
Summary
This detection rule focuses on identifying suspicious execution behaviors linked to Windows Management Instrumentation (WMI) event subscriptions, which adversaries may exploit for persistence and privilege escalation. The rule captures the usage of WMI events by malicious entities, specifically targeting noted techniques like T1546.003 (Persistent execution through WMI) and T1047 (WMI). The rule utilizes Splunk queries to extract endpoint data and analyze Windows Event Logs, specifically Event ID 4688, associated with process creation events, to spot instances where WMI processes like WmiPrvSE are invoked. By logging details about the time of execution, host, user identity, parent processes, and other relevant information, the rule enables detection of abnormal patterns that could signify an ongoing compromise. It's relevant to several advanced threat actors, including APT29 and Trickbot, making its coverage essential for enhancing endpoint security against stealthy privilege escalation attempts.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- WMI
ATT&CK Techniques
- T1047
- T1546.003
Created: 2024-02-09