
Summary
This detection rule targets the execution of wmic.exe with parameters that allow for spawning processes on remote systems via WMI. WMI (Windows Management Instrumentation) is often exploited by attackers for lateral movement and remote code execution, posing a significant risk to enterprise environments. The rule leverages telemetry from Endpoint Detection and Response (EDR) agents, focusing on command-line executions and process-based data captured in the `Processes` node of the `Endpoint` data model. Confirmed instances of this behavior could indicate malicious activities, including arbitrary code execution on remote systems, which can lead to broader network compromise. The detection is facilitated through structured queries to capture specific process invocation patterns, ensuring that relevant activities are monitored effectively. Given the potential for benign use of wmic.exe by administrators, the rule also includes considerations for false positives, specifically in scenarios involving legitimate administrative tasks.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- WMI
- Application Log
ATT&CK Techniques
- T1047
Created: 2025-01-27