Common Information
Type Value
Value
Windows Management Instrumentation - T1047
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Windows Management Instrumentation (WMI) is a Windows administration feature that provides a uniform environment for local and remote access to Windows system components. It relies on the WMI service for local and remote access and the server message block (SMB) (Citation: Wikipedia SMB) and Remote Procedure Call Service (RPCS) (Citation: TechNet RPC) for remote access. RPCS operates over port 135. (Citation: MSDN WMI) An adversary can use WMI to interact with local and remote systems and use it as a means to perform many tactic functions, such as gathering information for Discovery and remote Execution of files as part of Lateral Movement. (Citation: FireEye WMI 2015) Detection: Monitor network traffic for WMI connections; the use of WMI in environments that do not typically use WMI may be suspect. Perform process monitoring to capture command-line arguments of "wmic" and detect commands that are used to perform remote behavior. (Citation: FireEye WMI 2015) Platforms: Windows Data Sources: Authentication logs, Netflow/Enclave netflow, Process command-line parameters, Process monitoring Permissions Required: User, Administrator System Requirements: WMI service, winmgmt, running. Host/network firewalls allowing SMB and WMI ports from source to destination. SMB authentication. Remote Support: Yes
Details Published Attributes CTI Title
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 0 新しいランサムウェア「ShrinkLocker」の復号化ツールがBitLockerのパスワードを復元 - PRSOL:CC
Details Website 2024-11-13 0 New ShrinkLocker ransomware decryptor recovers BitLocker password
Details Website 2024-11-11 0 The Threat of Lateral Movement: Are you Covered? | Red Piranha
Details Website 2024-11-10 1 Understanding Common Windows Commands and How Threat Actors Use Them:
Details Website 2024-11-08 0 Interlock Ransomware: The New Weapon of Mass Digital Destruction
Details Website 2024-11-08 7 Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources
Details Website 2024-11-07 0 Using Human Risk Management to Detect and Thwart Cyberattacks - Cybersecurity Insiders
Details Website 2024-11-07 105 Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies
Details Website 2024-11-07 19 CrowdStrike’s work with the Democratic National Committee: Setting the record straight
Details Website 2024-11-04 102 Cloudy With a Chance of RATs: Unveiling APT36 and the Evolution of ElizaRAT
Details Website 2024-11-04 102 Cloudy With a Chance of RATs: Unveiling APT36 and the Evolution of ElizaRAT - Check Point Research
Details Website 2024-11-04 2 When Good Tools Do Bad Things: The Rising Threat of ‘Living Off the Land’ Cybersecurity Attacks
Details Website 2024-11-03 35 Threat Actor — Cl0P
Details Website 2024-11-03 4 Petya ransomware outbreak: Here’s what you need to know | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-03 0 How Cyber Criminals Are Evading Antivirus Software
Details Website 2024-11-01 62 Weekly Intelligence Report - 01 Nov 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-31 17 Building a Robust Windows Service for Malware and Ransomware Protection
Details Website 2024-10-30 7 5 Critical Threat Actors You Need to Know About - ReliaQuest
Details Website 2024-10-24 0 The Rise of Chinese APT Campaigns: Volt Typhoon, Salt Typhoon, Flax Typhoon, and Velvet Ant
Details Website 2024-10-23 44 Highlighting TA866/Asylum Ambuscade Activity Since 2021
Details Website 2024-10-21 52 Akira ransomware continues to evolve
Details Website 2024-10-21 3 Beast Ransomware Attacking Windows, Linux, And ESXi Systems | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-21 52 Akira ransomware continues to evolve
Details Website 2024-10-18 2 Analyzing a Multi-Stage Malware Attack Targeting Digital Marketing Professionals