
Summary
The "Windows Wmic Memory Chip Discovery" detection rule identifies the execution of WMIC commands that pertain to querying memory chip information on Windows systems. This analysis highlights the balance between legitimate administrative usage of WMIC and its potential exploitation by malicious actors as part of reconnaissance efforts. The rule specifically targets the execution of commands containing 'wmic memorychip', tracking processes that may reveal installed RAM details. By leveraging log data from Sysmon, Windows Event Logs, and CrowdStrike, the detection can discern whether WMIC queries are used for benign purposes or are indicative of unauthorized data gathering attempts. It emphasizes the need for close monitoring to mitigate risks associated with information leakage.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
- Network Traffic
- Command
ATT&CK Techniques
- T1082
Created: 2025-08-25