
Summary
The Windows WMIC DiskDrive Discovery rule is designed to detect the execution of Windows Management Instrumentation Command-line (WMIC) commands specifically related to disk drive discovery activities. This analytic focuses on monitoring for commands such as 'wmic diskdrive', which, while legitimate for system administrators for tasks like inventory or diagnostics, can also be exploited by attackers to gather detailed information about hardware. Unauthorized disk drive enumeration can signal preparatory reconnaissance for further malicious activities, making detection crucial in identifying potential insider threats or external attacks. By utilizing data from point-of-presence systems like Sysmon and Windows Event Logs, security teams can trigger alerts when such commands are executed, thereby improving their monitoring capabilities for unauthorized behaviors. Capturing information from various process attributes allows security professionals to trace the nature and intent behind these actions, enabling timely responses to potential threats.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
ATT&CK Techniques
- T1082
Created: 2025-08-25