HackTool - Wmiexec Default Powershell Command
Detects the execution of PowerShell with a specific flag sequence that is used by the Wmiexec script
Sigma rule (View on GitHub)
1title: HackTool - Wmiexec Default Powershell Command
2id: 022eaba8-f0bf-4dd9-9217-4604b0bb3bb0
3status: test
4description: Detects the execution of PowerShell with a specific flag sequence that is used by the Wmiexec script
5references:
6 - https://github.com/fortra/impacket/blob/f4b848fa27654ca95bc0f4c73dbba8b9c2c9f30a/examples/wmiexec.py
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-03-08
9tags:
10 - attack.defense-evasion
11 - attack.lateral-movement
12logsource:
13 category: process_creation
14 product: windows
15detection:
16 selection:
17 CommandLine|contains: '-NoP -NoL -sta -NonI -W Hidden -Exec Bypass -Enc'
18 condition: selection
19falsepositives:
20 - Unlikely
21level: high
References
Related rules
- Audit CVE Event
- Bitbucket Global SSH Settings Changed
- NTLMv1 Logon Between Client and Server
- New Port Forwarding Rule Added Via Netsh.EXE
- New PortProxy Registry Entry Added