heroui logo

Office Product Spawning Wmic

Splunk Security Content

View Source
Summary
The 'Office Product Spawning Wmic' rule was designed to detect instances where Windows Office applications such as Word, Excel, PowerPoint, and others spawn the `wmic.exe` process, particularly when the command line indicates a process creation command related to WMIC. This detection mechanism focuses on the relationships between processes, utilizing data from Endpoint Detection and Response (EDR) agents to flag potentially malicious activity consistent with the Ursnif malware family, which is notorious for exploiting legitimate Office applications to execute commands. Although this analytic has been deprecated and replaced by a more generalized rule termed 'Windows Office Product Spawned Uncommon Process', the original rule remains relevant for understanding how attackers manipulate trusted software to compromise systems. To effectively implement this detection, organizations must ensure they are capturing detailed process information through EDR data, which includes command lines, process IDs, and parent-child process relationships—key indicators of malicious behavior in a Windows environment.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1047
  • T1566
  • T1566.001
Created: 2025-01-13