heroui logo

Suspicious WMI Image Load from MS Office

Elastic Detection Rules

View Source
Summary
The rule detects suspicious image loads of `wmiutils.dll` from Microsoft Office processes, which may indicate malicious activity utilizing Windows Management Instrumentation (WMI) to spawn child processes stealthily. WMI is a powerful management framework on Windows systems, and adversaries often exploit it to execute code and evade traditional security measures. This detection rule analyzes event categories related to library and process actions, specifically targeting processes such as WINWORD.EXE, EXCEL.EXE, and others. It utilizes an EQL query format, checking for the loading of `wmiutils.dll` and assessing risk based on predefined thresholds.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Image
  • File
ATT&CK Techniques
  • T1047
Created: 2020-11-17