Local Groups Reconnaissance Via Wmic.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the execution of "wmic" with the "group" flag. Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.

Severity

Attention

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith "\wmic.exe" OR ORIGINALFILENAME = "wmic.exe") AND COMMANDLINE contains " group" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113