
Summary
The detection rule for "Potential Suspicious Mofcomp Execution" identifies potentially malicious usage of the 'mofcomp' tool, which is a Microsoft utility used to compile Managed Object Format (MOF) files into the Windows Management Instrumentation (WMI) repository. It highlights scenarios where 'mofcomp' is executed as a child process of potentially suspicious process creators such as command-line interpreters or scripting engines, or if the command line contains paths often associated with malicious activities (e.g., temporary directories). This rule is particularly important as attackers can exploit 'mofcomp' to execute malicious MOF scripts, allowing them to manipulate the WMI repository for various malicious purposes, including persistence and reconnaissance. The rule comprises several detection criteria aimed at minimizing false positives by filtering out legitimate uses of the tool, specifically by examining the parent process and command line arguments of the execution.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-07-12