
Summary
This detection rule is designed to identify potentially malicious activities related to Windows registry manipulation using the Windows Management Instrumentation (WMI) tool, specifically through the StdRegProv class. The rule focuses on the execution of the 'wmic.exe' process which is a command-line utility for WMI and may be used by attackers to alter registry keys without utilizing the more conventional methods such as 'reg.exe' or 'regedit.exe'. The primary intent behind using this less common method is for attackers to avoid detection by existing security tools that monitor traditional registry modification commands. By setting conditions for process creation related to 'wmic.exe' including its command-line arguments containing 'call' and 'stdregprov', this rule aims to flag suspicious attempts to manipulate the Windows registry, which typically should be reserved for legitimate administrative actions. This rule is especially pertinent for cybersecurity professionals monitoring Windows environments for advanced persistent threats (APTs) and is a part of a broader defense-in-depth strategy against potential evasion techniques employed by attackers.
Categories
- Windows
- Endpoint
Data Sources
- Process
- WMI
Created: 2025-07-30