SigmaHQ/rules/windows/sysmon/sysmon_wmi_module_load.yml

47 lines
1.2 KiB
YAML
Raw Normal View History

title: WMI Modules Loaded
id: 671bb7e3-a020-4824-a00e-2ee5b55f385e
description: Detects non wmiprvse loading WMI modules
status: experimental
date: 2019/08/10
modified: 2019/11/10
author: Roberto Rodriguez @Cyb3rWard0g
references:
- https://github.com/Cyb3rWard0g/ThreatHunter-Playbook/tree/master/playbooks/windows/02_execution/T1047_windows_management_instrumentation/wmi_wmi_module_load.md
tags:
- attack.execution
- attack.t1047
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 7
ImageLoaded|endswith:
- '\wmiclnt.dll'
- '\WmiApRpl.dll'
- '\wmiprov.dll'
- '\wmiutils.dll'
- '\wbemcomn.dll'
- '\wbemprox.dll'
- '\WMINet_Utils.dll'
- '\wbemsvc.dll'
- '\fastprox.dll'
filter:
Image|endswith:
- '\WmiPrvSe.exe'
- '\WmiAPsrv.exe'
- '\svchost.exe'
2020-05-23 11:44:45 +00:00
- '\DeviceCensus.exe'
2020-05-23 19:06:15 +00:00
- '\CompatTelRunner.exe'
- '\sdiagnhost.exe'
2020-05-25 08:50:22 +00:00
- '\SIHClient.exe'
condition: selection and not filter
fields:
- ComputerName
- User
- Image
- ImageLoaded
falsepositives:
- Unknown
2020-01-19 21:34:16 +00:00
level: high