
Summary
The 'Suspicious WMI Event Subscription Created' rule detects the creation of Windows Management Instrumentation (WMI) Event Subscriptions, which can be exploited by attackers for persistence or privilege escalation. The rule operates by monitoring specific events generated by Sysmon and Windows endpoint logs, specifically targeting event code 21. The detection logic inspects fields related to event operations and consumer types that may indicate suspicious behavior. It helps identify potential abuse by exposing unauthorized changes made to WMI subscriptions used to execute malicious scripts or commands. The detection rule provides guidance on triage steps, investigates the creation context, and analyzes potential false positive scenarios to ensure legitimate administrative actions are not misclassified as threats. The overarching goal of the rule is to enhance the security posture against abuse of WMI for persistent malicious intent.
Categories
- Windows
- Endpoint
Data Sources
- WMI
- Windows Registry
- Logon Session
- Application Log
- Sensor Health
ATT&CK Techniques
- T1546
- T1546.003
Created: 2023-02-02