
Summary
This rule is designed to detect potentially malicious persistence mechanisms that utilize Windows Management Instrumentation (WMI) in the form of event filters and command-line event consumers. It specifically looks for WMI activities that are anomalous, particularly focusing on the WMI Namespace where EventID 4662 is logged. This EventID corresponds to actions taken on WMI objects, providing context to any subscriptions that could indicate unauthorized access or manipulation. By identifying these suspicious WMI interactions through security logs, the rule aims to uncover tactics used by attackers to maintain persistence on affected systems while capturing any potentially harmful behavior associated with privilege escalation and system compromise. The underlying aim is to enhance visibility over WMI usage, enabling effective response measures against threats exploiting WMI for malicious purposes.
Categories
- Windows
Data Sources
- WMI
- Windows Registry
- Logon Session
Created: 2017-08-22