
Summary
This rule is designed to detect suspicious child processes spawned by the Windows Error Reporting Manager (wermgr.exe). The legitimate wermgr.exe process is responsible for the submission of error reports to Microsoft, but malicious actors often exploit it to execute arbitrary commands or to escalate privileges undetected. The rule focuses on monitoring process creation activities, specifically looking for instances where a child process ends with specific executable names (like cmd.exe, powershell.exe, among others) with wermgr.exe as their parent process. Additionally, there is a particular filter that catches attempts to invoke rundll32.exe with command lines indicative of unwanted behavior, such as calls to WerConCpl.dll. By capturing these patterns, the rule enhances visibility into potential abuses of the Windows Error Reporting functionality, allowing for timely investigation and response.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-10-14