title: MMC Spawning Windows Shell id: 05a2ab7e-ce11-4b63-86db-ab32e763e11d status: experimental description: Detects a Windows command line executable started from MMC. author: Karneades, Swisscom CSIRT date: 2019/08/05 tags: - attack.lateral_movement - attack.t1175 - attack.t1059.004 - attack.t1059.005 - attack.t1059.003 - attack.t1059.001 logsource: category: process_creation product: windows detection: selection: ParentImage: '*\mmc.exe' Image: - '*\cmd.exe' - '*\powershell.exe' - '*\wscript.exe' - '*\cscript.exe' - '*\sh.exe' - '*\bash.exe' - '*\reg.exe' - '*\regsvr32.exe' - '*\BITSADMIN*' condition: selection fields: - CommandLine - Image - ParentCommandLine level: high