heroui logo

System Information Discovery Detection

Splunk Security Content

View Source
Summary
The System Information Discovery Detection rule identifies system information discovery techniques commonly used by attackers. It detects specific command executions such as `wmic qfe`, `systeminfo`, and `hostname`, which are often utilized to gather valuable system configuration details. By leveraging data from Endpoint Detection and Response (EDR) agents, particularly from process execution logs, the rule provides insights into potentially nefarious activity. If an attacker's actions are confirmed, they could exploit the gathered information for further attacks, including privilege escalation, persistence, or data exfiltration. The detection is crafted from several log sources, mainly focusing on Sysmon EventID 1, Windows Event Log Security 4688, and CrowdStrike's ProcessRollup2. These sources collectively offer a comprehensive view of suspicious process behaviors on the endpoint level, enabling organizations to respond promptly to potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1082
Created: 2024-12-16