Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze

Original Source: [Sigma source]
Title: Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze
Status: experimental
Description:Detects process access events where WerFaultSecure accesses MsMpEng.exe with dbgcore.dll or dbghelp.dll in the call trace, indicating potential EDR freeze techniques. This technique leverages WerFaultSecure.exe running as a Protected Process Light (PPL) with WinTCB protection level to call MiniDumpWriteDump and suspend EDR/AV processes, allowing malicious activity to execute undetected during the suspension period.
References:
  -https://blog.axelarator.net/hunting-for-edr-freeze/
Author: Swachchhanda Shrawan Poudel (Nextron Systems)
Date: 2025-11-27
modified:None
Tags:
  • -'attack.defense-evasion'
  • -'attack.t1562.001'
Logsource:
  • category: process_access
  • product: windows
  • definition: Requires Sysmon Event ID 10 (ProcessAccess) with CallTrace enabled. Example sysmon config snippet with grouping, as logging individual ProcessAccess events can generate excessive logs: <ProcessAccess onmatch="include"> <Rule groupRelation="and"> <TargetImage condition="end with">\MsMpEng.exe</TargetImage> <SourceImage condition="end with">\WerFaultSecure.exe</SourceImage> </Rule> </ProcessAccess>
Detection:
  selection:
    SourceImage|endswith: '\WerFaultSecure.exe'
    TargetImage|endswith: '\MsMpEng.exe'
    CallTrace|contains:
      -'\dbgcore.dll'
      -'\dbghelp.dll'

  condition:selection
Falsepositives:
  -Legitimate Windows Error Reporting operations
Level: high