<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows Management Instrumentation (WMI) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windows-management-instrumentation-wmi/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 18:08:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windows-management-instrumentation-wmi/feed.xml" rel="self" type="application/rss+xml"/><item><title>User Detected with Suspicious Windows Process(es)</title><link>https://feed.craftedsignal.io/briefs/2026-05-suspicious-windows-process/</link><pubDate>Fri, 15 May 2026 18:08:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-suspicious-windows-process/</guid><description>A machine learning job combination has identified a user with one or more suspicious Windows processes exhibiting unusually high malicious probability scores, potentially involving LOLbins for defense evasion.</description><content:encoded><![CDATA[<p>A machine learning job combination has flagged users with suspicious Windows processes exhibiting unusually high malicious probability scores. This detection leverages the ProblemChild supervised ML model to identify processes classified as malicious in several ways. Anomalies containing clusters of suspicious processes, each with the same username, have an aggregate score calculated to be unusually high by an unsupervised ML model. Such clusters often contain suspicious or malicious activity, possibly involving LOLbins, that may be resistant to detection using conventional search rules. The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker uses a LOLBin (Living Off The Land Binary) such as PowerShell or WMI to execute malicious commands.</li>
<li>The LOLBin spawns one or more child processes, creating a cluster of processes associated with the same user.</li>
<li>A supervised machine learning model, ProblemChild, identifies these processes as having a high probability of being malicious.</li>
<li>An unsupervised machine learning model calculates an unusually high aggregate score for the event cluster.</li>
<li>The detection triggers based on the combination of supervised and unsupervised ML scores.</li>
<li>The attacker leverages the LOLBin for defense evasion, bypassing conventional search rule detections.</li>
<li>The attacker achieves their objective, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging LOLbins can lead to significant system compromise, including data theft, system disruption, and lateral movement within the network. While this detection has low severity, it identifies potential malicious activity that may be resistant to traditional detection methods. False positives from legitimate administrative tools and software updates may occur.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install and configure the Living off the Land (LotL) Attack Detection integration assets as outlined in the <a href="#setup">setup instructions</a>.</li>
<li>Ensure Windows process events are being collected by integrations such as Elastic Defend or Winlogbeat as described in the <a href="#setup">setup instructions</a>.</li>
<li>Review and tune the machine learning job identified by <code>machine_learning_job_id: problem_child_high_sum_by_user_ea</code> to minimize false positives, focusing on legitimate administrative tools like PowerShell and WMI.</li>
<li>Implement enhanced monitoring and detection rules to identify similar patterns of behavior, focusing on the specific tactics and techniques used in this incident.</li>
<li>Investigate alerts generated by this rule using the <a href="#note">investigation guide</a> to determine the scope of the incident and any potential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>Domain: Endpoint</category><category>OS: Windows</category><category>Use Case: Living off the Land Attack Detection</category><category>Rule Type: ML</category><category>Rule Type: Machine Learning</category><category>Tactic: Defense Evasion</category><category>Resources: Investigation Guide</category><category>defense-evasion</category></item></channel></rss>