
Summary
This analytic detection rule focuses on identifying instances where `wmiprvse.exe` spawns a process associated with LOLBAS (Living Off the Land Binaries and Scripts), which are commonly abused by attackers for lateral movement or remote code execution activities. It utilizes data from Endpoint Detection and Response (EDR) agents, particularly observing process creation events. By examining the parent-child process relationships, the rule is structured to alert on specific known LOLBAS binaries that could indicate a malicious activity, such as executing arbitrary code and potentially escalating privileges within a network environment. The detection not only helps in early identification of suspicious activity but also assists incident response teams in mitigating risks associated with such behavior.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Windows Registry
- Sensor Health
ATT&CK Techniques
- T1047
Created: 2025-05-02