heroui logo

WmiPrvSE Suspicious Child Process

Anvilogic Forge

View Source
Summary
The rule detects suspicious child processes spawned by the Windows Management Instrumentation Provider Service (WmiPrvSE.exe), a legitimate Windows component used for system management. This service runs with high privileges, making it a potential target for exploitation by threat actors, particularly in Living Off the Land scenarios. The detection logic is based on identifying known malware-related processes being launched by WmiPrvSE.exe. It specifically looks for the spawning of scripting or executable processes such as 'certutil', 'cscript', and 'mshta', often associated with malicious activity. The rule also excludes certain benign processes and specific user accounts to mitigate false positives, allowing for more accurate identification of potentially malicious actions. The use of Sysmon event logging helps improve the visibility of process creations and their relationships, assisting in the detection of unusual behaviors that may indicate the execution of malware or other harmful scripts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1047
Created: 2025-08-12