
Summary
The rule 'Windows Wmic Systeminfo Discovery' detects the execution of Windows Management Instrumentation Command-line (WMIC) commands that are specifically aimed at computer system discovery on Windows machines. It focuses on monitoring commands such as 'wmic computersystem', which retrieves critical system information such as the model, manufacturer, name, domain, and other attributes. While these commands are legitimate tools for IT administrators involved in inventory management and system troubleshooting, they can also be exploited by malicious actors to perform reconnaissance, gathering sensitive information about the target environment to plan further attacks. By identifying and alerting on these WMIC queries, security teams can detect unauthorized information gathering attempts and respond to potential threats more effectively. The detection relies on logs generated from various sources including Sysmon EventID 1 and Windows Event Log Security 4688, ensuring comprehensive visibility over potentially malicious activities.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Process
ATT&CK Techniques
- T1082
Created: 2025-08-25