heroui logo

GetWmiObject Ds Computer with PowerShell Script Block

Splunk Security Content

View Source
Summary
This analytic rule detects the use of the PowerShell `Get-WmiObject` command with the `DS_Computer` parameter through PowerShell Script Block Logging, specifically monitoring EventCode 4104. The rule inspects script block text for indications of queries targeting domain computers via Windows Management Instrumentation (WMI). By identifying these queries, the rule aims to mitigate risks associated with Active Directory discovery activities that adversaries commonly utilize for reconnaissance or situational awareness. The potential impact of such behavior is significant, as it may enable attackers to map domain environments, facilitate lateral movement, or escalate privileges within the network. The rule is implemented by enabling PowerShell Script Block Logging on endpoints, allowing for the analysis of these potentially malicious actions in a timely manner.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Pod
  • Pod
  • Pod
  • Pod
  • Pod
  • Pod
  • Pod
  • Pod
  • Pod
ATT&CK Techniques
  • T1018
  • T1059.001
Created: 2024-11-13