LoFP LoFP / legitimate winrm usage

Techniques

Sample rules

Suspicious Processes Spawned by WinRM

Description

Detects suspicious processes including shells spawnd from WinRM host process

Detection logic

condition: selection
selection:
  Image|endswith:
  - \cmd.exe
  - \sh.exe
  - \bash.exe
  - \powershell.exe
  - \pwsh.exe
  - \wsl.exe
  - \schtasks.exe
  - \certutil.exe
  - \whoami.exe
  - \bitsadmin.exe
  ParentImage|endswith: \wsmprovhost.exe