heroui logo

Successful Account Login Via WMI

Sigma Rules

View Source
Summary
The rule "Successful Account Login Via WMI" identifies successful logon attempts that utilize Windows Management Instrumentation (WMI) services. It specifically looks for Event ID 4624, which indicates a successful logon, and the ProcessName must end with '\WmiPrvSE.exe', signifying that the logon occurred via a WMI provider. This detection mechanism helps security teams to monitor unusual account activity executed through WMI, which can often be leveraged by attackers for lateral movement or executing commands under the guise of legitimate processes. Despite its effectiveness, the rule is set at a low alert level due to potential false positives arising from legitimate system administration tools and monitoring software that may invoke WMI for various tasks.
Categories
  • Windows
  • Endpoint
Data Sources
  • User Account
  • WMI
  • Logon Session
Created: 2019-12-04