heroui logo

Wmiprvse Wbemcomn DLL Hijack - File

Sigma Rules

View Source
Summary
This rule detects the creation of a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory, which is indicative of a WMI DLL Hijack attack. Threat actors may leverage this tactic to compromise the Windows Management Instrumentation (WMI) environment, allowing them to execute malicious commands or escalate privileges by substituting legitimate DLLs with malicious ones. The detection is performed by monitoring file events, specifically targeting instances where the specified DLL is created. The rule is relevant in scenarios involving lateral movement and execution of commands across a network, as attackers may use such techniques to maintain persistence or control over compromised systems. The detection condition is triggered upon confirming the image path and evaluating the target filename for the specified DLL.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2020-10-12