heroui logo

Suspicious Encoded Scripts in a WMI Consumer

Sigma Rules

View Source
Summary
This rule is designed to detect suspicious encoded scripts that may be executed through Windows Management Instrumentation (WMI) Event Consumers. It specifically looks for encoded payloads that could indicate malicious activity, particularly those that leverage the WMI system for command execution. The detection mechanism focuses on identifying specific strings related to process memory operations in base64 encoding, along with other suspicious indicators like common error messages associated with Windows programs. The rule uses a logical condition to trigger alerts when these patterns are detected, suggesting a potential exploit attempt or unauthorized script execution. Given the sensitive nature of WMI in enterprise environments, this rule enhances the capability to identify covert persistence or exploitation tactics used in cyber-attacks.
Categories
  • Windows
  • Endpoint
  • IoT
Data Sources
  • WMI
  • Process
Created: 2021-09-01