258. That's How Adversaries Abuse WMI for Software Discovery

Hello everyone!

Let's talk about discovery one more time as this is one of the best tactics to catch the bad guys before it's too late. This time we'll look at Software Discovery (T1518).

So, according to this report, the adversary leveraged WMI for browser-related process enumeration:

C:\windows\system32\cmd.exe /d /s /c "powershell.exe "Get-WmiObject Win32_Process | Where-Object { $_.Name -eq 'chrome.exe' }""

C:\windows\system32\cmd.exe /d /s /c "powershell.exe "Get-WmiObject Win32_Process | Where-Object { $_.Name -eq 'msedge.exe' }""

Yes, it's another great target for your threat hunting mission:

event_type: "processcreatewin"

AND

cmdline: ("Get-WmiObject" AND "Win32_Process")

AND

cmdline: ("chrome.exe" OR "msedge.exe")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge