete system compromise.
Categories
  • Endpoint
Data Sources
  • Pod
  • Process
ATT&CK Techniques
  • T1027
Created: 2024-11-13