SigmaHQ/wazuh/rules/sigma_win_susp_wmi_execution.yml
joker2013 50379800f2 123
2020-12-03 01:43:30 +03:00

16 lines
465 B
YAML

alert:
- debug
description: Detects WMI executing suspicious commands
filter:
- query:
query_string:
query: (data.win.eventdata.image.keyword:(*\\wmic.exe) AND data.win.eventdata.commandLine.keyword:(*\/NODE\:*process\ call\ create\ * OR *\ path\ AntiVirusProduct\ get\ * OR *\ path\ FirewallProduct\ get\ * OR *\ shadowcopy\ delete\ *))
index: wazuh-alerts-3.x-*
name: 526be59f-a573-4eea-b5f7-f0973207634d_0
priority: 3
realert:
minutes: 0
type: any