
Summary
This detection rule identifies suspicious process creation leveraging the Windows Management Instrumentation Command-line (WMIC) tool, particularly through the execution of 'process call create'. It targets specific command-line patterns that may indicate malicious intent, with a focus on key executables often exploited in attacks, such as 'rundll32' and 'regsvr32'. The rule utilizes the log source category of 'process_creation' in a Windows environment. If a command contains both 'process', 'call', and 'create', in addition to a specified list of potentially dangerous commands or file paths (such as those commonly associated with temporary files or user profiles), the rule will trigger an alert. The presence of these patterns can suggest that an attacker is attempting to execute malicious payloads or scripts using legitimate system tools, making this a high-risk detection scenario.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-10-12