
Summary
This detection rule monitors for the execution of the `whoami.exe` application with the `/priv` command line argument. This argument causes the tool to display the current user's privileges on a Windows system, which is a common technique used by attackers who have attempted to escalate their privileges. By tracking instances of `whoami.exe` run with this specific option, security monitoring can identify potential privilege escalation attempts or reconnaissance activities executed by an attacker. The rule is configured to trigger on any process creation event that matches the criteria, indicating a need to investigate such occurrences further, especially when detected in unusual contexts or alongside other suspicious activities.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-05-05