Detection rules › Sigma

Suspicious Process Created Via Wmic.EXE

Severity
high
Author
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects WMIC executing "process call create" with suspicious calls to processes such as "rundll32", "regsrv32", etc.

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1047 Windows Management Instrumentation

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: selection

or:
CommandLine|contains: '%ProgramData%'
CommandLine|contains: '%appdata%'
CommandLine|contains: '%comspec%'
CommandLine|contains: '%localappdata%'
CommandLine|contains: '%temp%'
CommandLine|contains: '%tmp%'
CommandLine|contains: '\AppData\Local\'
CommandLine|contains: '\Users\Public\'
CommandLine|contains: '\Windows\Temp\'
CommandLine|contains: bitsadmin
CommandLine|contains: certutil
CommandLine|contains: 'cmd /c '
CommandLine|contains: 'cmd /k '
CommandLine|contains: 'cmd /r '
CommandLine|contains: 'cmd.exe /c '
CommandLine|contains: 'cmd.exe /k '
CommandLine|contains: 'cmd.exe /r '
CommandLine|contains: cscript
CommandLine|contains: mshta
CommandLine|contains: powershell
CommandLine|contains: pwsh
CommandLine|contains: regsvr32
CommandLine|contains: rundll32
CommandLine|contains: wscript
CommandLine|contains: 'call '
CommandLine|contains: 'create '
CommandLine|contains: 'process '

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • %ProgramData% corpus 4 (sigma 4)
  • %appdata% corpus 4 (sigma 4)
  • %comspec% corpus 3 (sigma 3)
  • %localappdata% corpus 2 (sigma 2)
  • %temp% corpus 5 (sigma 5)
  • %tmp% corpus 9 (sigma 9)
  • \AppData\Local\ corpus 8 (sigma 8)
  • \Users\Public\ corpus 17 (sigma 17)
  • \Windows\Temp\ corpus 10 (sigma 10)
  • bitsadmin corpus 5 (sigma 5)
  • call
  • certutil corpus 5 (sigma 5)
  • cmd /c corpus 5 (sigma 5)
  • cmd /k corpus 5 (sigma 5)
  • cmd /r corpus 5 (sigma 5)
  • cmd.exe /c corpus 6 (sigma 6)
  • cmd.exe /k corpus 6 (sigma 6)
  • cmd.exe /r corpus 6 (sigma 6)
  • create
  • cscript corpus 12 (sigma 12)
  • mshta corpus 11 (sigma 11)
  • powershell corpus 16 (sigma 16)
  • process corpus 2 (sigma 2)
  • pwsh corpus 5 (sigma 5)
  • regsvr32 corpus 11 (sigma 11)
  • rundll32 corpus 19 (sigma 19)
  • wscript corpus 12 (sigma 12)