
Summary
This rule is designed to detect the execution of EDRSilencer, a malicious tool designed to interfere with Endpoint Detection and Response (EDR) systems by preventing them from reporting security events to their servers. EDRSilencer employs the Windows Filtering Platform (WFP) to manipulate and block communication from EDR agents, thereby hindering incident detection and response efforts. The detection logic focuses on identifying the process creation of EDRSilencer by looking for specific characteristics such as the file name (EDRSilencer.exe), original file name, or its description. The rule is classified with a high severity level due to the critical nature of its function in compromising security monitoring capabilities. Overall, the rule enhances the security posture by flagging potential misuse of EDRSilencer in enterprise environments, where the presence of such tools indicates a direct threat to security operations.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2024-01-02