heroui logo

Recon Using WMI Class

Splunk Security Content

View Source
Summary
The 'Recon Using WMI Class' detection rule targets suspicious PowerShell activity associated with WMI event queries, which are commonly utilized by adversaries for reconnaissance on compromised systems. This rule specifically monitors EventCode 4104, which logs PowerShell script blocks that involve WMI queries such as 'SELECT' or 'Get-WmiObject'. It detects attempts to access specific WMI classes that provide critical system information, including 'Win32_Bios', 'Win32_OperatingSystem', and others. Such activities can indicate an attacker gathering intelligence about the target system, potentially facilitating further exploitation or lateral movement within the network. This rule emphasizes the importance of monitoring PowerShell activity, leveraging the capabilities of PowerShell Script Block Logging to identify and respond to suspicious behaviors efficiently.
Categories
  • Endpoint
Data Sources
  • Pod
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1592
  • T1059.001
Created: 2024-11-13