
Summary
The "Crowdstrike WMI Query Detection" rule is designed to monitor and detect the execution of WMI (Windows Management Instrumentation) queries that may be indicative of reconnaissance activities or lateral movement within a network. WMI queries, which can be used to gather system information or to execute commands on remote systems, can be leveraged by malicious actors to ascertain information about the network environment or to propagate across systems. This rule aims to mitigate the risk of such activities by observing specific command-line invocations that utilize 'wmic.exe' alongside certain patterns or flags that signify potential misuse of WMI functionalities. For instance, queries extracting sensitive information, like user accounts and their passwords, can warrant immediate attention, highlighting the necessity of promptly investigating such activities to ascertain whether they are benign or malicious in nature.
Categories
- Windows
- Endpoint
- Network
- Cloud
- Infrastructure
Data Sources
- WMI
- Process
- Command
Created: 2023-05-04