heroui logo

WinRM Spawning a Process

Splunk Security Content

View Source
Summary
The detection rule 'WinRM Spawning a Process' is designed to identify suspicious process invocations originating from the Windows Remote Management (WinRM) service, specifically targeting the process wsmprovhost.exe. It utilizes data from Endpoint Detection and Response (EDR) solutions to monitor for child processes commonly associated with potential exploitation, such as cmd.exe, powershell.exe, and others. The rule is particularly relevant in the context of CVE-2021-31166, a vulnerability that malicious actors can exploit to gain unauthorized command execution and potentially escalate privileges or maintain persistence within the environment. The detection logic is implemented in Splunk and relies on Sysmon EventID 1 and Windows Event Log Security 4688 to track process creation events related to the activity of interest.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1190
Created: 2024-11-13