atomic-threat-coverage/data_needed/DN_0081_5861_wmi_activity.yml
2019-02-13 21:20:06 +01:00

55 lines
2.6 KiB
YAML

title: DN_0081_5861_wmi_activity
description: >
WMI Event which provide ability to catch Timer-based WMI Events and provide
usefult information for identification of suspicious WMI activity
loggingpolicy:
- None
references:
- https://www.darkoperator.com/blog/2017/10/14/basics-of-tracking-wmi-activity
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
category: OS Logs
platform: Windows
type: Applications and Services Logs
channel: Microsoft-Windows-WMI-Activity/Operational
provider: Microsoft-Windows-WMI-Activity
fields:
- EventID
- Computer
- Hostname # redundant
- Namespace
- ESS # Eventing SubSystem
- Consumer
- PossibleCause
- CreatorSID # require parsing, todo: create enrichment
- EventNamespace # require parsing, todo: create enrichment
- Query # require parsing, todo: create enrichment
- QueryLanguage # require parsing, todo: create enrichment
- EventFilter # require parsing, todo: create enrichment
sample: |
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
- <System>
<Provider Name="Microsoft-Windows-WMI-Activity" Guid="{1418EF04-B0B4-4623-BF7E-D74AB47BBDAA}" />
<EventID>5861</EventID>
<Version>0</Version>
<Level>0</Level>
<Task>0</Task>
<Opcode>0</Opcode>
<Keywords>0x4000000000000000</Keywords>
<TimeCreated SystemTime="2019-02-06T20:23:40.952921100Z" />
<EventRecordID>56793</EventRecordID>
<Correlation />
<Execution ProcessID="1416" ThreadID="2244" />
<Channel>Microsoft-Windows-WMI-Activity/Operational</Channel>
<Computer>atc-win-10.atc.local</Computer>
<Security UserID="S-1-5-18" />
</System>
- <UserData>
- <Operation_ESStoConsumerBinding xmlns="http://manifests.microsoft.com/win/2006/windows/WMI">
<Namespace>//./ROOT/Subscription</Namespace>
<ESS>SCM Event Log Filter</ESS>
<CONSUMER>NTEventLogEventConsumer="SCM Event Log Consumer"</CONSUMER>
<PossibleCause>Binding EventFilter: instance of __EventFilter { CreatorSID = {1, 2, 0, 0, 0, 0, 0, 5, 32, 0, 0, 0, 32, 2, 0, 0}; EventNamespace = "root\\cimv2"; Name = "SCM Event Log Filter"; Query = "select * from MSFT_SCMEventLogEvent"; QueryLanguage = "WQL"; }; Perm. Consumer: instance of NTEventLogEventConsumer { Category = 0; CreatorSID = {1, 2, 0, 0, 0, 0, 0, 5, 32, 0, 0, 0, 32, 2, 0, 0}; EventType = 1; Name = "SCM Event Log Consumer"; NameOfUserSIDProperty = "sid"; SourceName = "Service Control Manager"; };</PossibleCause>
</Operation_ESStoConsumerBinding>
</UserData>
</Event>