WMI Module Loaded By Uncommon Process
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects WMI modules being loaded by an uncommon process
Severity
Attention
Rule Requirement
Criteria
Action1: actionname = "sa_imageloaded" AND OBJECTNAME endswith "\fastprox.dll,\wbemcomn.dll,\wbemprox.dll,\wbemsvc.dll,\WmiApRpl.dll,\wmiclnt.dll,\WMINet_Utils.dll,\wmiprov.dll,\wmiutils.dll" AND PROCESSNAME notcontains ":\Program Files (x86)\,:\Program Files\,:\Windows\explorer.exe,:\Windows\Microsoft.NET\Framework\,:\Windows\Microsoft.NET\FrameworkArm\,:\Windows\Microsoft.NET\FrameworkArm64\,:\Windows\Microsoft.NET\Framework64\,:\Windows\System32\,:\Windows\SysWOW64" AND (PROCESSNAME notendswith "\WindowsAzureGuestAgent.exe,\WaAppAgent.exe" AND PROCESSNAME notendswith "\thor.exe,\thor64.exe" AND PROCESSNAME notendswith "\MsMpEng.exe" AND PROCESSNAME notcontains "\Microsoft\Teams\current\Teams.exe,\Microsoft\Teams\Update.exe" AND PROCESSNAME notendswith ":\Windows\Sysmon.exe,:\Windows\Sysmon64.exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PRODUCT_NAME,Action1.OBJECTNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Roberto Rodriguez @Cyb3rWard0g


