Suspicious Process Lineage - WMI
In general, trusted binaries and known administrative tools and processes will initiate WMI activity. As such, it makes sense to look for known bad processes launching WMI or deviations from the expected where a legitimate but unusual Windows binary spawns WMI—or spawns from it. The following is an amalgamation of several analytics that can detect a wide array of threats, ranging from red team activity to web shells to coinminers. Part of the RedCanary 2024 Threat Detection Report.
Sigma rule (View on GitHub)
1title: Suspicious Process Lineage - WMI
2id: 75e6bb57-d135-4308-b0ac-936e2d76d4d5
3status: experimental
4description: |
5 In general, trusted binaries and known administrative tools and processes will initiate WMI
6 activity. As such, it makes sense to look for known bad processes launching WMI or deviations
7 from the expected where a legitimate but unusual Windows binary spawns WMI—or spawns from it.
8 The following is an amalgamation of several analytics that can detect a wide array of threats,
9 ranging from red team activity to web shells to coinminers. Part of the RedCanary 2024 Threat
10 Detection Report.
11references:
12 - https://redcanary.com/threat-detection-report/techniques/windows-management-instrumentation/
13author: RedCanary, Sigma formatting by Micah Babinski
14date: 2024/03/21
15tags:
16 - attack.execution
17 - attack.t1047
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection:
23 ParentImage|endswith: '\wmiprvse.exe'
24 Image|endswith:
25 - '\rundll32.exe'
26 - '\msbuild.exe'
27 - '\powershell.exe'
28 - '\cmd.exe'
29 - '\mshta.exe'
30 condition: selection
31falsepositives:
32 - Unknown
33level: low```
References
Related rules
- Office Products Spawning WMI
- Suspicious Commands - WMI
- Suspicious PowerShell Cmdlets - WMI
- Unusual Module Loads - WMI
- WMI Reconnaissance