heroui logo

Hacktool - EDR-Freeze Execution

Sigma Rules

View Source
Summary
The 'Hacktool - EDR-Freeze Execution' rule is designed to detect the execution of EDR-Freeze, a malicious tool that exploits the MiniDumpWriteDump API and the WerFaultSecure.exe process to suspend endpoint detection and response (EDR) as well as antivirus solutions on Windows systems. This rule identifies instances where EDR-Freeze is invoked by monitoring the process creation behavior. It specifically looks for processes that either contain 'EDR-Freeze' in their image path or end with the '.exe' extension, and it verifies the integrity of those processes by checking their import hashes against known values characteristic of EDR-Freeze. This tool utilizes a race condition to freeze security processes, making it particularly insidious since it does not rely on kernel-level exploits or Bring Your Own Vulnerable Driver (BYOVD) techniques; instead, it operates at the user-mode level to temporarily disable security monitoring. This detection capability is crucial for organizations to maintain robust defenses against sophisticated attacks aiming to bypass security mechanisms.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2025-09-24