heroui logo

Potential Tampering With Security Products Via WMIC

Sigma Rules

View Source
Summary
This rule detects potential tampering with security products through the Windows Management Instrumentation Command-line (WMIC) utility. It focuses on command-line patterns indicative of uninstalling or terminating security solutions such as antivirus software. The detection mechanism involves monitoring the CommandLine field for several predefined patterns associated with WMIC commands, including uninstallation requests and process termination efforts targeted at known security products. The condition to trigger this detection requires that at least one command-line selection related to WMIC execution matches any of the product names linked to common security applications. Given the increasing targeting of security tools by malware, this rule is critical for identifying potentially malicious actions intended to circumvent defenses. It is essential for organizations to be vigilant against threats that attempt to delete or disable security applications, especially in cloud-based environments where such actions may lead to higher risks of breaches or data loss.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2021-01-30