Rules: WMI Managed Object Format (MOF) Process Execution
Attackers will often utilize The Managed Object Format (MOF) compiler to conceal and execute their malicious code within the WMI Repository.
Detail | Value |
---|---|
Type | Templated Match |
Category | Execution |
Apply Risk to Entities | device_hostname, device_ip, user_username |
Signal Name | WMI Managed Object Format (MOF) Process Execution |
Summary Expression | Detected WMI Managed Object Format Process execution on host: {{device_hostname}} |
Score/Severity | Static: 3 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0002, _mitreAttackTechnique:T1047 |
Origin | Field |
---|---|
Normalized Schema | LOWER |
Normalized Schema | commandLine |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | parentBaseImage |
Normalized Schema | user_username |