APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
14.B.1
|
|
|
An MSSP detection contained evidence of WmiPrvSE.exe executing powershell.exe to execute the Win32_AuditCode WMI class.
[1]
[2]
|
|
A Technique alert detection (red; high severity) called "commandline_wmi_event_consumer_triggered" was generated due to WmiPrvSE.exe executing powershell.exe.
[1]
[2]
|
|
Telemetry showed WmiPrvSE.exe executing powershell.exe.
[1]
|
|
Created and executed a WMI class using PowerShell
WMI Process (WmiPrvSE.exe) executing powershell.exe
[1]
[2]
Created and executed a WMI class using PowerShell
WMI Process (WmiPrvSE.exe) executing powershell.exe
[1]
[2]
Created and executed a WMI class using PowerShell
WMI Process (WmiPrvSE.exe) executing powershell.exe
[1]