
Summary
This rule detects a specific threat associated with the Windows Management Instrumentation (WMI) subsystem, particularly focusing on the potential exploitation of the `wbemcomn.dll` file through DLL hijacking techniques. DLL hijacking can allow threat actors to execute malicious code in a trusted context. The detection mechanism activates when a file named `wbemcomn.dll` is created in the `C:\Windows\System32\wbem\` directory, as this location is critical for WMI functionality. The rule looks for Windows Event ID 5145 indicating a file creation event, while also using a filter to check the user context related to this event. This ensures that only instances of the DLL being created by a network service account (denoted by subject usernames ending with `$`) will trigger an alert, reducing noise from legitimate file operations. Given the high level of risk associated with such an attack, this detection rule is essential for maintaining the integrity of the Windows environment against lateral movement attempts via WMI.
Categories
- Windows
- Endpoint
Data Sources
- File
- Network Traffic
- Process
ATT&CK Techniques
- T1047
Created: 2020-10-12