heroui logo

Impacket Lateral Movement WMIExec Commandline Parameters

Splunk Security Content

View Source
Summary
This analytic rule detects the use of Impacket's `wmiexec.py`, a common tool utilized by threat actors for lateral movement within networks. By analyzing command-line parameters associated with processes spawned by `wmiprvse.exe`, the rule identifies specific patterns that indicate potential misuse of the `wmiexec` utility. The detection relies on telemetry from Endpoint Detection and Response (EDR) agents, particularly monitoring Sysmon EventID 1 and Windows Event Log Security 4688. If identified as malicious, this behavior can lead to unauthorized command execution on remote systems, revealing a substantial threat to an organization's cybersecurity posture. The rule aims to proactively detect such lateral movement attempts before they can escalate into significant data breaches or further exploitation of network resources.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
  • Process
ATT&CK Techniques
  • T1021
  • T1047
  • T1053
  • T1021.002
  • T1021.003
  • T1543.003
Created: 2024-12-10