259. That's How Bloody Wolf Abuses WMI for Discovery

Hello everyone!

As I'm speaking at KazHackStan this week, I'm going to share some insights regarding local threats. Let's start from how Bloody Wolf used Windows Management Instrumentation (T1047).

The adversary leveraged STRRAT, which abused WMI for reconnaissance:

cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"

cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"

cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"

cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter' path antivirusproduct get displayname /format:list"

Of course, it's great target for hunting as always:

event_type: "processcreatewin"

AND

proc_file_path: "wmic.exe"

AND

cmdline: ("win32_logicaldisk" OR "win32_operatingsystem" OR "antivirusproduct")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge