1
1
name : Windows WMI Process And Service List
2
2
id : ef3c5ef2-3f6d-4087-aa75-49bf746dc907
3
- version : 6
4
- date : ' 2025-05-02 '
3
+ version : 7
4
+ date : ' 2025-08-25 '
5
5
author : Teoderick Contreras, Splunk
6
6
status : production
7
7
type : Anomaly
@@ -18,14 +18,19 @@ data_source:
18
18
- Windows Event Log Security 4688
19
19
- CrowdStrike ProcessRollup2
20
20
search : ' | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
21
- as lastTime from datamodel=Endpoint.Processes where `process_wmic` Processes.process
22
- IN ("*process list*", "*service list*") by Processes.action Processes.dest Processes.original_file_name
21
+ as lastTime from datamodel=Endpoint.Processes where
22
+ `process_wmic`
23
+ Processes.process IN ("*process*", "*service*")
24
+ Processes.process = "*list*"
25
+ by Processes.action Processes.dest Processes.original_file_name
23
26
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
24
27
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
25
28
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash
26
29
Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path
27
30
Processes.user Processes.user_id Processes.vendor_product | `drop_dm_object_name(Processes)`
28
- | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `windows_wmi_process_and_service_list_filter`'
31
+ | `security_content_ctime(firstTime)`
32
+ | `security_content_ctime(lastTime)`
33
+ | `windows_wmi_process_and_service_list_filter`'
29
34
how_to_implement : The detection is based on data that originates from Endpoint Detection
30
35
and Response (EDR) agents. These agents are designed to provide security-related
31
36
telemetry from the endpoints where the agent is installed. To implement this search,
0 commit comments