heroui logo

PowerShell Invoke CIMMethod CIMSession

Splunk Security Content

View Source
Summary
This detection rule is designed to identify the execution of potentially malicious PowerShell commands that involve the `New-CIMSession` and `Invoke-CIMMethod` cmdlets. These cmdlets can be leveraged for remote code execution, similar to the behavior of the `Invoke-WMIMethod` cmdlet, which is often a vector for unauthorized access through NTLMv2 pass-the-hash techniques. The rule uses PowerShell Script Block Logging (specifically EventCode 4104) to monitor for use of these cmdlets in the ScriptBlockText field. If triggered, the detection can indicate an attempt to execute commands remotely, which is significant for threat detection, particularly in the context of lateral movement within networks.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
ATT&CK Techniques
  • T1047
Created: 2024-11-13