EXPLORE
← Back to Explore
T1047

Windows Management Instrumentation

Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is designed for programmers and is the infrastructure for management data and operations on Windows systems.(Citation: WMI 1-3) WMI is an administration feature that provides a uniform environment to access Windows system components. The WMI service enables both local and remote access, though the latter is facilitated by [Remote Services](https://attack.mitre.org/techniques/T1021) suc...

Windows
85
Detections
4
Sources
39
Threat Actors

BY SOURCE

45sigma20splunk_escu19elastic1kql

PROCEDURES (46)

Wmi14 detections

Auto-extracted: 14 detections for wmi

Service4 detections

Auto-extracted: 4 detections for service

Child Process4 detections

Auto-extracted: 4 detections for child process

Suspicious3 detections

Auto-extracted: 3 detections for suspicious

Powershell3 detections

Auto-extracted: 3 detections for powershell

Bypass3 detections

Auto-extracted: 3 detections for bypass

Exfiltrat3 detections

Auto-extracted: 3 detections for exfiltrat

Suspicious3 detections

Auto-extracted: 3 detections for suspicious

Process Creation Monitoring2 detections

Auto-extracted: 2 detections for process creation monitoring

Script Execution Monitoring2 detections

Auto-extracted: 2 detections for script execution monitoring

Parent Process2 detections

Auto-extracted: 2 detections for parent process

Script Block2 detections

Auto-extracted: 2 detections for script block

Registry2 detections

Auto-extracted: 2 detections for registry

Lateral2 detections

Auto-extracted: 2 detections for lateral

Privilege2 detections

Auto-extracted: 2 detections for privilege

Office2 detections

Auto-extracted: 2 detections for office

Dll Hijack2 detections

Auto-extracted: 2 detections for dll hijack

Shadow Cop2 detections

Auto-extracted: 2 detections for shadow cop

Script Block1 detections

Auto-extracted: 1 detections for script block

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Wmi1 detections

Auto-extracted: 1 detections for wmi

Evasion1 detections

Auto-extracted: 1 detections for evasion

Lateral1 detections

Auto-extracted: 1 detections for lateral

Service1 detections

Auto-extracted: 1 detections for service

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Wmi1 detections

Auto-extracted: 1 detections for wmi

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Service1 detections

Auto-extracted: 1 detections for service

General Monitoring1 detections

Auto-extracted: 1 detections for general monitoring

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Office1 detections

Auto-extracted: 1 detections for office

Bypass1 detections

Auto-extracted: 1 detections for bypass

Wmi1 detections

Auto-extracted: 1 detections for wmi

Dll Hijack1 detections

Auto-extracted: 1 detections for dll hijack

Service1 detections

Auto-extracted: 1 detections for service

Lateral1 detections

Auto-extracted: 1 detections for lateral

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Remote1 detections

Auto-extracted: 1 detections for remote

Persist1 detections

Auto-extracted: 1 detections for persist

Registry1 detections

Auto-extracted: 1 detections for registry

Powershell1 detections

Auto-extracted: 1 detections for powershell

Persist1 detections

Auto-extracted: 1 detections for persist

Evasion1 detections

Auto-extracted: 1 detections for evasion

Wmi1 detections

Auto-extracted: 1 detections for wmi

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Wmi1 detections

Auto-extracted: 1 detections for wmi

DETECTIONS (85)

