Detection rules › Sigma

HackTool - EDRSilencer Execution

Severity
high
Author
@gott_cyber
Source
upstream

Detects the execution of EDRSilencer, a tool that leverages Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server based on PE metadata information.

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1562 Impair Defenses

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: selection

or:
Description|contains: EDRSilencer
Image|endswith: '\EDRSilencer.exe'
OriginalFileName: EDRSilencer.exe

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Descriptionmatch
  • EDRSilencer
Imageends_with
  • \EDRSilencer.exe
OriginalFileNameeq
  • EDRSilencer.exe