heroui logo

Whoami Utility Execution

Sigma Rules

View Source
Summary
The detection rule titled 'Whoami Utility Execution' identifies instances where the 'whoami' command-line utility is executed on Windows systems. This utility is commonly used by attackers after they've managed to exploit a system and escalate their privileges. By monitoring the execution of 'whoami.exe', defenders can identify potential reconnaissance activities carried out by malicious actors during or after an attack. The rule is particularly sensitive to processes created that specifically match the characteristics of 'whoami', which helps in differentiating between normal administrative activity and potential malicious behavior. It takes into account cases where the executable's image might end with '\whoami.exe' or where the original filename is stated as 'whoami.exe'. False positives may arise from legitimate administrative tasks or the execution of scripts, hence the rule's detection level is set to low to minimize unnecessary alerts. Comprehensive logs from process creation are essential for the rule to function correctly, and the detection is designed to run in environments where Windows applications are monitored for security breaches.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2018-08-13