EXPLORE
← Back to Explore
sigmamediumHunting

New BgInfo.EXE Custom WMI Query Registry Configuration

Detects setting of a new registry value related to BgInfo configuration, which can be abused to execute custom WMI query via "BgInfo.exe"

MITRE ATT&CK

persistencedefense-evasion

Detection Query

selection:
  TargetObject|contains: \Software\Winternals\BGInfo\UserFields\
  Details|startswith: "6"
condition: selection

Author

Nasreddine Bencherchali (Nextron Systems)

Created

2023-08-16

Data Sources

windowsRegistry Set Events

Platforms

windows

Tags

attack.persistenceattack.defense-evasionattack.t1112
Raw Content
title: New BgInfo.EXE Custom WMI Query Registry Configuration
id: cd277474-5c52-4423-a52b-ac2d7969902f
related:
    - id: 992dd79f-dde8-4bb0-9085-6350ba97cfb3
      type: similar
status: test
description: Detects setting of a new registry value related to BgInfo configuration, which can be abused to execute custom WMI query via "BgInfo.exe"
references:
    - Internal Research
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-08-16
tags:
    - attack.persistence
    - attack.defense-evasion
    - attack.t1112
logsource:
    category: registry_set
    product: windows
detection:
    selection:
        TargetObject|contains: '\Software\Winternals\BGInfo\UserFields\'
        Details|startswith: '6' # WMI
    condition: selection
falsepositives:
    - Legitimate WMI query
level: medium