heroui logo

WMIC XSL Execution via URL

Splunk Security Content

View Source
Summary
The WMIC XSL Execution via URL detection rule identifies potentially malicious usage of the Windows Management Instrumentation Command-line (WMIC) tool. This tactic commonly involves invoking `wmic.exe` to load remote XSL files via HTTP or HTTPS URLs, which can be indicative of application control bypass scenarios. This behavior allows attackers to execute JScript or VBScript contained within the XSL file, potentially leading to arbitrary code execution, privilege escalation, or persistence on compromised systems. The rule employs various data sources, including Sysmon and Windows Event Log Security, focusing particularly on command-line parameters that specify loading resources via URLs. Given the trusted nature of the WMIC tool in Windows, such utilization should be closely monitored and assessed for malicious intent.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1220
Created: 2024-12-10