
Summary
This detection rule targets the execution of 'WerFault.exe' with the '-pr' command line argument, which is associated with ReflectDebugger exploitation techniques. The ReflectDebugger tool can be abused by attackers to run malicious executables stored in the ReflectDebugger registry key. When 'WerFault.exe' is invoked with the '-pr' flag, it can potentially execute harmful code previously defined in the Windows registry, allowing attackers to bypass traditional defenses and execute malware while masquerading the execution flow. By monitoring for this specific command line usage along with the process creation of 'WerFault.exe', the rule aims to identify attempts to exploit the ReflectDebugger functionality and execute unauthorized content on Windows systems. This can protect against stealthy malware execution workflows that utilize legitimate Windows processes to evade detection.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-06-30