Detection rules › Sigma
Suspicious WSMAN Provider Image Loads
Detects signs of potential use of the WSMAN provider from uncommon processes locally and remote execution.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Execution | T1059.001 Command and Scripting Interpreter: PowerShell |
| Lateral Movement | T1021.003 Remote Services: Distributed Component Object Model |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 7 | Image loaded |
Stages and Predicates
Stage 1: request_client
or:
ImageLoaded|endswith: '\Microsoft.WSMan.Management.ni.dll'
ImageLoaded|endswith: '\WsmAuto.dll'
ImageLoaded|endswith: '\WsmSvc.dll'
OriginalFileName: Microsoft.WSMan.Management.dll
OriginalFileName: WSMANAUTOMATION.DLL
OriginalFileName: WsmSvc.dll
Stage 2: respond_server
Image|endswith: '\svchost.exe'
OriginalFileName: WsmWmiPl.dll
Stage 3: not 1 of filter*
or:
or:
Image|startswith: 'C:\Windows\Microsoft.NET\Framework64\v'
Image|startswith: 'C:\Windows\Microsoft.NET\FrameworkArm64\v'
Image|startswith: 'C:\Windows\Microsoft.NET\FrameworkArm\v'
Image|startswith: 'C:\Windows\Microsoft.NET\Framework\v'
Image|endswith: '\mscorsvw.exe'
CommandLine|contains: 'svchost.exe -k GraphicsPerfSvcGroup -s GraphicsPerfSvc'
CommandLine|contains: 'svchost.exe -k NetworkService -p -s Wecsvc'
CommandLine|contains: 'svchost.exe -k netsvcs -p -s BITS'
CommandLine|contains: 'svchost.exe -k netsvcs'
Image|endswith: '\mmc.exe'
Image: 'C:\Program Files (x86)\PowerShell\6\pwsh.exe'
Image: 'C:\Program Files (x86)\PowerShell\7\pwsh.exe'
Image: 'C:\Program Files\PowerShell\6\pwsh.exe'
Image: 'C:\Program Files\PowerShell\7\pwsh.exe'
Image: 'C:\Windows\System32\Configure-SMRemoting.exe'
Image: 'C:\Windows\System32\ServerManager.exe'
Image: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'
Image: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe'
Image: 'C:\Windows\System32\sdiagnhost.exe'
Image: 'C:\Windows\System32\services.exe'
Image|startswith: 'C:\$WINDOWS.~BT\Sources\'
Image|startswith: 'C:\Program Files\Citrix\'
Image|startswith: 'C:\Windows\Temp\asgard2-agent\'
Stage 4: not svchost
Image|endswith: '\svchost.exe'
Stage 5: not commandline_null
CommandLine: null
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
Image | ends_with |
|
Image | eq |
|
Image | starts_with |
|
ImageLoaded | ends_with |
|
OriginalFileName | eq |
|