258. That's How Adversaries Abuse WMI for Software Discovery
Hello everyone!
Let's talk about discovery one more time as this is one of the best tactics to catch the bad guys before it's too late. This time we'll look at Software Discovery (T1518).
So, according to this report, the adversary leveraged WMI for browser-related process enumeration:
C:\windows\system32\cmd.exe /d /s /c "powershell.exe "Get-WmiObject Win32_Process | Where-Object { $_.Name -eq 'chrome.exe' }""
C:\windows\system32\cmd.exe /d /s /c "powershell.exe "Get-WmiObject Win32_Process | Where-Object { $_.Name -eq 'msedge.exe' }""
Yes, it's another great target for your threat hunting mission:
event_type: "processcreatewin"
AND
cmdline: ("Get-WmiObject" AND "Win32_Process")
AND
cmdline: ("chrome.exe" OR "msedge.exe")
See you tomorrow!
Comments
Post a Comment