Files
hayabusa/rules/Sigma/win_wmi_persistence_script_event_consumer.yml
2021-11-14 11:00:56 +09:00

32 lines
888 B
YAML

title: WMI Persistence - Script Event Consumer
author: Thomas Patzke
date: 2018/03/07
description: Detects WMI script event consumers
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
Image: C:\WINDOWS\system32\wbem\scrcons.exe
SELECTION_3:
ParentImage: C:\Windows\System32\svchost.exe
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Legitimate event consumers
id: ec1d5e28-8f3b-4188-a6f8-6e8df81dc28e
level: high
logsource:
category: process_creation
product: windows
modified: 2020/08/29
references:
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
status: experimental
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1546.003
- attack.t1047
yml_filename: win_wmi_persistence_script_event_consumer.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation