228. That's How Adversaries Abuse WMI for Discovery
Hello everyone!
Discovery is a perfect attack stage for your threat hunting mission! And today we'll look how adversaries abuse wmic to collect system information - Windows Management Instrumentation (T1047).
If we look at behaviors related to KiwiStealer, we can see that it executes multiple discovery commands with wmic:
wmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get displayName
wmic cpu get name
wmic csproduct get name
wmic nic where NetEnabled=true get MACAddress
wmic os get caption
As you can see, the adversary collects information about antivirus software, CPU, device model, network adapters and operating system.
Let's use all of this to build a hunting query:
event_type: "processcreatewin"
AND
proc_file_path: "wmic.exe"
AND
cmdline: ("AntiVirusProduct get displayName" OR "cpu get name" OR "csproduct get name" OR "get MACAddress" OR "os get caption")
It may be (very) noisy, but proper filtering can solve this problem.
See you tomorrow!
Comments
Post a Comment