heroui logo

Process Kill Base On File Path

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect the use of `wmic.exe` with the `delete` command, which is commonly employed by adversaries to terminate processes by specifying their executable paths. The detection leverages telemetry collected from Endpoint Detection and Response (EDR) agents, specifically monitoring process names, their parent processes, and the command-line arguments executed. This behavior is typically indicative of a preparatory phase in a cyber attack, where an attacker seeks to disable security measures or other critical applications on compromised machines to facilitate malevolent actions, such as malware installation or cryptocurrency mining. By correlating events where `wmic.exe` is used to remove executable paths, defenders can identify potential initial compromise attempts and respond accordingly to avert further exploitation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13