Skip to content

Commit 290c571

Browse files
committed
feat(rules): Microsoft Office file execution via WMI
Identifies the execution via Windows Management Instrumentation (WMI) of the binary file written by the Microsoft Office process. Attackers can exploit WMI to silently execute malicious code.
1 parent 8d82205 commit 290c571

File tree

1 file changed

+32
-0
lines changed

1 file changed

+32
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
name: Microsoft Office file execution via WMI
2+
id: 50f6efa2-4d7b-4fb7-b1a9-65c3a24d9152
3+
version: 1.0.0
4+
description: |
5+
Identifies the execution via Windows Management Instrumentation (WMI) of the binary file written
6+
by the Microsoft Office process. Attackers can exploit WMI to silently execute malicious code.
7+
labels:
8+
tactic.id: TA0001
9+
tactic.name: Initial Access
10+
tactic.ref: https://attack.mitre.org/tactics/TA0001/
11+
technique.id: T1566
12+
technique.name: Phishing
13+
technique.ref: https://attack.mitre.org/techniques/T1566/
14+
subtechnique.id: T1566.001
15+
subtechnique.name: Spearphishing Attachment
16+
subtechnique.ref: https://attack.mitre.org/techniques/T1566/001/
17+
references:
18+
- https://redcanary.com/threat-detection-report/techniques/windows-management-instrumentation/
19+
20+
condition: >
21+
sequence
22+
maxspan 2m
23+
|create_file and ps.name iin msoffice_binaries and (file.extension iin ('.exe', '.com') or file.is_exec = true)| by file.path
24+
|spawn_process and ps.name ~= 'wmiprvse.exe'| by ps.child.exe
25+
action:
26+
- name: kill
27+
28+
output: >
29+
Microsoft Office process %1.ps.exe wrote the file %1.file.path and subsequently executed it via WMI
30+
severity: high
31+
32+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)