Suspicious PowerShell Cmdlets - WMI
There are numerous default PowerShell cmdlets that allow administrators to leverage WMI via PowerShell. Both adversaries and administrators use these cmdlets to query the operating system or execute commands, either locally or remotely. Cmdlets like Get-WMIObject are often used for reconnaissance. Part of the RedCanary 2024 Threat Detection Report.
Sigma rule (View on GitHub)
1title: Suspicious PowerShell Cmdlets - WMI
2id: e29d3301-3b64-4305-9e91-8aabfbef2015
3status: experimental
4description: |
5 There are numerous default PowerShell cmdlets that allow administrators to leverage WMI via
6 PowerShell. Both adversaries and administrators use these cmdlets to query the operating
7 system or execute commands, either locally or remotely. Cmdlets like Get-WMIObject are often
8 used for reconnaissance. Part of the RedCanary 2024 Threat Detection Report.
9references:
10 - https://redcanary.com/threat-detection-report/techniques/windows-management-instrumentation/
11author: RedCanary, Sigma formatting by Micah Babinski
12date: 2024/03/21
13tags:
14 - attack.execution
15 - attack.t1047
16 - attack.t1059
17 - attack.t1059.001
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection:
23 Image|endswith: '\powershell.exe'
24 CommandLine|contains:
25 - 'invoke-wmimethod'
26 - 'invoke-cimmethod'
27 - 'get-wmiobject'
28 - 'get-ciminstance'
29 - 'wmiclass'
30 condition: selection
31falsepositives:
32 - Unknown
33level: low```
References
Related rules
- Suspicious WMI-Related Powershell Cmdlets
- Obfuscation and Escape Characters - Powershell
- PowerShell -encodedcommand Switch
- PowerShell Base64 Encoding
- Suspicious PowerShell Cmdlets