
Summary
The analytic rule identifies potential malicious activities related to remote process instantiation on endpoints using Windows Management Instrumentation (WMI) via PowerShell. Specifically, it captures the execution of the `Invoke-WmiMethod` cmdlet with parameters commonly associated with remote process creation. This detection utilizes PowerShell Script Block Logging to monitor for specific script block patterns that indicate such actions, signifying a risk of lateral movement or remote code execution by adversaries. Given the severity of these capabilities, confirming such activities as malicious could lead to significant compromises in network integrity and persistence.
Categories
- Endpoint
Data Sources
- Persona
ATT&CK Techniques
- T1047
Created: 2024-11-13