Tag
Stealthy WMI Lateral Movement via StealthyWMIExec.py
2 rules 1 TTPThe StealthyWMIExec.py script facilitates lateral movement via WMI, potentially evading standard detection mechanisms by employing stealthy techniques.
Suspicious WMI Image Load from MS Office
2 rules 1 TTPAdversaries may exploit Windows Management Instrumentation (WMI) to execute code stealthily, bypassing traditional security measures by loading `wmiutils.dll` from Microsoft Office applications, potentially indicating malicious execution.
Suspicious Enumeration Commands Spawned via WMIPrvSE
2 rules 12 TTPsThis rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.
WMI Incoming Lateral Movement
3 rules 2 TTPsDetection of processes executed via Windows Management Instrumentation (WMI) on a remote host indicating potential adversary lateral movement.
Windows Script Interpreter Executing Process via WMI
2 rules 4 TTPsThe rule identifies the use of Windows script interpreters (cscript.exe or wscript.exe) executing a process via Windows Management Instrumentation (WMI), which may indicate malicious activity, especially when initiated by non-system accounts.
Persistence via WMI Event Subscription
2 rules 2 TTPsAdversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.
Detect Suspicious WMI Event Subscription Creation for Persistence
2 rules 1 TTPThis threat brief details the detection of malicious Windows Management Instrumentation (WMI) event subscriptions, a technique used by attackers for persistence and privilege escalation on Windows systems.
Suspicious PowerShell Reconnaissance via WMI Queries
2 rules 2 TTPsDetection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.