Files
hayabusa/rules/Sigma/sysmon_scrcons_imageload_wmi_scripteventconsumer.yml
2021-11-14 11:00:56 +09:00

41 lines
1.4 KiB
YAML

title: WMI Script Host Process Image Loaded
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/09/02
description: Detects signs of the WMI script host process %SystemRoot%\system32\wbem\scrcons.exe
functionality being used via images being loaded by a process.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: '*\scrcons.exe'
SELECTION_3:
ImageLoaded: '*\vbscript.dll'
SELECTION_4:
ImageLoaded: '*\wbemdisp.dll'
SELECTION_5:
ImageLoaded: '*\wshom.ocx'
SELECTION_6:
ImageLoaded: '*\scrrun.dll'
condition: (SELECTION_1 and SELECTION_2 and (SELECTION_3 or SELECTION_4 or SELECTION_5
or SELECTION_6))
falsepositives:
- Unknown
id: b439f47d-ef52-4b29-9a2f-57d8a96cb6b8
level: high
logsource:
category: image_load
product: windows
references:
- https://twitter.com/HunterPlaybook/status/1301207718355759107
- https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-1-wmi-event-subscription/
- https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-200902020333.html
status: experimental
tags:
- attack.lateral_movement
- attack.privilege_escalation
- attack.persistence
- attack.t1546.003
yml_filename: sysmon_scrcons_imageload_wmi_scripteventconsumer.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/image_load