Local Groups Reconnaissance Via Wmic.EXE
Detects the execution of "wmic" with the "group" flag. Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.
Sigma rule (View on GitHub)
1title: Local Groups Reconnaissance Via Wmic.EXE
2id: 164eda96-11b2-430b-85ff-6a265c15bf32
3status: test
4description: |
5 Detects the execution of "wmic" with the "group" flag.
6 Adversaries may attempt to find local system groups and permission settings.
7 The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group.
8 Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.
9references:
10 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1069.001/T1069.001.md
11author: frack113
12date: 2021-12-12
13modified: 2023-02-14
14tags:
15 - attack.discovery
16 - attack.t1069.001
17logsource:
18 product: windows
19 category: process_creation
20detection:
21 selection_img:
22 - Image|endswith: '\wmic.exe'
23 - OriginalFileName: 'wmic.exe'
24 selection_cli:
25 CommandLine|contains: ' group'
26 condition: all of selection*
27falsepositives:
28 - Unknown
29level: low
References
Related rules
- AD Groups Or Users Enumeration Using PowerShell - PoshModule
- AD Groups Or Users Enumeration Using PowerShell - ScriptBlock
- BloodHound Collection Files
- HackTool - Bloodhound/Sharphound Execution
- Local Groups Discovery - Linux