Files
blue-team-tools/rules/windows/powershell/powershell_script/posh_ps_suspicious_gwmi.yml
T
2022-01-12 20:27:56 +01:00

26 lines
848 B
YAML

title: Suspicious Get-WmiObject
id: 0332a266-b584-47b4-933d-a00b103e1b37
status: experimental
description: The infrastructure for management data and operations that enables local and remote management of Windows personal computers and servers
date: 2022/01/12
author: frack113
references:
- https://attack.mitre.org/datasources/DS0005/
- https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-wmiobject?view=powershell-5.1&viewFallbackFrom=powershell-7
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection:
ScriptBlockText|contains:
- Get-WmiObject
- gwmi
condition: selection
falsepositives:
- Legitimate PowerShell scripts
level: low
tags:
- attack.persistence
- attack.t1546