heroui logo

Windows Process Commandline Discovery

Splunk Security Content

View Source
Summary
The 'Windows Process Commandline Discovery' analytic rule is designed to detect when Windows Management Instrumentation Command-line (WMIC) is used to query information about processes, focusing on the command lines utilized to launch them. This behavior is particularly suspicious because it is generally outside the typical actions of non-technical users, suggesting potential reconnaissance activities by attackers wishing to gather information about the system's running processes. The detection utilizes logs from various sources, including Sysmon Event ID 1 and Windows Event Log Security 4688, alongside data from CrowdStrike’s EDR tools. The rule sets a clear search query to filter events related to WMIC commands aimed at process information, thereby capturing and reporting on potentially malicious activity.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • User Account
ATT&CK Techniques
  • T1057
Created: 2024-11-13