heroui logo

Suspicious Processes Spawned by WinRM

Sigma Rules

View Source
Summary
This rule detects suspicious processes spawned from the Windows Remote Management (WinRM) host process, specifically assessing instances where the parent image is `wsmprovhost.exe`. Hardware or administrative processes that exploit WinRM for launching potentially malicious commands—often associated with abuse of remote management features—are monitored by checking if the child processes correspond to commonly exploited tools like command shells (cmd, sh, bash), PowerShell variants, or administrative utilities (schtasks, certutil, whoami). The detection logic is straightforward and will trigger if any of the specified child process images are found to have been spawned from the legitimate WinRM parent process, indicating a possible security incident. Given that legitimate WinRM usage may trigger false positives, it is recommended that each alert is investigated to confirm malicious intent before taking action.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2021-05-20