
Summary
This detection rule identifies instances where the wermgr.exe process attempts to connect to various known IP check web services, which could suggest malicious activity. The rule utilizes Sysmon EventCode 22 to monitor DNS queries made by the wermgr.exe process. The significance of this behavior lies in the fact that wermgr.exe is predominantly associated with Windows error reporting and its interactions with IP check services can indicate possible exploitation attempts, particularly those linked with malware such as Trickbot. These connections might reveal the infected machine's IP address to the attacker, facilitating further exploitation efforts. By tracking these communications, security teams can enhance their ability to identify and mitigate sophisticated threats targeting their environments.
Categories
- Endpoint
Data Sources
- Pod
- Process
- Network Traffic
ATT&CK Techniques
- T1590
- T1590.005
Created: 2024-11-13