
Summary
This detection rule focuses on identifying malicious activities related to Windows Management Instrumentation (WMI) that may be used by adversaries to establish persistence on Windows systems. Specifically, it looks for script block logging entries that indicate the creation of WMI event subscriptions through PowerShell scripts, which can be utilized to trigger execution of arbitrary code. The rule monitors for the `New-CimInstance` PowerShell command targeting specific WMI namespaces and classes related to event filtering and command line execution. It emphasizes that script block logging must be enabled for accurate detection. This technique is associated with privilege escalation and has been documented in multiple threat intelligence resources. Understanding the implications of these artifacts can help in proactively monitoring and detecting suspicious behavior indicative of WMI persistence mechanisms.
Categories
- Endpoint
- Windows
Data Sources
- Script
- Process
ATT&CK Techniques
- T1546.003
Created: 2021-08-19