heroui logo

Suspicious Non PowerShell WSMAN COM Provider

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious activities involving the Windows Remote Management (WinRM) service, specifically focusing on instances of the WSMAN COM provider being invoked without the normal PowerShell execution context. The rule monitors log data where the WSMAN provider is utilized, looking for suspicious patterns that suggest lateral movement techniques which may signify an attack. The detection criteria specifies that if any event contains 'ProviderName=WSMan' but does not originate from the PowerShell host application, it will trigger an alert. This rule is crucial as attackers may utilize non-PowerShell execution methods to evade detection while leveraging Windows Management Instrumentation (WMI) or WinRM for lateral movement across compromised networks. Such behavior might occur during a compromise as attackers look to access other systems within a network without drawing attention, making this detection critical for incident response and threat hunting efforts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Logon Session
Created: 2020-06-24