I posted about werfault.exe a couple of times before. Some of the posts focused on persistence mechanisms, some on lolbinish behavior, but I thought it would be good to dedicate some time to describe the actual command line arguments this program accepts…
In my opinion werfault.exe accepts the most bizarre command line arguments combos on Windows platform ever. And despite werfault.exe process being executed so many times we are yet to see a comprehensive description of the switches it relies on. And what makes them stand out is that:
- at a first glance, they look completely random
- they use / rely on a bunch of weird, unusual and undocumented arguments, and finally,
- many of them expect values in a numerical, often hexadecimal format that confuse every single analyst that ever put their eyes on it…
The below summary is my first attempt to take a stab at this topic so it may not be the most complete reference, BUT… we have to start somewhere.
The key to understanding werfault.exe command line arguments is to focus on the first switch being used. Yes, the very first thing werfault.exe is doing when it’s invoked it is checking the why:
- -e: SQM Escalation
- -e -p <num> -t <num> -r <num> -a <num> -f <num>
- -e -p <num> -t <num> -r <num> -a <num> -f <num> -h <num>
- -k : kernel-related
- -k -lc <dump file name>
- -k -lcq
- -k -q
- -k -rq
- -k -l <string> <string> — live kernel
- -k -lc <string> <string> — live kernel
- -p: ?
- -p <num> -h <num>
- -pr: ?
- -pss: ?
- -s: process executed via SilentProcessExit mechanism
- -s -t <num> -i <num> -e <num> -c <num>
- -u : user mode
- -u -p <num> -s <num>
- /h – elevated hang reporting
- /h /shared <shared>
- /h /shared <shared> /t <num> /p <num>
- /hc – ?
- ??? -nonelevated – ??
The command line switch separator (- or /) that I listed above is actually important and its hardcoded form is what the program expects and compares against. This is somehow unusual and it escapes a typical pattern we are familiar with (either of these two characters – or / are commonly accepted as switch indicators).
I am aware of many other command line switches, but I am still browsing through the code, so I will update this post when I get more info.
What’s the lessons learned here?
If you see werfault.exe process in Sysmon or 4688 logs try to figure out what their execution is indicating. Sometimes, they may be an early warning of malware trying to do something that is prohibited on newer versions of Windows, but was fully acceptable on older. Also, if any program crashes, and it involves werfault.exe, you can use it to provide a feedback to the vendor/software developer…
There is literally a lot of goodness that can come out from looking at werfault.exe process invocations in general. Whatever crashes, hangs, breaks usual patterns is always an interesting thing to look at.