heroui logo

Creation of WerFault.exe/Wer.dll in Unusual Folder

Sigma Rules

View Source
Summary
This detection rule is designed to identify potential DLL hijacking attempts using the Windows Error Reporting executable ('WerFault.exe') or its associated DLL ('wer.dll'). The rule focuses on the creation of these files in unusual directories that are not standard for Windows system files. The presence of these files in atypical directories might indicate a malicious actor attempting to exploit the Windows error reporting process to execute unauthorized code or to bypass security measures. The rule looks for file creation events in the Windows file event log where the filenames specifically end with 'WerFault.exe' or 'wer.dll'. Additionally, it includes a filtering mechanism that excludes common system paths such as 'C:\Windows\SoftwareDistribution\', 'C:\Windows\System32\', and others from triggering alerts unless the files are found in unapproved locations. This serves as a proactive measure to enhance cybersecurity by providing early warnings about potential malware activities attempting to hide within system files.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2022-05-09