heroui logo

WMI Recon Running Process Or Services

Splunk Security Content

View Source
Summary
The detection rule identifies potentially malicious activity where a PowerShell script executed a WMI (Windows Management Instrumentation) query to retrieve details about running processes or services on a Windows endpoint. This is captured through EventCode 4104 using PowerShell Script Block Logging, which helps in analyzing the content of script executions. The script block text is specifically examined for WMI-related queries, particularly those that involve 'Win32_Process' and 'Win32_Service', which are essential for attackers to map out and assess security measures on compromised machines. If confirmed as malicious, this activity could enable threat actors to disable or evade security applications, which could contribute to further compromise and persistence within the targeted environment. Understanding and catching these queries is critical as they are frequently employed by malware and APT (Advanced Persistent Threat) actors during their reconnaissance phases.
Categories
  • Endpoint
Data Sources
  • Pod
  • Process
ATT&CK Techniques
  • T1592
  • T1059.001
Created: 2024-11-13