heroui logo

WMImplant Hack Tool

Sigma Rules

View Source
Summary
The WMImplant Hack Tool detection rule is designed to identify the execution of PowerShell scripts that utilize parameters associated with the WMImplant tool, a potential framework for unauthorized administrative control. The rule focuses on detecting specific keywords in the script block text that are indicative of using WMImplant functionalities, such as manipulating user credentials, executing commands, and modifying registry settings. The rule operates under the assumption that Script Block Logging must be enabled in order to collect the necessary script execution data for evaluation. False positives can occur in cases where legitimate administrative scripts duplicate the same keywords identified in the detection logic. This detection is crucial as WMImplant is often used in post-exploitation scenarios to maintain persistence within an environment. The detection leverages a high-level threat categorization due to the capabilities associated with WMImplant.
Categories
  • Windows
  • Endpoint
Data Sources
  • Script
  • Process
Created: 2020-03-26