Files
blue-team-tools/rules/windows/image_load/image_load_wmi_module_load.yml
T

67 lines
2.3 KiB
YAML
Raw Normal View History

2020-06-10 16:32:30 +02:00
title: WMI Modules Loaded
id: 671bb7e3-a020-4824-a00e-2ee5b55f385e
description: Detects non wmiprvse loading WMI modules
status: experimental
date: 2019/08/10
2022-01-12 11:32:34 +01:00
modified: 2022/01/12
2020-06-10 16:32:30 +02:00
author: Roberto Rodriguez @Cyb3rWard0g
references:
2021-05-22 01:01:33 -03:00
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190811201010.html
2020-06-10 16:32:30 +02:00
tags:
- attack.execution
- attack.t1047
logsource:
category: image_load
2020-06-10 16:32:30 +02:00
product: windows
detection:
selection:
ImageLoaded|endswith:
- '\wmiclnt.dll'
- '\WmiApRpl.dll'
- '\wmiprov.dll'
- '\wmiutils.dll'
- '\wbemcomn.dll'
- '\wbemprox.dll'
- '\WMINet_Utils.dll'
- '\wbemsvc.dll'
- '\fastprox.dll'
filter:
Image|endswith:
2021-06-15 16:16:28 +02:00
- '\WmiPrvSE.exe'
- '\WmiApSrv.exe'
2020-06-10 16:32:30 +02:00
- '\svchost.exe'
- '\DeviceCensus.exe'
- '\CompatTelRunner.exe'
- '\sdiagnhost.exe'
- '\SIHClient.exe'
2020-07-09 10:26:54 -04:00
- '\ngentask.exe' # c:\Windows\Microsoft.NET\Framework(64)\ngentask.exe
- '\windows\system32\taskhostw.exe' # c:\windows\system32\taskhostw.exe
2020-07-09 13:33:59 -04:00
- '\windows\system32\MoUsoCoreWorker.exe' # c:\windows\System32\MoUsoCoreWorker.exe on win10 20H04 at least
2021-08-18 17:26:57 +02:00
- '\windows\system32\wbem\WMIADAP.exe' # https://github.com/SigmaHQ/sigma/issues/1871
2021-11-16 13:04:52 +01:00
- 'C:\Windows\Sysmon64.exe'
- 'C:\Windows\Sysmon.exe'
- 'C:\Windows\System32\wbem\unsecapp.exe'
2021-11-16 13:39:32 +01:00
- '\logman.exe'
2021-11-17 18:59:22 +01:00
- '\systeminfo.exe'
2021-11-16 23:27:00 +01:00
- '\nvcontainer.exe'
2021-11-17 16:37:27 +01:00
- 'C:\Windows\System32\wbem\WMIC.exe'
2021-11-25 15:35:58 +01:00
- '\explorer.exe'
- '\opera_autoupdate.exe'
- '\MsMpEng.exe'
2022-01-12 11:32:34 +01:00
- '\thor64.exe'
- '\thor.exe'
2021-11-19 12:15:01 +01:00
filter_generic: # rule caused many false positives in different productive environments - using this filter to exclude all programs that run from folders that only the administrative groups should have access to
Image|startswith:
- 'C:\Program Files\'
- 'C:\Program Files (x86)\'
condition: selection and not filter and not filter_generic
2020-06-10 16:32:30 +02:00
fields:
- ComputerName
- User
- Image
- ImageLoaded
falsepositives:
- Unknown
2021-11-24 16:58:53 +01:00
level: informational # too many false positives
2020-06-10 16:32:30 +02:00