Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_lolbin_wfc.yml
T
2022-10-28 15:06:36 +02:00

24 lines
836 B
YAML

title: Use of Wfc.exe
id: 49be8799-7b4d-4fda-ad23-cafbefdebbc5
status: experimental
description: The Workflow Command-line Compiler can be used for AWL bypass and is listed in Microsoft's recommended block rules.
references:
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Wfc/
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
author: 'Christopher Peacock @SecurePeacock, SCYTHE @scythe_io'
date: 2022/06/01
tags:
- attack.defense_evasion
- attack.t1127
logsource:
category: process_creation
product: windows
detection:
selection:
- Image|endswith: '\wfc.exe'
- OriginalFileName: 'wfc.exe'
condition: selection
falsepositives:
- Legitimate use by a software developer
level: medium