Suspicious Microsoft Workflow Compiler Usage
The use of Microsoft Workflow Compiler (microsoft.workflow.compiler.exe), a rarely utilized executable typically found in C:\Windows\Microsoft.NET\Framework64\v4.0.30319, can indicate malicious intent such as code execution or persistence mechanisms, potentially leading to unauthorized access.
The Microsoft Workflow Compiler (microsoft.workflow.compiler.exe) is a legitimate Microsoft executable, but its usage is uncommon in typical environments. This makes it an attractive target for attackers looking to bypass security controls and execute malicious code. Located in C:\Windows\Microsoft.NET\Framework64\v4.0.30319, the executable is designed for compiling workflow definitions, but can be abused to execute arbitrary code. Its rare usage means that any execution of this binary warrants further investigation. This activity is often seen after initial compromise, as an attempt to establish persistence or execute payloads.
Attack Chain
- An attacker gains initial access to the system, potentially through exploitation of a vulnerability or social engineering.
- The attacker leverages an existing scripting capability (e.g., PowerShell) to stage the malicious payload.
- The attacker executes microsoft.workflow.compiler.exe to compile and execute a malicious workflow definition.
- The workflow definition contains embedded code or calls out to external resources to download and execute additional payloads.
- The compiled code executes in the context of the workflow compiler process, potentially bypassing application whitelisting.
- The attacker establishes persistence by creating a scheduled task or modifying registry keys to automatically execute the malicious workflow on system startup.
- The attacker performs lateral movement using the compromised system as a pivot point to access other systems within the network.
Impact
Successful exploitation can allow attackers to execute arbitrary code, bypass application whitelisting, and establish persistence on compromised systems. The lack of widespread usage of the Microsoft Workflow Compiler makes its malicious use difficult to detect, potentially allowing attackers to maintain a foothold in the environment for extended periods. If the attacker achieves persistence and lateral movement, it could lead to data exfiltration, ransomware deployment, or other significant security incidents.
Recommendation
- Deploy the Sigma rule
Suspicious Microsoft Workflow Compiler Executionto detect the execution ofmicrosoft.workflow.compiler.exewith unusual parent processes. - Enable Sysmon process creation logging (Event ID 1) or Windows Event Log Security (4688) to ensure the necessary telemetry for the detection is available.
- Investigate any identified instances of
microsoft.workflow.compiler.exeexecution, paying close attention to the parent process, command-line arguments, and network activity. - Monitor process execution data for unusual parent-child process relationships involving
microsoft.workflow.compiler.exe, especially if the parent process is a scripting engine like PowerShell or cmd.exe. - Review and tune the
suspicious_microsoft_workflow_compiler_usage_filtermacro in the original Splunk search to reduce false positives in your environment.
Detection coverage 2
Suspicious Microsoft Workflow Compiler Execution
mediumDetects the execution of microsoft.workflow.compiler.exe with unusual parent processes, potentially indicating malicious use.
Microsoft Workflow Compiler with Suspicious Command Line
mediumDetects suspicious command-line arguments used with microsoft.workflow.compiler.exe, such as specifying an output file in a world-writable directory.
Detection queries are kept inside the platform. Get full rules →