Local Groups Reconnaissance Via Wmic.EXE
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects the execution of "wmic" with the "group" flag. Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.
Severity
Attention
Rule Requirement
Criteria
Action1: actionname = "Process started" AND (PROCESSNAME endswith "\wmic.exe" OR ORIGINALFILENAME = "wmic.exe") AND COMMANDLINE contains " group" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
frack113


