
Summary
This rule detects the use of the Evil-WinRM tool, which is used by adversaries to gain unauthorized access to Windows systems over the Windows Remote Management (WinRM) service. The detection is based on the creation of processes related to the 'ruby.exe' executable, specifically monitoring for command lines that contain flags associated with setting up an interactive WinRM session, such as '-i', '-u', and '-p'. By identifying these process creation events, security teams can flag potential lateral movement attempts by attackers utilizing stolen credentials.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1021.006
Created: 2022-01-07