Wsmprovhost.exe Rare Child Process

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-11-18
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

The PowerShell host wsmprovhost.exe is a proxy process executed remotely through PowerShell when using Windows Remote Management (WinRM). It has executed a rare child process, which may indicate remote code execution abuse by an attacker.

Attacker's Goals

Gain code execution on a remote host.

Investigative actions

  • Investigate the processes being spawned from Wsmprovhost.exe on the host for malicious indicators.
  • Correlate the initiator process (most likely PowerShell) to the source host and investigate it.