powershell registry execution via wmic

Detect powershell registry execution via wmic

Sigma rule (View on GitHub)

 1title: powershell registry execution via wmic
 2status: experimental
 3description: Detect powershell registry execution via wmic
 4author: Joe Security
 5date: 2019-11-26
 6id: 200033
 7threatname:
 8behaviorgroup: 1
 9classification: 8
10mitreattack: 
11
12logsource:
13    category: process_creation
14    product: windows
15detection:
16    selection:
17        CommandLine:
18            - '*wmic*output:clipboard process call create*powershell*'
19    condition: selection
20level: critical
to-top