Bumblebee WmiPrvSE execution pattern

Detects Bumblebee WmiPrvSE parent process manipulation

Sigma rule (View on GitHub)

 1title: Bumblebee WmiPrvSE execution pattern
 2id: 1620db43-fde5-45f3-b4d9-45ca6e79e047
 3status: experimental
 4description: Detects Bumblebee WmiPrvSE parent process manipulation 
 5author:  TheDFIRReport
 6references:
 7  - https://thedfirreport.com/2022/09/26/bumblebee-round-two/
 8date: 2022/09/26
 9logsource:
10  category: process_creation
11  product: windows
12detection:
13  selection_image:
14    Image|endswith:
15      - 'ImagingDevices.exe'
16      - 'wabmig.exe'
17  selection_parent:
18    ParentImage:endswith:
19      - 'WmiPrvSE.exe'
20  condition: selection_image and selection_parent
21falsepositives:
22  - Unknown
23level: high
24tags:
25  - attack.defense_evasion
26  - attack.t1036

References

Related rules

to-top