Identify Processes Launched by PowerShell Remoting (WSMProvHost.exe)
Description of the Query:
KQL Query:
// Detect Processes Launched by PowerShell Remoting (WSMProvHost.exe)
DeviceProcessEvents
| where Timestamp > ago(1d) // Limit results to the last 24 hours
| where ActionType == "ProcessCreate" // Focus on process creation events
| where InitiatingProcessFileName contains "WSMProvHost.exe" // Filter for processes initiated by WSMProvHost.exe
| extend UserName = tostring(split(InitiatingProcessAccountName, @"\")[1]) // Extract username for context
| project
Timestamp,
DeviceName,
UserName,
InitiatingProcessFileName,
ProcessCommandLine,
InitiatingProcessCommandLine,
InitiatingProcessAccountName,
ActionType
| sort by Timestamp descExplanation of the Query:
Use Case:
Notes:
PreviousIdentify Instances of PowerShell Invoke-WebRequest, IWR or Net.WebClientNextDetect DeviceNetworkEvents for LOLBAS with Download or Upload Functions
Last updated