Common Information
Type Value
Value
Windows Management Instrumentation - T1047
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Windows Management Instrumentation (WMI) is a Windows administration feature that provides a uniform environment for local and remote access to Windows system components. It relies on the WMI service for local and remote access and the server message block (SMB) (Citation: Wikipedia SMB) and Remote Procedure Call Service (RPCS) (Citation: TechNet RPC) for remote access. RPCS operates over port 135. (Citation: MSDN WMI) An adversary can use WMI to interact with local and remote systems and use it as a means to perform many tactic functions, such as gathering information for Discovery and remote Execution of files as part of Lateral Movement. (Citation: FireEye WMI 2015) Detection: Monitor network traffic for WMI connections; the use of WMI in environments that do not typically use WMI may be suspect. Perform process monitoring to capture command-line arguments of "wmic" and detect commands that are used to perform remote behavior. (Citation: FireEye WMI 2015) Platforms: Windows Data Sources: Authentication logs, Netflow/Enclave netflow, Process command-line parameters, Process monitoring Permissions Required: User, Administrator System Requirements: WMI service, winmgmt, running. Host/network firewalls allowing SMB and WMI ports from source to destination. SMB authentication. Remote Support: Yes
Details Published Attributes CTI Title
Details Website 2019-09-05 0 Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment | Mandiant
Details Website 2019-08-19 9 IT threat evolution Q2 2019
Details Website 2019-08-19 122 Uncovering a MyKings Variant Via MDR
Details Website 2019-08-06 9 LokiBot Gains New Persistence Mechanism, Steganography
Details Website 2019-08-06 9 LokiBot Gains New Persistence Mechanism, Steganography
Details Website 2019-08-01 53 From Carnaval to Cinco de Mayo – The journey of Amavaldo | WeLiveSecurity
Details Website 2019-07-29 36 Dridex Threat Analysis: Masquerading and Code Injection Techniques
Details Website 2019-07-08 18 Dismantling a fileless campaign: Microsoft Defender ATP's Antivirus exposes Astaroth attack - Microsoft Security Blog
Details Website 2019-06-04 21 It's alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign
Details Website 2019-06-03 40 BlackSquid Infects Servers and Drives, 8 Exploits Used
Details Website 2019-05-29 56 A dive into Turla PowerShell usage | WeLiveSecurity
Details Website 2019-05-23 19 Sorpresa! JasperLoader targets Italy with a new bag of tricks
Details Website 2019-05-20 33 Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques
Details Website 2019-05-07 2 ATT&CK Series: Execution
Details Website 2019-04-30 281 Buhtrap backdoor and Buran ransomware distributed via major advertising platform | WeLiveSecurity
Details Website 2019-04-24 67 NovaLoader—A Brazilian Banking Malware | Zscaler Blog
Details Website 2019-04-09 2 Detecting Lateral Movement in RSA NetWitness: WMI
Details Website 2019-03-14 20 MSXSL.EXE AND WMIC.EXE — A Way to Proxy Code Execution
Details Website 2019-02-18 8 Distributing Malware, one "Word" at a Time TechBlog
Details Website 2019-02-13 4 New Astaroth Trojan Variant Exploits Anti-Malware Software to Steal Info
Details Website 2019-02-06 0 The Fileless, Non-Malware Menace | Trend Micro News
Details Website 2019-01-25 7 Application approval in SCCM 1810 and beyond is a game changer
Details Website 2019-01-24 127 Cisco AMP tracks new campaign that delivers Ursnif
Details Website 2019-01-03 84 LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack
Details Website 2018-12-18 63 Sofacy Creates New ‘Go’ Variant of Zebrocy Tool