heroui logo

WMI Persistence

Sigma Rules

View Source
Summary
This rule is designed to detect potentially malicious persistence mechanisms using Windows Management Instrumentation (WMI). It specifically identifies suspicious bindings between WMI event filters and command line event consumers by monitoring Windows Security Logs and WMI events. The presence of certain Event IDs (5861 and 5859) indicates manipulation of WMI components, which could suggest an attempt to maintain persistence or escalate privileges on the system. Event ID 5861 logs bindings of event filters to consumers, while Event ID 5859 logs the creation of WMI filters, both of which are critical for understanding the activity of persistence mechanisms via WMI. The rule also employs keywords that are commonly associated with potential malicious event consumers, such as ActiveScriptEventConsumer and CommandLineEventConsumer. In short, this detection rule plays a pivotal role in identifying WMI-based persistence techniques that could be exploited by attackers to execute arbitrary commands or scripts unnoticed.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • WMI
  • Application Log
Created: 2017-08-22