
Summary
This detection rule identifies suspicious crashes of the Microsoft Malware Protection Engine (MsMpEng.exe) using Windows Event Logs. The rule specifically looks for events where the Event ID is 1000 and the provider name is 'Application Error'. The presence of keywords such as 'MsMpEng.exe' and 'mpengine.dll' in the event data also serves as a criterion for triggering this detection. This behavior can indicate a possible attack or manipulation attempt against the malware protection engine, which might lead to worse security consequences as it could impede malware detection capabilities. It's essential to monitor for such occurrences to ensure the integrity and functionality of security products in place. The rule can generate false positives, particularly when MsMpEng.exe crashes due to a full 'C:\' partition, which underscores the need for further investigation if an alert is generated.
Categories
- Windows
- Endpoint
Data Sources
- Application Log
Created: 2017-05-09