
Summary
This rule is designed to detect the execution of the Windows Management Instrumentation Command-line (WMIC) tool, specifically when it is called with the 'csproduct' argument. The 'csproduct' argument is used to extract detailed information about the system's hardware configuration, including the make, model, and vendor information. Such reconnaissance activities are often precursors to more aggressive attacks, allowing threat actors to gather information about the target environment. This detection mechanism works by monitoring process creation events on Windows systems and looking for processes that call 'wmic.exe' along with the specified command line argument. The rule helps in identifying potentially malicious reconnaissance activities performed by adversaries, who may use this information to inform their attack strategies. False positives are acknowledged as 'Unknown', indicating that there may be legitimate uses of WMIC in this manner that could trigger the detection.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Process
Created: 2023-02-14