heroui logo

New Process Created Via Wmic.EXE

Sigma Rules

View Source
Summary
This rule is designed to detect the creation of new processes via the Windows Management Instrumentation Command-line (WMIC) tool, specifically by monitoring activities that utilize the 'process call create' command within WMIC. WMIC is a powerful tool that can be used for system management in Windows environments, but malicious actors may exploit its capabilities to execute processes remotely or locally without triggering typical detection mechanisms. By evaluating the command line parameters used with WMIC to include keywords such as 'process', 'call', and 'create', the rule aims to identify suspicious behavior indicative of potential exploitation, lateral movement, or pre-execution steps of malicious activities. This detection is situated within the Domain of Endpoint security, leveraging the process creation log source to track WMIC activities effectively. The detection will log instances where the WMIC process ends with 'wmic.exe' and confirms that the command line contains a specific set of terms, crucial for identifying unauthorized process executions.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1047
Created: 2019-01-16