heroui logo

Whoami.EXE Execution From Privileged Process

Sigma Rules

View Source
Summary
This rule detects the execution of the 'whoami.exe' command from processes that are executed by privileged accounts, which may indicate potential misuse or malicious intent, as these accounts are often targeted by threat actors for privilege escalation or reconnaissance. The rule is designed to identify instances where 'whoami.exe'—a tool that reveals information about user privileges and group memberships—is invoked by elevated processes or users, such as 'TrustedInstaller' or those having authoring permissions. It focuses on the characteristics of both the executed process and the invoking user, ensuring that alerts are generated only when the specified conditions are met. The execution of this command in a suspicious context alerts security teams to investigate potential malicious activity more closely, thereby enhancing the overall security posture against privilege escalation attacks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-01-28