heroui logo

MS Scripting Process Loading WMI Module

Splunk Security Content

View Source
Summary
This detection rule aims to identify the loading of WMI modules by Microsoft scripting processes, specifically 'wscript.exe' and 'cscript.exe'. By monitoring Sysmon EventCode 7, the rule captures instances where these scripting engines utilize specific WMI-related DLLs. This behavior can serve as an indicator of malicious activity, such as the use of malware like the FIN7 implant, which employs JavaScript to execute WMI queries. The primary concern is that such queries can be used by attackers to collect sensitive information about the host system and facilitate persistent access within the target environment.
Categories
  • Endpoint
Data Sources
  • Pod
ATT&CK Techniques
  • T1059
  • T1059.007
Created: 2024-11-13