heroui logo

Wmiprvse Wbemcomn DLL Hijack

Sigma Rules

View Source
Summary
This detection rule targets a specific type of attack known as a WMI DLL Hijack, where a malicious actor creates a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory, followed by an attempt to load it through the legitimate Windows Management Instrumentation (WMI) process, `wmiprvse.exe`. The presence of this file in the specific location indicates potential nefarious activities, as WMI is often abused for lateral movement within a network. The rule is set to trigger when `wmiprvse.exe` loads the potentially malicious `wbemcomn.dll`, allowing for the identification of this tactic used by threat actors. The rule is marked with a high alert level due to the serious implications of a successful DLL hijack, which can lead to escalated privileges and unauthorized access to systems.
Categories
  • Windows
  • Endpoint
Data Sources
  • Image
Created: 2020-10-12