
Summary
This detection rule identifies the creation of a file named "wpbbin.exe" within the system's System32 directory, which can indicate a UEFI-based persistence mechanism. Such methods allow malicious actors to persistently embed their code into system firmware, enabling re-infection on system reboot. The rule is specifically targeted at Windows systems and employs file event logging to monitor for suspicious file creations that match the designated filename. In the context of advanced persistent threats (APTs), the creation of the wpbbin executable could signify an early-stage compromise involving firmware attacks that utilize legitimate software weaknesses. Given that hardware manufacturers may also use this filename, it includes considerations for potential false positives to minimize disruption while maintaining effectiveness against real threats. To mitigate false positives, further investigation would be advisable when this rule triggers.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2022-07-18