title: Remote PowerShell Session Host Process (WinRM) id: 734f8d9b-42b8-41b2-bcf5-abaf49d5a3c8 description: Detects remote PowerShell sections by monitoring for wsmprovhost (WinRM host process) as a parent or child process (sign of an active PowerShell remote session). status: experimental date: 2019/09/12 modified: 2021/05/21 author: Roberto Rodriguez @Cyb3rWard0g references: - https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190511223310.html tags: - attack.execution - attack.t1086 # an old one - attack.t1059.001 - attack.t1021.006 logsource: category: process_creation product: windows detection: selection: - Image|endswith: '\wsmprovhost.exe' - ParentImage|endswith: '\wsmprovhost.exe' condition: selection fields: - ComputerName - User - CommandLine falsepositives: - Legitimate usage of remote Powershell, e.g. for monitoring purposes. level: medium