228. That's How Adversaries Abuse WMI for Discovery

Hello everyone!

Discovery is a perfect attack stage for your threat hunting mission! And today we'll look how adversaries abuse wmic to collect system information - Windows Management Instrumentation (T1047).

If we look at behaviors related to KiwiStealer, we can see that it executes multiple discovery commands with wmic:

wmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get displayName

wmic cpu get name

wmic csproduct get name

wmic nic where NetEnabled=true get MACAddress

wmic os get caption

As you can see, the adversary collects information about antivirus software, CPU, device model, network adapters and operating system.

Let's use all of this to build a hunting query:

event_type: "processcreatewin"

AND

proc_file_path: "wmic.exe"

AND

cmdline: ("AntiVirusProduct get displayName" OR "cpu get name" OR "csproduct get name" OR "get MACAddress" OR "os get caption")

It may be (very) noisy, but proper filtering can solve this problem.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge