166. Detecting Windows Problem Reporting Abuse

Hello everyone!

You can get detection and hunting ideas not only from threat actors' behaviors, but also from security researchers! For example, Adam shared an interesting case of Windows Problem Reporting abuse.

This executable has many command line arguments, and -boot one allows to load the following DLL: C:\Windows\System32\offdmpsvc.dll. It's not available by default, so an adversary can use it to write a payload there.

It means we can use this argument for detection:

event_type: "processcreatewin"

AND

proc_file_name: "wermgr.exe"

AND

cmdline: "boot"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge