heroui logo

Potential Product Reconnaissance Via Wmic.EXE

Sigma Rules

View Source
Summary
This detection rule aims to identify potential reconnaissance activities using the Windows Management Instrumentation Command-line (WMIC) tool, specifically targeting instances where WMIC is used to retrieve information about installed antivirus and firewall products. The primary focus of this rule is on the execution of the 'wmic.exe' application, which can be leveraged by attackers to enumerate security solutions on a target Windows machine. The rule operates by monitoring process creation logs, and it specifies conditions where the command line contains the term 'Product', indicative of inquiries made regarding installed software. By detecting this activity, security teams can investigate possible reconnaissance efforts, providing an avenue for preemptive incident response actions against potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-02-14