Files
blue-team-tools/rules/windows/image_load/sysmon_wmi_module_load.yml
T

51 lines
1.5 KiB
YAML
Raw Normal View History

2020-06-10 16:32:30 +02:00
title: WMI Modules Loaded
id: 671bb7e3-a020-4824-a00e-2ee5b55f385e
description: Detects non wmiprvse loading WMI modules
status: experimental
date: 2019/08/10
2021-08-18 18:17:53 +02:00
modified: 2021/08/18
2020-06-10 16:32:30 +02:00
author: Roberto Rodriguez @Cyb3rWard0g
references:
2021-05-22 01:01:33 -03:00
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190811201010.html
2020-06-10 16:32:30 +02:00
tags:
- attack.execution
- attack.t1047
logsource:
category: image_load
2020-06-10 16:32:30 +02:00
product: windows
detection:
selection:
ImageLoaded|endswith:
- '\wmiclnt.dll'
- '\WmiApRpl.dll'
- '\wmiprov.dll'
- '\wmiutils.dll'
- '\wbemcomn.dll'
- '\wbemprox.dll'
- '\WMINet_Utils.dll'
- '\wbemsvc.dll'
- '\fastprox.dll'
filter:
Image|endswith:
2021-06-15 16:16:28 +02:00
- '\WmiPrvSE.exe'
- '\WmiApSrv.exe'
2020-06-10 16:32:30 +02:00
- '\svchost.exe'
- '\DeviceCensus.exe'
- '\CompatTelRunner.exe'
- '\sdiagnhost.exe'
- '\SIHClient.exe'
2020-07-09 10:26:54 -04:00
- '\ngentask.exe' # c:\Windows\Microsoft.NET\Framework(64)\ngentask.exe
- '\windows\system32\taskhostw.exe' # c:\windows\system32\taskhostw.exe
2020-07-09 13:33:59 -04:00
- '\windows\system32\MoUsoCoreWorker.exe' # c:\windows\System32\MoUsoCoreWorker.exe on win10 20H04 at least
2021-08-18 17:26:57 +02:00
- '\windows\system32\wbem\WMIADAP.exe' # https://github.com/SigmaHQ/sigma/issues/1871
2020-06-10 16:32:30 +02:00
condition: selection and not filter
fields:
- ComputerName
- User
- Image
- ImageLoaded
falsepositives:
- Unknown
level: high