
Summary
The 'Wmic Group Discovery' rule is an analytic designed to identify the usage of 'wmic.exe' for enumerating local groups on Windows endpoints. By analyzing command-line details from process execution logs provided by Endpoint Detection and Response (EDR) agents, the rule monitors for reconnaissance activities that may signal an attacker's attempts at privilege escalation or lateral movement. This process is crucial as it aids in identifying malicious activities aimed at mapping privileged groups, which can enhance an attacker's ability to exploit and persist within a compromised environment.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1069
- T1069.001
Created: 2024-11-13