heroui logo

Enumeration Command Spawned via WMIPrvSE

Elastic Detection Rules

View Source
Summary
The rule "Enumeration Command Spawned via WMIPrvSE" aims to detect potentially malicious enumeration commands executed on Windows systems via the Windows Management Instrumentation Provider Service (WMIPrvSE). It captures threat activity when native host and network enumeration commands like `arp.exe`, `ipconfig.exe`, and others are spawned by the WMIprvse.exe process. At the heart of this detection is an EQL query that identifies instance of known enumeration tasks while filtering out benign scenarios such as legitimate administrative actions or recognized security tool operations. The rule is essential for identifying suspicious use of WMI, which adversaries often exploit for reconnaissance, exploiting the stealthy nature of WMI to execute commands without raising alarm. The detection includes a thorough investigation guide to validate alerts and understand context, advising teams on tackling false positives and remedial actions against confirmed malicious activity. Given the specifications of common enumeration tools and the factors taken into account (like user context and parent processes), the rule serves to enhance the visibility into Windows environments for potential threats, positioning defenders to act preemptively against unauthorized system queries and data exfiltration attempts.
Categories
  • Endpoint
  • Windows
Data Sources
  • WMI
  • Windows Registry
  • Process
  • Network Traffic
  • Application Log
  • Cloud Service
  • Service
  • File
ATT&CK Techniques
  • T1047
  • T1016
  • T1016.001
  • T1018
  • T1057
  • T1087
  • T1518
Created: 2021-01-19