heroui logo

Persistence via WMI Event Subscription

Elastic Detection Rules

View Source
Summary
The detection rule 'Persistence via WMI Event Subscription' aims to identify potential abuse of Windows Management Instrumentation (WMI) for malicious persistence on Windows systems. An adversary can create event subscriptions using the 'wmic.exe' process to execute arbitrary code when specific events are triggered, allowing them to maintain access to the system. This rule utilizes EQL (Event Query Language) to detect instances where 'wmic.exe' is invoked with specific arguments that indicate the creation of event consumers like 'ActiveScriptEventConsumer' or 'CommandLineEventConsumer'. The rule monitors various event logs and processes to correlate suspicious activities and looks for proper alignment with expected behaviors. False positives can occur from legitimate administrative tasks, and thorough investigation is advised to differentiate benign actions from malicious intent. Exclusion lists and documentation of trusted applications and tasks can help mitigate these risks. Immediate isolation and remediation steps, including process termination and removing unauthorized WMI subscriptions, are recommended upon detection of an alert.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • WMI
  • Network Traffic
ATT&CK Techniques
  • T1546
  • T1546.003
  • T1047
Created: 2020-12-04