Skip to content

Commit 9ef00e5

Browse files
committed
feat(rules): Suspicious execution via WMI from a Microsoft Office process
Identifies a suspicious process execution via Windows Management Instrumentation (WMI) originated from the Microsoft Office process loading an unusual WMI DLL. This technique can indicate code execution evading traditional parent/child processes spawned from Microsoft Office products.
1 parent 6b4602a commit 9ef00e5

File tree

1 file changed

+94
-0
lines changed

1 file changed

+94
-0
lines changed
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
name: Suspicious execution via WMI from a Microsoft Office process
2+
id: cc3f0bbe-ec53-40a7-9eed-f0a8a3f7d7fa
3+
version: 1.0.0
4+
description: |
5+
Identifies a suspicious process execution via Windows Management Instrumentation (WMI)
6+
originated from the Microsoft Office process loading an unusual WMI DLL. This technique
7+
can indicate code execution evading traditional parent/child processes spawned from Microsoft
8+
Office products.
9+
labels:
10+
tactic.id: TA0001
11+
tactic.name: Initial Access
12+
tactic.ref: https://attack.mitre.org/tactics/TA0001/
13+
technique.id: T1566
14+
technique.name: Phishing
15+
technique.ref: https://attack.mitre.org/techniques/T1566/
16+
subtechnique.id: T1566.001
17+
subtechnique.name: Spearphishing Attachment
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1566/001/
19+
references:
20+
- https://threathunterplaybook.com/hunts/windows/190811-WMIModuleLoad/notebook.html
21+
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
22+
23+
condition: >
24+
sequence
25+
maxspan 1m
26+
|load_dll and image.name iin ('wmiclnt.dll', 'wbemcomn.dll', 'wmiprov.dll', 'wbemprox.dll', 'wmutils.dll', 'fastprox.dll', 'WMINet_Utils.dll')
27+
and
28+
(ps.name iin msoffice_binaries or thread.callstack.modules imatches ('*vbe?.dll'))
29+
| by ps.sid
30+
|spawn_process and ps.name iin ('wmiprvse.exe', 'wmiapsrv.exe') and (ps.child.exe imatches ('?:\\Users\\*.exe', '?:\\ProgramData\\*.exe')
31+
or
32+
ps.child.name iin
33+
(
34+
'rundll32.exe',
35+
'regsvr32.exe',
36+
'hh.exe',
37+
'cmd.exe',
38+
'pwsh.exe',
39+
'powershell.exe',
40+
'mshta.exe',
41+
'certutil.exe',
42+
'bitsadmin.exe',
43+
'cscript.exe',
44+
'wscript.exe',
45+
'jsc.exe',
46+
'vssadmin.exe',
47+
'curl.exe',
48+
'wget.exe',
49+
'sc.exe',
50+
'reg.exe',
51+
'schtasks.exe',
52+
'msxsl.exe',
53+
'msbuild.exe',
54+
'regasm.exe',
55+
'regsvcs.exe',
56+
'wmic.exe',
57+
'msiexec.exe'
58+
)
59+
or
60+
ps.child.pe.file.name iin
61+
(
62+
'rundll32.exe',
63+
'regsvr32.exe',
64+
'hh.exe',
65+
'cmd.exe',
66+
'pwsh.exe',
67+
'powershell.exe',
68+
'mshta.exe',
69+
'certutil.exe',
70+
'bitsadmin.exe',
71+
'cscript.exe',
72+
'wscript.exe',
73+
'jsc.exe',
74+
'vssadmin.exe',
75+
'curl.exe',
76+
'wget.exe',
77+
'sc.exe',
78+
'reg.exe',
79+
'schtasks.exe',
80+
'msxsl.exe',
81+
'msbuild.exe',
82+
'regasm.exe',
83+
'regsvcs.exe',
84+
'wmic.exe',
85+
'msiexec.exe'
86+
)
87+
)
88+
| by ps.child.sid
89+
90+
output: >
91+
Suspicious process %2.ps.child.exe launched via WMI from Microsoft Office process %1.ps.cmdline
92+
severity: high
93+
94+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)