
Summary
This detection rule identifies the execution of the binary file "wpbbin.exe", which is associated with the UEFI (Unified Extensible Firmware Interface) persistence techniques aimed at maintaining a foothold on compromised systems. Utilizing UEFI for malicious activity allows persistence even through reinstallation of the operating system, as it resides in the firmware. The rule specifically looks for process creation events where the image path matches "C:\Windows\System32\wpbbin.exe". Such behavior is indicative of potential persistence mechanisms employed by adversaries to evade detection and maintain control over the target machine. The rule is configured to trigger upon process creation, focusing on the specified image file as its key detection criteria. Note that there may be legitimate instances of this file being executed by hardware manufacturers, which should be taken into account when analyzing alerts.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-07-18