heroui logo

Potential Persistence Via VMwareToolBoxCmd.EXE VM State Change Script

Sigma Rules

View Source
Summary
This rule detects potential persistence mechanisms utilized through the VMwareToolBoxCmd.exe executable, which is part of the VMware Tools suite used to enhance the performance of virtual machines (VMs). The specific focus is on the execution of the 'VMwareToolBoxCmd.exe' with command-line arguments 'script' and 'set', indicating a script is configured to run whenever the VM state changes. Such tactics are often employed by attackers to maintain control over compromised environments. The detection logic triggers when the command line contains both keywords, and the process created ends with the expected image filename, which is important for filtering legitimate vendor usage from malicious activity. This rule is effective for monitoring Windows environments where VMware is used for virtualization, and it contributes to identifying unauthorized or potentially harmful changes to VM configurations.
Categories
  • Endpoint
  • Windows
  • Infrastructure
Data Sources
  • Process
Created: 2023-06-14