heroui logo

Remote System Discovery with Wmic

Splunk Security Content

View Source
Summary
This analytic rule, authored by Mauricio Velazco of Splunk, detects the execution of `wmic.exe` with particular command-line arguments aimed at discovering remote systems within a domain. Utilizing telemetry from Endpoint Detection and Response (EDR) agents, this rule focuses on specific process names and command-line executions. The appearance of `wmic.exe` can signify potential reconnaissance efforts by adversaries, which may allow them to construct a view of network resources and Active Directory structures. Such reconnaissance activities, if maliciously confirmed, could facilitate unauthorized access and data exfiltration, making this detection crucial for cybersecurity analysts.
Categories
  • Endpoint
  • Windows
  • Network
Data Sources
  • Process
  • Windows Registry
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1018
Created: 2024-11-13