2019-01-16 22:36:31 +00:00
title : Whoami Execution
status : experimental
description : Detects the execution of whoami, which is often used by attackers after exloitation / privilege escalation but rarely used by administrators
references :
2019-03-01 23:14:20 +00:00
- https://twitter.com/haroonmeer/status/939099379834658817
- https://twitter.com/c_APT_ure/status/939475433711722497
2019-01-16 22:36:31 +00:00
author : Florian Roth
date : 2018 /05/22
tags :
2019-03-01 23:14:20 +00:00
- attack.discovery
- attack.t1033
2019-01-16 22:36:31 +00:00
logsource :
2019-03-01 23:14:20 +00:00
category : process_creation
product : windows
2019-01-16 22:36:31 +00:00
detection :
2019-03-01 23:14:20 +00:00
selection :
CommandLine : whoami
condition : selection
2019-01-16 22:36:31 +00:00
falsepositives :
2019-03-01 23:14:20 +00:00
- Admin activity
- Scripts and administrative tools used in the monitored environment
2019-01-16 22:36:31 +00:00
level : high