title: Suspicious Get-WmiObject id: 0332a266-b584-47b4-933d-a00b103e1b37 status: experimental description: The infrastructure for management data and operations that enables local and remote management of Windows personal computers and servers references: - https://attack.mitre.org/datasources/DS0005/ - https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-wmiobject?view=powershell-5.1&viewFallbackFrom=powershell-7 author: frack113 date: 2022/01/12 modified: 2022/11/02 tags: - attack.persistence - attack.t1546 logsource: product: windows category: ps_script definition: 'Requirements: Script Block Logging must be enabled' detection: selection: ScriptBlockText|contains: - 'Get-WmiObject' - 'gwmi' filter_cl_utility: Path|endswith: '\CL_Utility.ps1' ScriptBlockText|contains|all: - 'function Get-FreeSpace' - 'SELECT * FROM Win32_LogicalDisk WHERE MediaType=12' condition: selection and not 1 of filter_* falsepositives: - Legitimate PowerShell scripts level: low