heroui logo

WMI Incoming Lateral Movement

Elastic Detection Rules

View Source
Summary
The "WMI Incoming Lateral Movement" rule is designed to detect suspicious processes executed via Windows Management Instrumentation (WMI) on remote hosts in a Windows environment. This detection is critical as it can signal lateral movement attempts by adversaries who exploit WMI to execute unauthorized commands on other machines, often bypassing standard security mechanisms. The rule utilizes a combination of network and process event data to construct a sequence query that identifies incoming requests to the WMI service. It specifically looks for connections that are not from localhost and excludes common administrative tools that may falsely trigger alerts. The rule highlights the importance of investigation by outlining steps to assess the legitimacy of the remote connections, focusing on the source IP addresses, process names, and user IDs involved. Additionally, the rule provides guidance for response actions should suspicious activities be confirmed, emphasizing isolation of affected hosts and further forensic analysis.
Categories
  • Endpoint
  • Windows
Data Sources
  • Network Traffic
  • Process
ATT&CK Techniques
  • T1021
  • T1047
Created: 2020-11-15