Detection rules › Sigma

Whoami.EXE Execution From Privileged Process

Severity
high
Author
Florian Roth (Nextron Systems), Teymur Kheirkhabarov
Source
upstream

Detects the execution of "whoami.exe" by privileged accounts that are often abused by threat actors

MITRE ATT&CK coverage

TacticTechniques
DiscoveryT1033 System Owner/User Discovery

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\whoami.exe'
OriginalFileName: whoami.exe

Stage 2: all of selection_user

or:
User|contains: AUTHORI
User|contains: AUTORI
User|contains: TrustedInstaller

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Imageends_with
  • \whoami.exe corpus 18 (sigma 18)
OriginalFileNameeq
  • whoami.exe corpus 9 (sigma 9)
Usermatch
  • AUTHORI corpus 16 (sigma 16)
  • AUTORI corpus 16 (sigma 16)
  • TrustedInstaller