
Summary
This analytic rule detects potentially malicious use of Windows Management Instrumentation (WMI) for process creation or execution. WMI is a powerful tool in Windows that allows for administrative tasks and can be exploited by adversaries to execute commands remotely or locally without raising suspicion. The rule utilizes data from Endpoint Detection and Response (EDR) sources, monitoring for command-line events that contain keywords such as 'process', 'call', and 'create'. The presence of these keywords, especially in environments where they are not typically used for legitimate purposes, could indicate attempts by threat actors to deploy backdoors or malicious payloads. By leveraging security logs, such as Sysmon and Windows Event Logs, the detection aims to identify potentially unauthorized or harmful behaviors that could lead to privilege escalation or persistence threats within the network. This rule is crucial for proactive threat hunting and incident response efforts.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1047
Created: 2024-11-13