Detection rules › Elastic
Suspicious WMI Event Subscription Created
Detects the creation of a WMI Event Subscription. Attackers can abuse this mechanism for persistence or to elevate to SYSTEM privileges.
MITRE ATT&CK coverage
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| WMI-Activity | 21 | WMI Events were bound. |
Stages and Predicates
Stage 1: eql:any
((data_stream.dataset:"endpoint.events.api" and event.provider:"Microsoft-Windows-WMI-Activity" and process.Ext.api.name:"IWbemServices::PutInstance" and process.Ext.api.parameters.consumer_type:("ActiveScriptEventConsumer" or "CommandLineEventConsumer")) or (data_stream.dataset:"windows.sysmon_operational" and winlog.event_data.Consumer:"subscription:CommandLineEventConsumer" and winlog.event_data.Operation:"Created"))Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
data_stream.dataset | eq |
|
event.provider | eq |
|
process.Ext.api.name | eq |
|
process.Ext.api.parameters.consumer_type | in |
|
winlog.event_data.Consumer | wildcard |
|
winlog.event_data.Operation | wildcard |
|