Unusual Module Loads - WMI
By monitoring and detecting on module loads, you can catch a variety of different malicious activities, including defense evasion and credential theft. In cases where an adversary is using WMI for credential theft, consider looking for the execution of wmiprvse.exe (or its child processes) with unusual module loads like samlib.dll or vaultcli.dll. WMI is also a useful vehicle for bypassing application controls, and we commonly see adversaries—real and simulated–using a WMI bypass method called “SquibblyTwo.” The following pseudo-detection analytic is designed specifically to catch application control bypasses, but you can likely adapt it to detect other threats by substituting in a different DLL or by removing the command. Part of the RedCanary 2024 Threat Detection Report.
Sigma rule (View on GitHub)
1title: Unusual Module Loads - WMI
2id: b62ec77f-8014-42be-9874-c155f9ce6fae
3status: experimental
4description: |
5 By monitoring and detecting on module loads, you can catch a variety of different malicious
6 activities, including defense evasion and credential theft. In cases where an adversary is
7 using WMI for credential theft, consider looking for the execution of wmiprvse.exe (or its
8 child processes) with unusual module loads like samlib.dll or vaultcli.dll. WMI is also a
9 useful vehicle for bypassing application controls, and we commonly see adversaries—real and
10 simulated–using a WMI bypass method called “SquibblyTwo.” The following pseudo-detection
11 analytic is designed specifically to catch application control bypasses, but you can likely
12 adapt it to detect other threats by substituting in a different DLL or by removing the command.
13 Part of the RedCanary 2024 Threat Detection Report.
14references:
15 - https://redcanary.com/threat-detection-report/techniques/windows-management-instrumentation/
16author: RedCanary, Sigma formatting by Micah Babinski
17date: 2024/03/21
18tags:
19 - attack.execution
20 - attack.t1047
21logsource:
22 category: image_load
23 product: windows
24detection:
25 selection:
26 Image|endswith: '\wmic.exe'
27 CommandLine|contains: 'format:' # this field may not be available
28 ImageLoaded|contains:
29 - 'jscript.dll'
30 - 'vbscript.dll'
31 condition: selection
32falsepositives:
33 - Unknown
34level: low```
References
Related rules
- Office Products Spawning WMI
- Suspicious Commands - WMI
- Suspicious PowerShell Cmdlets - WMI
- Suspicious Process Lineage - WMI
- WMI Reconnaissance