powershell registry execution via wmic
Detect powershell registry execution via wmic
Sigma rule (View on GitHub)
1title: powershell registry execution via wmic
2status: experimental
3description: Detect powershell registry execution via wmic
4author: Joe Security
5date: 2019-11-26
6id: 200033
7threatname:
8behaviorgroup: 1
9classification: 8
10mitreattack:
11
12logsource:
13 category: process_creation
14 product: windows
15detection:
16 selection:
17 CommandLine:
18 - '*wmic*output:clipboard process call create*powershell*'
19 condition: selection
20level: critical