heroui logo

WhoAmI as Parameter

Sigma Rules

View Source
Summary
The 'WhoAmI as Parameter' rule is designed to identify suspicious process creation events on Windows systems where the `whoami` command is used as a parameter in the command line of a process. This behavior can be indicative of malicious activity, especially in the context of privilege escalation techniques such as EfsPotato, which leverages this command to gain access to specific user accounts or escalate privileges without detection. The rule specifically looks for instances where the command line includes the combination of an executable name followed by `whoami`, signifying the execution of a potentially malicious or unauthorized command. As this rule operates within the process creation log source, it flags any process that fits this pattern with a high severity level, thus aiding in early detection of potentially harmful actions being executed in the environment.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
Created: 2021-11-29