heroui logo

Application Terminated Via Wmic.EXE

Sigma Rules

View Source
Summary
This detection rule is designed to identify malicious or unauthorized termination of applications using the Windows Management Instrumentation Command-line (WMIC) utility. WMIC, being a powerful command-line interface for WMI, allows users to perform a variety of management tasks on Windows systems. The rule specifically monitors for the use of the 'terminate' command executed through wmic.exe, as this can indicate nefarious activities like malware attempts to kill security software or other critical applications. The detection logic looks for process creation events where the command line includes both 'call' and 'terminate' while ensuring that the executable being invoked is 'wmic.exe'. The rule aids in detecting potential exploitation techniques used by attackers, particularly under the premise of attacks exploiting service disruptions as noted in various cyber threat reports.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2023-09-11