| sigma | 
      win_susp_lsass_dump_generic.yml | 
      - '\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      win_susp_wmi_login.yml | 
      ProcessName\|endswith: '\WmiPrvSE.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      win_wmiprvse_wbemcomn_dll_hijack.yml | 
      title: T1047 Wmiprvse Wbemcomn DLL Hijack | 
      DRL 1.0 | 
    
    
      | sigma | 
      win_alert_lsass_access.yml | 
      - 'C:\Windows\System32\wbem\WmiPrvSE.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      win_defender_psexec_wmi_asr.yml | 
      - '\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      file_event_win_susp_adsi_cache_usage.yml | 
      - 'C:\Windows\System32\wbem\WmiPrvSE.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      file_event_win_wmiprvse_wbemcomn_dll_hijack.yml | 
      title: Wmiprvse Wbemcomn DLL Hijack | 
      DRL 1.0 | 
    
    
      | sigma | 
      image_load_wmiprvse_wbemcomn_dll_hijack.yml | 
      title: Wmiprvse Wbemcomn DLL Hijack | 
      DRL 1.0 | 
    
    
      | sigma | 
      image_load_wmiprvse_wbemcomn_dll_hijack.yml | 
      Image\|endswith: '\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      image_load_wmi_module_load.yml | 
      description: Detects non wmiprvse loading WMI modules | 
      DRL 1.0 | 
    
    
      | sigma | 
      image_load_wmi_module_load.yml | 
      - '\WmiPrvSE.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      image_load_wmi_persistence_commandline_event_consumer.yml | 
      Image: 'C:\Windows\System32\wbem\WmiPrvSE.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      pipe_created_alternate_powershell_hosts_pipe.yml | 
      - '\Windows\system32\wbem\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_access_win_cred_dump_lsass_access.yml | 
      - 'C:\WINDOWS\system32\wbem\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_access_win_cred_dump_lsass_access.yml | 
      #     - '\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_access_win_susp_proc_access_lsass.yml | 
      SourceImage: 'C:\WINDOWS\system32\wbem\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_access_win_susp_proc_access_lsass.yml | 
      SourceImage: 'C:\Windows\sysWOW64\wbem\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_apt_lazarus_activity_apr21.yml | 
      - 'C:\Windows\System32\wbem\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_apt_ta505_dropper.yml | 
      description: Detects mshta loaded by wmiprvse as parent as used by TA505 malicious documents | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_apt_ta505_dropper.yml | 
      ParentImage\|endswith: '\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_impacket_lateralization.yml | 
      #    parent is wmiprvse.exe | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_impacket_lateralization.yml | 
      - '\wmiprvse.exe'        # wmiexec | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_lolbins_with_wmiprvse_parent_process.yml | 
      title: Lolbins Process Creation with WmiPrvse | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_lolbins_with_wmiprvse_parent_process.yml | 
      description: This rule will monitor LOLBin process creations by wmiprvse. Add more LOLBins to rule logic if needed.   | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_lolbins_with_wmiprvse_parent_process.yml | 
      ParentImage\|endswith: \wbem\WmiPrvSE.exe | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_shell_spawn_susp_program.yml | 
      - '\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_susp_powershell_parent_process.yml | 
      - '\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_wmiprvse_spawning_process.yml | 
      title: Wmiprvse Spawning Process | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_wmiprvse_spawning_process.yml | 
      description: Detects wmiprvse spawning processes | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_wmiprvse_spawning_process.yml | 
      ParentImage\|endswith: '\WmiPrvSe.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_wmiprvse_spawning_process.yml | 
      - '\WmiPrvSE.exe' | 
      DRL 1.0 | 
    
    
      | sigma | 
      proc_creation_win_wmi_spwns_powershell.yml | 
      - '\wmiprvse.exe' | 
      DRL 1.0 | 
    
    
      | malware-ioc | 
      nukesped_lazarus | 
      .WmiPrvse.exe``{:.highlight .language-cmhg} | 
      © ESET 2014-2018 | 
    
    
      | malware-ioc | 
      nukesped_lazarus | 
      .Wmiprvse.exe``{:.highlight .language-cmhg} | 
      © ESET 2014-2018 | 
    
    
      | atomic-red-team | 
      T1546.003.md | 
      WMI subscription execution is proxied by the WMI Provider Host process (WmiPrvSe.exe) and thus may result in elevated SYSTEM privileges.</blockquote> | 
      MIT License. © 2018 Red Canary | 
    
    
      | signature-base | 
      crime_cn_campaign_njrat.yar | 
      $s4 = “WmiPrvSE.exe” fullword wide | 
      CC BY-NC 4.0 | 
    
    
      | signature-base | 
      crime_cn_campaign_njrat.yar | 
      $a1 = “WmiPrvSE.exe” fullword wide | 
      CC BY-NC 4.0 | 
    
    
      | signature-base | 
      crime_cn_campaign_njrat.yar | 
      $s2 = “Temporary Projects\WmiPrvSE\” ascii | 
      CC BY-NC 4.0 | 
    
    
      | signature-base | 
      gen_cn_hacktools.yar | 
      $s8 = “wmiprvse.exe” fullword ascii | 
      CC BY-NC 4.0 | 
    
    
      | signature-base | 
      gen_cn_hacktools.yar | 
      $s10 = “wmiprvse.exe” fullword ascii | 
      CC BY-NC 4.0 | 
    
    
      | signature-base | 
      gen_cn_hacktools.yar | 
      $s8 = “wmiprvse.exe” ascii | 
      CC BY-NC 4.0 | 
    
    
      | signature-base | 
      gen_cn_hacktools.yar | 
      $s5 = “wmiprvse.exe” fullword ascii | 
      CC BY-NC 4.0 | 
    
    
      | signature-base | 
      gen_cn_hacktools.yar | 
      $s3 = “wmiprvse.exe” fullword ascii | 
      CC BY-NC 4.0 | 
    
    
      | signature-base | 
      gen_cn_hacktools.yar | 
      $s6 = “wmiprvse.exe” fullword ascii | 
      CC BY-NC 4.0 |