heroui logo

Use of Wfc.exe

Sigma Rules

View Source
Summary
The detection rule targets the use of Wfc.exe, a command-line utility for compiling Windows Workflows, which can be exploited for Application Whitelisting (AWL) bypass techniques. Given its potential misuse in defense evasion scenarios, it is recommended to monitor and block Wfc.exe under certain contexts. This rule leverages process creation logs to identify the execution of Wfc.exe, particularly by looking for specific file name patterns that indicate unauthorized use. This detection contributes to a broader strategy against attack techniques that leverage legitimate applications to bypass security measures. Awareness of the legitimate context of this executable is critical, as it may lead to false positives if used by developers in a valid environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-06-01