
Summary
This detection rule identifies the creation of a service named 'WerFaultSvc' within the Windows operating system that is indicative of Snake malware activity. Specifically capturing Windows System logs, the rule utilizes EventCode 7045 to monitor for the establishment of services that execute from the WinSxS directory, thereby obscuring their malicious intent by resembling legitimate Windows processes. The creation of such a service facilitates the malware's persistence and potential to execute harmful payloads, leading to data breaches, system compromises, and prolonged manipulation of the compromised environment. Threat analysts are urged to verify the legitimacy of this behavior, as confirmed malicious instances pose serious security risks to enterprise systems.
Categories
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1547.006
- T1569.002
Created: 2024-12-10