Suspicious WerFault Child Process Abuse
This rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.
This detection identifies suspicious child processes spawned by WerFault.exe, the Windows Error Reporting tool. Attackers can abuse WerFault by manipulating the SilentProcessExit registry key to execute malicious processes. This technique allows for defense evasion, persistence, and privilege escalation. The detection focuses on WerFault processes with specific command-line arguments (-s, -t, and -c) known to be used in SilentProcessExit exploitation, while excluding legitimate executables like Initcrypt.exe and Heimdal.Guard.exe. The rule helps defenders identify potential attempts to hijack the error reporting mechanism for malicious purposes. The monitored data sources include Windows Event Logs, Sysmon, Elastic Defend, Microsoft Defender XDR, and SentinelOne.
Attack Chain
- An attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).
- The attacker modifies the
SilentProcessExitregistry key to specify a malicious process to be executed when a target application crashes. This involves setting theReportingModeandDebuggervalues under theSilentProcessExitkey for the target application. - The attacker triggers a crash in the target application or waits for a legitimate crash to occur.
- WerFault.exe is invoked to handle the application crash.
- Due to the registry modification, WerFault.exe spawns the attacker-controlled process, passing command-line arguments such as
-s,-t, and-c. - The attacker-controlled process executes with the privileges of WerFault.exe, potentially achieving privilege escalation.
- The malicious process performs actions such as injecting code into other processes, establishing persistence, or exfiltrating data.
- The attacker achieves their objectives, such as maintaining persistence, escalating privileges, or evading detection.
Impact
A successful attack can lead to persistence, privilege escalation, and defense evasion. Attackers can use this technique to execute malicious code with elevated privileges, potentially bypassing security controls and gaining unauthorized access to sensitive data and system resources. The number of victims and affected sectors can vary depending on the attacker’s objectives and the scope of the initial compromise.
Recommendation
- Enable Sysmon process creation logging to capture WerFault.exe child processes (Data Source: Sysmon).
- Deploy the Sigma rule “WerFault Child Process Masquerading” to your SIEM and tune for your environment.
- Review the
SilentProcessExitregistry key for unauthorized modifications (registry_set event). - Investigate any WerFault.exe processes with command-line arguments
-s,-t, and-c(process_creation event).
Detection coverage 2
WerFault Child Process Masquerading
mediumDetects suspicious child processes of WerFault.exe with specific command-line arguments used to abuse SilentProcessExit.
WerFault SilentProcessExit Registry Modification
mediumDetects modifications to the SilentProcessExit registry key, often used to hijack WerFault for malicious purposes.
Detection queries are kept inside the platform. Get full rules →