heroui logo

Mofcomp Activity

Elastic Detection Rules

View Source
Summary
The 'Mofcomp Activity' detection rule identifies potentially malicious use of the mofcomp.exe tool for compiling Managed Object Format (MOF) files, which can be exploited by attackers to manipulate the Windows Management Instrumentation (WMI) repository. The rule is designed to capture suspicious behavior by triggering on process starts where mofcomp.exe is invoked with any MOF file arguments, while excluding known safe scenarios, such as those initiated by the 'ScenarioEngine.exe' process, and filters out executions that originate from the system account (S-1-5-18). The alert targets the execution tactic within the MITRE ATT&CK framework and aims to prevent persistence and unwanted WMI manipulations.
Categories
  • Endpoint
  • Windows
  • Other
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1047
  • T1546
  • T1546.003
Created: 2023-08-23