Skip to content

<<< Hide Navigation Hide TOC >>>

Wmiprvse Wbemcomn DLL Hijack (7707a579-e0d8-4886-a853-ce47e4575aaa)

Detects a threat actor creating a file named wbemcomn.dll in the C:\Windows\System32\wbem\ directory over the network and loading it for a WMI DLL Hijack scenario.

Galaxy ColorsAttack Pat...Sigma-Rule...
Rows: 3
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
Windows Management Instrumentation - T1047 (01a5a209-b94c-450b-b7f9-946497d91055) Attack Pattern Wmiprvse Wbemcomn DLL Hijack (7707a579-e0d8-4886-a853-ce47e4575aaa) Sigma-Rules 1
SMB/Windows Admin Shares - T1021.002 (4f9ca633-15c5-463c-9724-bdcd54fde541) Attack Pattern Wmiprvse Wbemcomn DLL Hijack (7707a579-e0d8-4886-a853-ce47e4575aaa) Sigma-Rules 1
Remote Services - T1021 (54a649ff-439a-41a4-9856-8d144a2551ba) Attack Pattern SMB/Windows Admin Shares - T1021.002 (4f9ca633-15c5-463c-9724-bdcd54fde541) Attack Pattern 2