WMI used to remotely execute content
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.What happened
{{ @process.executable.name }}
spawned from Windows Management Instrumentation (WMI), which could indicate lateral movement from another compromised host.
Goal
Detects when WMI spawns a shell to execute content.
Strategy
Threat actors are known to utilize tools found natively in a victim’s environment to accomplish their objectives. Windows Management Instrumentation, a legitimate Windows capability, has been abused by malicious actors in the past to execute content on remote systems.
Triage and response
- Identify what is being executed, and if it is authorized.
- Identify account used to remotely authenticate to the host.
- If it’s not authorized, isolate the host from the network, and lock down potentially compromised account.
- Follow your organization’s internal processes for investigating and remediating compromised systems.
Requires Agent version 7.50.0 or greater.