heroui logo

Windows WMI Process And Service List

Splunk Security Content

View Source
Summary
The 'Windows WMI Process And Service List' detection rule identifies suspicious Windows Management Instrumentation (WMI) command lines used to query for running processes and services in a Windows environment. It leverages input from Endpoint Detection and Response (EDR) agents, specifically through events recorded by Sysmon and Windows Event Logs, which detail process creation events. This rule is significant as attackers often exploit WMI for reconnaissance, allowing them to gather critical information about system processes and services. Such behaviors can potentially indicate that the system has been compromised, leading to privilege escalation or establishing persistence by the attacker. By effectively monitoring for these command lines, the detection rule can help in early identification of malicious activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1047
Created: 2024-11-13