Detection rules › Sigma

WMI Event Subscription

Severity
medium
Author
Tom Ueltschi (@c_APT_ure)
Source
upstream

Detects creation of WMI event subscription persistence method

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription
Privilege EscalationT1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription

Event coverage

ProviderEvent IDTitle
Sysmon19WmiEvent (WmiEventFilter activity detected)
Sysmon20WmiEvent (WmiEventConsumer activity detected)
Sysmon21WmiEvent (WmiEventConsumerToFilter activity detected)

Stages and Predicates

Stage 1: selection

Neighbors

Stricter alternatives (narrower than this rule)

The rules below may be useful if you find the current rule is too noisy / lacks specificity.

Often fire together

Rules that target events appearing in the same incident timelines. They pattern-match on adjacent steps of the same TTP, so an alert from one is often paired with alerts from these. Useful for triage context and for assembling chained-detection rules.