
Summary
This detection rule identifies instances where WmiPrvSE.exe is responsible for spawning other processes in a Windows environment. The Windows Management Instrumentation (WMI) Provider Service (WmiPrvSE.exe) can be utilized for various legitimate administrative tasks, but its misuse can signal potentially malicious activity, such as remote command execution or exploitation of the WMI to facilitate lateral movement. The rule's detection logic focuses on capture a process creation event where the parent process is WmiPrvSE.exe, filtered further to exclude cases tied to specific logon IDs and instances where WmiPrvSE is invoked legitimately by specific users or processes. The output will flag occurrences where these exclusions do not apply, providing insights for analysts to assess confirmed or false positive alerts, given the tendency of legitimate processes to sometimes trigger the detection criteria. This rule is a part of a broader set of defenses against common attack vectors targeting Windows operating systems.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2019-08-15