sigma |
win_susp_lsass_dump_generic.yml |
- '\wmiprvse.exe' |
DRL 1.0 |
sigma |
win_susp_wmi_login.yml |
ProcessName\|endswith: '\WmiPrvSE.exe' |
DRL 1.0 |
sigma |
win_wmiprvse_wbemcomn_dll_hijack.yml |
title: T1047 Wmiprvse Wbemcomn DLL Hijack |
DRL 1.0 |
sigma |
win_alert_lsass_access.yml |
- 'C:\Windows\System32\wbem\WmiPrvSE.exe' |
DRL 1.0 |
sigma |
win_defender_psexec_wmi_asr.yml |
- '\wmiprvse.exe' |
DRL 1.0 |
sigma |
file_event_win_susp_adsi_cache_usage.yml |
- 'C:\Windows\System32\wbem\WmiPrvSE.exe' |
DRL 1.0 |
sigma |
file_event_win_wmiprvse_wbemcomn_dll_hijack.yml |
title: Wmiprvse Wbemcomn DLL Hijack |
DRL 1.0 |
sigma |
image_load_wmiprvse_wbemcomn_dll_hijack.yml |
title: Wmiprvse Wbemcomn DLL Hijack |
DRL 1.0 |
sigma |
image_load_wmiprvse_wbemcomn_dll_hijack.yml |
Image\|endswith: '\wmiprvse.exe' |
DRL 1.0 |
sigma |
image_load_wmi_module_load.yml |
description: Detects non wmiprvse loading WMI modules |
DRL 1.0 |
sigma |
image_load_wmi_module_load.yml |
- '\WmiPrvSE.exe' |
DRL 1.0 |
sigma |
image_load_wmi_persistence_commandline_event_consumer.yml |
Image: 'C:\Windows\System32\wbem\WmiPrvSE.exe' |
DRL 1.0 |
sigma |
pipe_created_alternate_powershell_hosts_pipe.yml |
- '\Windows\system32\wbem\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_access_win_cred_dump_lsass_access.yml |
- 'C:\WINDOWS\system32\wbem\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_access_win_cred_dump_lsass_access.yml |
# - '\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_access_win_susp_proc_access_lsass.yml |
SourceImage: 'C:\WINDOWS\system32\wbem\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_access_win_susp_proc_access_lsass.yml |
SourceImage: 'C:\Windows\sysWOW64\wbem\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_creation_win_apt_lazarus_activity_apr21.yml |
- 'C:\Windows\System32\wbem\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_creation_win_apt_ta505_dropper.yml |
description: Detects mshta loaded by wmiprvse as parent as used by TA505 malicious documents |
DRL 1.0 |
sigma |
proc_creation_win_apt_ta505_dropper.yml |
ParentImage\|endswith: '\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_creation_win_impacket_lateralization.yml |
# parent is wmiprvse.exe |
DRL 1.0 |
sigma |
proc_creation_win_impacket_lateralization.yml |
- '\wmiprvse.exe' # wmiexec |
DRL 1.0 |
sigma |
proc_creation_win_lolbins_with_wmiprvse_parent_process.yml |
title: Lolbins Process Creation with WmiPrvse |
DRL 1.0 |
sigma |
proc_creation_win_lolbins_with_wmiprvse_parent_process.yml |
description: This rule will monitor LOLBin process creations by wmiprvse. Add more LOLBins to rule logic if needed. |
DRL 1.0 |
sigma |
proc_creation_win_lolbins_with_wmiprvse_parent_process.yml |
ParentImage\|endswith: \wbem\WmiPrvSE.exe |
DRL 1.0 |
sigma |
proc_creation_win_shell_spawn_susp_program.yml |
- '\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_creation_win_susp_powershell_parent_process.yml |
- '\wmiprvse.exe' |
DRL 1.0 |
sigma |
proc_creation_win_wmiprvse_spawning_process.yml |
title: Wmiprvse Spawning Process |
DRL 1.0 |
sigma |
proc_creation_win_wmiprvse_spawning_process.yml |
description: Detects wmiprvse spawning processes |
DRL 1.0 |
sigma |
proc_creation_win_wmiprvse_spawning_process.yml |
ParentImage\|endswith: '\WmiPrvSe.exe' |
DRL 1.0 |
sigma |
proc_creation_win_wmiprvse_spawning_process.yml |
- '\WmiPrvSE.exe' |
DRL 1.0 |
sigma |
proc_creation_win_wmi_spwns_powershell.yml |
- '\wmiprvse.exe' |
DRL 1.0 |
malware-ioc |
nukesped_lazarus |
. WmiPrvse.exe``{:.highlight .language-cmhg} |
© ESET 2014-2018 |
malware-ioc |
nukesped_lazarus |
. Wmiprvse.exe``{:.highlight .language-cmhg} |
© ESET 2014-2018 |
atomic-red-team |
T1546.003.md |
WMI subscription execution is proxied by the WMI Provider Host process (WmiPrvSe.exe) and thus may result in elevated SYSTEM privileges.</blockquote> |
MIT License. © 2018 Red Canary |
signature-base |
crime_cn_campaign_njrat.yar |
$s4 = “WmiPrvSE.exe” fullword wide |
CC BY-NC 4.0 |
signature-base |
crime_cn_campaign_njrat.yar |
$a1 = “WmiPrvSE.exe” fullword wide |
CC BY-NC 4.0 |
signature-base |
crime_cn_campaign_njrat.yar |
$s2 = “Temporary Projects\WmiPrvSE\” ascii |
CC BY-NC 4.0 |
signature-base |
gen_cn_hacktools.yar |
$s8 = “wmiprvse.exe” fullword ascii |
CC BY-NC 4.0 |
signature-base |
gen_cn_hacktools.yar |
$s10 = “wmiprvse.exe” fullword ascii |
CC BY-NC 4.0 |
signature-base |
gen_cn_hacktools.yar |
$s8 = “wmiprvse.exe” ascii |
CC BY-NC 4.0 |
signature-base |
gen_cn_hacktools.yar |
$s5 = “wmiprvse.exe” fullword ascii |
CC BY-NC 4.0 |
signature-base |
gen_cn_hacktools.yar |
$s3 = “wmiprvse.exe” fullword ascii |
CC BY-NC 4.0 |
signature-base |
gen_cn_hacktools.yar |
$s6 = “wmiprvse.exe” fullword ascii |
CC BY-NC 4.0 |