
Summary
This analytic rule detects the establishment of permanent event subscriptions via Windows Management Instrumentation (WMI), which could indicate malicious activity aimed at maintaining persistence within a compromised system. By analyzing Sysmon's EventID 5, the rule identifies event consumers that deviate from the expected 'NTEventLogEventConsumer', suggesting a potential intrusion attempt where an attacker may use crafted scripts or binaries in response to specific system events. Identifying this activity is crucial as it may lead to severe consequences like data theft or ransomware deployment. Organizations using this rule should investigate any identified consumers that are flagged to assess their legitimacy.
Categories
- Endpoint
Data Sources
- WMI
ATT&CK Techniques
- T1047
Created: 2024-11-13