259. That's How Bloody Wolf Abuses WMI for Discovery
Hello everyone!
As I'm speaking at KazHackStan this week, I'm going to share some insights regarding local threats. Let's start from how Bloody Wolf used Windows Management Instrumentation (T1047).
The adversary leveraged STRRAT, which abused WMI for reconnaissance:cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter' path antivirusproduct get displayname /format:list"
Of course, it's great target for hunting as always:
event_type: "processcreatewin"
AND
proc_file_path: "wmic.exe"
AND
cmdline: ("win32_logicaldisk" OR "win32_operatingsystem" OR "antivirusproduct")
See you tomorrow!
Comments
Post a Comment