
Summary
This rule detects potentially suspicious command executions via Windows Management Instrumentation (WMI), specifically targeting the execution of 'cmd.exe' initiated by 'WmiPrvSE.exe'. Such behavior can be indicative of adversaries attempting lateral movement within a network by executing commands on remote systems. The rule leverages event data from various sources related to endpoint and Windows processes, focusing on instances where certain command-line arguments suggest potential misuse of system capabilities. A risk score of 47 categorizes this activity as medium severity, necessitating monitoring and investigation, especially considering its implications in the context of potential command execution by adversarial actors. The rule's design enables security teams to effectively filter through legitimate administrative actions while flagging potentially harmful ones for further analysis.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- WMI
- Application Log
- Logon Session
ATT&CK Techniques
- T1047
- T1059
- T1059.003
Created: 2020-10-19