Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit b4f6764

Browse files
authored
Update detect-office-products-spawning-wmic.md
1 parent 0574c42 commit b4f6764

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

Execution/detect-office-products-spawning-wmic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ The following query detects when Microsoft Office software spawns an instance of
1010

1111
```Kusto
1212
​​// Office products spawning WMI
13-
ProcessCreationEvents
13+
DeviceProcessEvents
1414
| where InitiatingProcessFileName in~ ("winword.exe", "excel.exe", "outlook.exe")
1515
and FileName =~"wmic.exe"
1616
```
@@ -39,4 +39,4 @@ This query can be used to detect the following attack techniques and tactics ([s
3939

4040
## Contributor info
4141

42-
**Contributor:** Microsoft Threat Protection team
42+
**Contributor:** Microsoft Threat Protection team

0 commit comments

Comments
 (0)