Password Set to Never Expire via WMI

Detects the use of wmic.exe to modify user account settings and explicitly disable password expiration.

Sigma rule (View on GitHub)

 1title: Password Set to Never Expire via WMI
 2id: 7864a175-3654-4824-9f0d-f0da18ab27c0
 3status: experimental
 4description: |
 5        Detects the use of wmic.exe to modify user account settings and explicitly disable password expiration.
 6references:
 7    - https://www.huntress.com/blog/the-unwanted-guest
 8author: "Daniel Koifman (KoifSec)"
 9date: 2025-07-30
10tags:
11    - attack.privilege-escalation
12    - attack.execution
13    - attack.persistence
14    - attack.t1047
15    - attack.t1098
16logsource:
17    category: process_creation
18    product: windows
19detection:
20    selection_img:   # Example command simulated:  wmic  useraccount where name='guest' set passwordexpires=false
21        - Image|endswith: '\wmic.exe'
22        - OriginalFileName: 'wmic.exe'
23    selection_cli:
24        CommandLine|contains|all:
25            - 'useraccount'
26            - ' set '
27            - 'passwordexpires'
28            - 'false'
29    condition: all of selection_*
30falsepositives:
31    - Legitimate administrative activity
32level: medium

References

Related rules

to-top