Common Information
Type | Value |
---|---|
Value |
Windows Management Instrumentation - T1047 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Windows Management Instrumentation (WMI) is a Windows administration feature that provides a uniform environment for local and remote access to Windows system components. It relies on the WMI service for local and remote access and the server message block (SMB) (Citation: Wikipedia SMB) and Remote Procedure Call Service (RPCS) (Citation: TechNet RPC) for remote access. RPCS operates over port 135. (Citation: MSDN WMI) An adversary can use WMI to interact with local and remote systems and use it as a means to perform many tactic functions, such as gathering information for Discovery and remote Execution of files as part of Lateral Movement. (Citation: FireEye WMI 2015) Detection: Monitor network traffic for WMI connections; the use of WMI in environments that do not typically use WMI may be suspect. Perform process monitoring to capture command-line arguments of "wmic" and detect commands that are used to perform remote behavior. (Citation: FireEye WMI 2015) Platforms: Windows Data Sources: Authentication logs, Netflow/Enclave netflow, Process command-line parameters, Process monitoring Permissions Required: User, Administrator System Requirements: WMI service, winmgmt, running. Host/network firewalls allowing SMB and WMI ports from source to destination. SMB authentication. Remote Support: Yes |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2020-04-03 | 44 | Zoomed In: A Look into a Coinminer Bundled with Zoom Installer | ||
Details | Website | 2020-04-03 | 44 | Zoomed In: A Look into a Coinminer Bundled with Zoom Installer | ||
Details | Website | 2020-04-02 | 189 | Nemty Ransomware - Learning by Doing | McAfee Blog | ||
Details | Website | 2020-03-23 | 18 | Latest Astaroth attacks are even more invisible but not less observable | ||
Details | Website | 2020-03-05 | 125 | Guildma: The Devil drives electric | WeLiveSecurity | ||
Details | Website | 2020-02-07 | 37 | Emotet Technical Analysis - Part 2 PowerShell Unveiled | ||
Details | Website | 2020-02-05 | 44 | Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting - SentinelLabs | ||
Details | Website | 2020-01-31 | 12 | DLL Side-loading & Hijacking | DLL Abuse Techniques Overview | ||
Details | Website | 2020-01-29 | 54 | Emotet Technical Analysis - Part 1 Reveal the Evil Code | ||
Details | Website | 2020-01-01 | 47 | Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders | Huntress | ||
Details | Website | 2019-12-29 | 50 | BRONZE PRESIDENT Targets NGOs | ||
Details | Website | 2019-12-20 | 18 | A Shortcut to Compromise: Cobalt Gang phishing campaign | ||
Details | Website | 2019-12-17 | 41 | Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia | ||
Details | Website | 2019-12-12 | 13 | Monero Miner Obfuscated via Process Hollowing | ||
Details | Website | 2019-12-05 | 80 | xHunt Campaign: xHunt Actor’s Cheat Sheet | ||
Details | Website | 2019-11-05 | 6 | Buran Ransomware; the Evolution of VegaLocker | McAfee Blog | ||
Details | Website | 2019-10-17 | 37 | Operation Ghost: The Dukes aren’t back – they never left | WeLiveSecurity | ||
Details | Website | 2019-10-07 | 134 | China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations | ||
Details | Website | 2019-10-01 | 82 | Head Fake: Tackling Disruptive Ransomware Attacks | Mandiant | ||
Details | Website | 2019-09-26 | 95 | Divergent: "Fileless" NodeJS Malware Burrows Deep Within the Host | ||
Details | Website | 2019-09-20 | 0 | Magecart Attacks and Is Your Smart TV Spying on You? | ||
Details | Website | 2019-09-19 | 15 | GhostMiner Weaponizes WMI, Kills Other Mining Payloads | ||
Details | Website | 2019-09-18 | 0 | Secrets of latest Smominru botnet variant revealed in new attack | ||
Details | Website | 2019-09-17 | 1 | Fileless Malware 101: Understanding Non-Malware Attacks | ||
Details | Website | 2019-09-09 | 1 | Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study | McAfee Blog |