heroui logo

Suspicious WSMAN Provider Image Loads

Sigma Rules

View Source
Summary
This rule detects potential misuse of WSMAN (Windows Remote Management) provider DLLs by monitoring specific image loads from processes that are uncommon for such operations. It checks for instances where unexpected processes attempt to load `WsmSvc.dll`, `WsmAuto.dll`, and `Microsoft.WSMan.Management.ni.dll`, which could indicate lateral movement or unauthorized remote execution activities using WSMAN. The detection logic includes filtering mechanisms to prevent false positives from legitimate processes such as common PowerShell executions and `svchost.exe` operations. Key indicators within the detection condition involve requests from the client side and responses from the server, excluding known benign filters.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • Image
Created: 2020-06-24