Files
blue-team-tools/deprecated/windows/proc_creation_win_wmic_remote_command.yml
2023-04-23 15:42:01 +02:00

31 lines
851 B
YAML

title: WMI Remote Command Execution
id: e42af9df-d90b-4306-b7fb-05c863847ebd
status: deprecated
description: An adversary might use WMI to execute commands on a remote system
references:
- https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic
author: frack113
date: 2022/03/13
modified: 2023/02/14
tags:
- attack.execution
- attack.t1047
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\WMIC.exe'
- OriginalFileName: 'wmic.exe'
selection_cli:
CommandLine|contains|all:
- '/node:'
- 'process'
- 'call'
- 'create'
condition: all of selection*
falsepositives:
- Unknown
level: medium