Potential SCCM credential harvesting using WMI detected

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

Attackers or malware may use WMI queries to obtain domain credentials that are used by the SCCM.

Attacker's Goals

Obtain credentials used by the SCCM service.

Investigative actions

  • Examine the process that executed the WMI query and the CGO and verify that the processes are from a trusted source.
  • Inspect the system for malicious activity that is related to that process.

Variations

Potential SCCM credential harvesting using WMI detected from a remote machine

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

Attackers or malware may use WMI queries to obtain domain credentials that are used by the SCCM.

Attacker's Goals

Obtain credentials used by the SCCM service.

Investigative actions

  • Examine the process that executed the WMI query and the CGO and verify that the processes are from a trusted source.
  • Inspect the system for malicious activity that is related to that process.


Potential SCCM inventory query using WMI detected

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

Attackers or malware may use WMI queries to obtain domain credentials that are used by the SCCM.

Attacker's Goals

Obtain credentials used by the SCCM service.

Investigative actions

  • Examine the process that executed the WMI query and the CGO and verify that the processes are from a trusted source.
  • Inspect the system for malicious activity that is related to that process.