Skip to content

Latest commit

 

History

History
36 lines (29 loc) · 1.23 KB

MATCH-S00147.md

File metadata and controls

36 lines (29 loc) · 1.23 KB

Rules: WMI Managed Object Format (MOF) Process Execution

Description

Attackers will often utilize The Managed Object Format (MOF) compiler to conceal and execute their malicious code within the WMI Repository.

Additional Details

Detail Value
Type Templated Match
Category Execution
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name WMI Managed Object Format (MOF) Process Execution
Summary Expression Detected WMI Managed Object Format Process execution on host: {{device_hostname}}
Score/Severity Static: 3
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0002, _mitreAttackTechnique:T1047

Vendors and Products

Fields Used

Origin Field
Normalized Schema LOWER
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema parentBaseImage
Normalized Schema user_username