New Process Created Via Wmic.EXE
Detects new process creation using WMIC via the "process call create" flag
Sigma rule (View on GitHub)
1title: New Process Created Via Wmic.EXE
2id: 526be59f-a573-4eea-b5f7-f0973207634d
3related:
4 - id: 3c89a1e8-0fba-449e-8f1b-8409d6267ec8 # For suspicious process creation
5 type: derived
6status: test
7description: Detects new process creation using WMIC via the "process call create" flag
8references:
9 - https://www.sans.org/blog/wmic-for-incident-response/
10 - https://github.com/redcanaryco/atomic-red-team/blob/84215139ee5127f8e3a117e063b604812bd71928/atomics/T1047/T1047.md#atomic-test-5---wmi-execute-local-process
11author: Michael Haag, Florian Roth (Nextron Systems), juju4, oscd.community
12date: 2019-01-16
13modified: 2023-02-14
14tags:
15 - attack.execution
16 - attack.t1047
17 - car.2016-03-002
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection_img:
23 - Image|endswith: '\wmic.exe'
24 - OriginalFileName: 'wmic.exe'
25 selection_cli:
26 CommandLine|contains|all:
27 - 'process'
28 - 'call'
29 - 'create'
30 condition: all of selection_*
31falsepositives:
32 - Unknown
33level: medium
References
Related rules
- Hardware Model Reconnaissance Via Wmic.EXE
- Potential Product Class Reconnaissance Via Wmic.EXE
- Application Removed Via Wmic.EXE
- Application Terminated Via Wmic.EXE
- Blue Mockingbird