
Summary
This rule is designed to detect potentially malicious activity on Windows systems where the WMIC (Windows Management Instrumentation Command-line) process is leveraged to create autorun registry entries using `reg.exe`. Such modifications to the registry are often utilized by malware to ensure persistence on the system, allowing it to execute automatically on startup. The detection mechanism focuses on the presence of the `wmic.exe` process in conjunction with specific command line arguments that indicate registry modifications targeting common autorun paths in the Windows registry, including `Run` Keys that start applications at login. The rule incorporates detection of the command line parameters that include terms like `reg add` along with certain suspicious file paths typically associated with less trustworthy operations. As this could also trigger on legitimate administrative tasks, the rule highlights possible false positives, thus cautioning users to analyze alerts carefully before concluding a malicious entity.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Windows Registry
- Process
Created: 2025-02-17