Detectionmediumtest

WMIC Loading Scripting Libraries

Detects threat actors proxy executing code and bypassing application controls by leveraging wmic and the `/FORMAT` argument switch to download and execute an XSL file (i.e js, vbs, etc). It could be an indicator of SquiblyTwo technique, which uses Windows Management Instrumentation (WMI) to execute malicious code.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)Created Sat Oct 17Updated Thu Oct 1306ce37c2-61ab-4f05-9ff5-b1a96d18ae32windows
Log Source
WindowsImage Load (DLL)
ProductWindows← raw: windows
CategoryImage Load (DLL)← raw: image_load
Detection Logic
Detection Logic1 selector
detection:
    selection:
        Image|endswith: '\wmic.exe'
        ImageLoaded|endswith:
            - '\jscript.dll'
            - '\vbscript.dll'
    condition: selection
False Positives

The command wmic os get lastbootuptime loads vbscript.dll

The command wmic os get locale loads vbscript.dll

Since the ImageLoad event doesn't have enough information in this case. It's better to look at the recent process creation events that spawned the WMIC process and investigate the command line and parent/child processes to get more insights

The command `wmic ntevent` loads vbscript.dll

Rule Metadata
Rule ID
06ce37c2-61ab-4f05-9ff5-b1a96d18ae32
Status
test
Level
medium
Type
Detection
Created
Sat Oct 17
Modified
Thu Oct 13
Path
rules/windows/image_load/image_load_wmic_remote_xsl_scripting_dlls.yml
Raw Tags
attack.defense-evasionattack.t1220
View on GitHub