heroui logo

Suspicious WmiPrvSE Child Process

Sigma Rules

View Source
Summary
This detection rule identifies suspicious or uncommon child processes spawned by the Windows Management Instrumentation Provider Service (WmiPrvSE.exe). Observing child processes that are not typically associated with legitimate workflows can indicate potential malicious activity. The rule focuses on process creation events where WmiPrvSE.exe acts as the parent process for specific executables known to be exploited by attackers, such as certutil.exe, cscript.exe, and mshta.exe, among others. The detection logic uses pattern matching on process creation logs to recognize these behaviors, applying filters to reduce false positives by excluding processes that are expected to run under normal circumstances. The identification of a high-risk child process under these conditions may suggest an exploitation attempt or lateral movement within the environment. This rule serves to enhance security monitoring by detecting potentially nefarious use of valid Windows services and scripting tools that attackers often leverage in their operations, thus requiring immediate investigation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2021-08-23