heroui logo

Whoami Process Activity

Elastic Detection Rules

View Source
Summary
The "Whoami Process Activity" detection rule identifies suspicious usage of the `whoami.exe` command on Windows systems. The command reveals user, group, and privilege information for the logged-on user and is often leveraged by attackers post-compromise to assess their access rights and potential paths for further exploitation. This rule analyzes process start events specifically targeting instances where `whoami.exe` is executed. A series of conditions are checked to filter out normal usage patterns, particularly involving certain privileges and parent processes that are typical in administrative scripts or automated tasks. By focusing on abnormal execution patterns, the rule aids in detecting potential reconnaissance activities that may indicate unauthorized access or privilege escalation attempts. Response guidelines suggest investigating related alerts and user behaviors and initiating incident response processes, including full systems scans and updates to security policies to minimize the risk of further breaches.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Logon Session
  • Application Log
  • Malware Repository
ATT&CK Techniques
  • T1033
Created: 2020-02-18