heroui logo

Remote WMI Command Attempt

Splunk Security Content

View Source
Summary
This detection rule identifies attempts to execute the `wmic.exe` command with the `node` switch, which is indicative of remote command execution capabilities. By leveraging data sourced from Endpoint Detection and Response (EDR) agents, specifically monitoring process creation events, this rule is crucial for identifying potential lateral movement or remote code execution attempts by attackers. The detection focuses on command-line arguments and can capture both local and remote process spawning attempts. If such activity is confirmed to be malicious, it may allow attackers to gain remote control over systems, execute arbitrary commands, and pursue escalation of privileges, posing significant risks to organizational security. Therefore, this rule is a valuable tool to enhance incident detection and response within the endpoint security domain.
Categories
  • Endpoint
  • Windows
  • Infrastructure
Data Sources
  • Process
  • Windows Registry
  • Windows Registry
  • Image
ATT&CK Techniques
  • T1047
Created: 2024-11-13