heroui logo

Windows Hotfix Updates Reconnaissance Via Wmic.EXE

Sigma Rules

View Source
Summary
This detection rule targets the execution of 'wmic.exe' with the 'qfe' argument in Windows environments. The command is commonly used to fetch installed hotfix updates on the system. Since this information can aid attackers and pentesters in system enumeration during reconnaissance phases, monitoring this behavior is essential in identifying potential malicious activities. The rule triggers on a process creation event when 'wmic.exe' executes with a command line containing ' qfe'. False positives are anticipated, but they are currently classified as 'unknown'. Overall, a medium alert level indicates the need for a watchful approach without immediate escalation unless further corroborated by other suspicious indicators.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-06-20