Application Removed Via Wmic.EXE
sigmamedium
Application Terminated Via Wmic.EXE
sigmamedium
Computer System Reconnaissance Via Wmic.EXE
sigmamedium
Delayed Execution via Ping
elasticlow
Detect Office products launching wmic.exe
kql
Enumeration Command Spawned via WMIPrvSE
elasticlow
HackTool - CrackMapExec Execution
sigmahigh
HackTool - CrackMapExec Execution Patterns
sigmahigh
HackTool - Potential Impacket Lateral Movement Activity
sigmahigh
Hardware Model Reconnaissance Via Wmic.EXE
sigmamedium
HTML Help HH.EXE Suspicious Child Process
sigmahigh
Impacket Lateral Movement Commandline Parameters
splunk_escu
Impacket Lateral Movement smbexec CommandLine Parameters
splunk_escu
Impacket Lateral Movement WMIExec Commandline Parameters
splunk_escu
Microsoft Build Engine Started by a System Process
elasticmedium
MITRE BZAR Indicators for Execution
sigmamedium
Mofcomp Activity
elasticlow
New Process Created Via Wmic.EXE
sigmamedium
Password Set to Never Expire via WMI
sigmamedium
Persistence via WMI Event Subscription
elasticlow
Persistence via WMI Standard Registry Provider
elastichigh
Possible Lateral Movement PowerShell Spawn
splunk_escu
Potential Product Class Reconnaissance Via Wmic.EXE
sigmamedium
Potential Product Reconnaissance Via Wmic.EXE
sigmamedium
Potential Remote SquiblyTwo Technique Execution
sigmahigh
Potential Unquoted Service Path Reconnaissance Via Wmic.EXE
sigmamedium
Potential Windows Defender Tampering Via Wmic.EXE
sigmahigh
Potential WMI Lateral Movement WmiPrvSE Spawned PowerShell
sigmamedium
PowerShell Invoke CIMMethod CIMSession
splunk_escu
PowerShell Invoke WmiExec Usage
splunk_escu
Process Execution via WMI
splunk_escu
Process Reconnaissance Via Wmic.EXE
sigmamedium
PSExec and WMI Process Creations Block
sigmahigh
RDP Enable or Disable via Win32_TerminalServiceSetting WMI Class
sigmamedium
Registry Manipulation via WMI Stdregprov
sigmamedium
Remote DCOM/WMI Lateral Movement
sigmahigh
Remote Process Instantiation via WMI
splunk_escu
Remote Process Instantiation via WMI and PowerShell
splunk_escu
Remote Process Instantiation via WMI and PowerShell Script Block
splunk_escu
Remote WMI Command Attempt
splunk_escu
Script Event Consumer Spawning Process
sigmahigh
Script Execution via WMI
splunk_escu
Service Control Spawned via Script Interpreter
elasticlow
Service Reconnaissance Via Wmic.EXE
sigmamedium
Service Started/Stopped Via Wmic.EXE
sigmamedium
Successful Account Login Via WMI
sigmalow
Suspicious .NET Code Compilation
elasticmedium
Suspicious Autorun Registry Modified via WMI
sigmahigh
Suspicious Cmd Execution via WMI
elastichigh
Suspicious Encoded Scripts in a WMI Consumer
sigmahigh
Suspicious Execution from a Mounted Device
elasticmedium
Suspicious HH.EXE Execution
sigmahigh
Suspicious Managed Code Hosting Process
elastichigh
Suspicious Microsoft Office Child Process
sigmahigh
Suspicious Process Created Via Wmic.EXE
sigmahigh
Suspicious ScreenConnect Client Child Process
elasticmedium
Suspicious WMI Image Load from MS Office
elasticlow
Suspicious WMIC Execution Via Office Process
sigmahigh
Suspicious WMIC XSL Script Execution
elasticmedium
Suspicious WmiPrvSE Child Process
sigmahigh
System Disk And Volume Reconnaissance Via Wmic.EXE
sigmamedium
T1047 Wmiprvse Wbemcomn DLL Hijack
sigmahigh
Volume Shadow Copy Deletion via PowerShell
elastichigh
Volume Shadow Copy Deletion via WMIC
elastichigh
Web Shell Detection: Script Process Child of Common Web Processes
elastichigh
Windows Hotfix Updates Reconnaissance Via Wmic.EXE
sigmamedium
Windows Script Interpreter Executing Process via WMI
elasticmedium
Windows WinRAR Launched Outside Default Installation Directory
splunk_escu
Windows WMI Impersonate Token
splunk_escu
Windows WMI Process And Service List
splunk_escu
Windows WMI Process Call Create
splunk_escu
Windows WMI Reconnaissance Class Query
splunk_escu
WMI Event Consumer Created Named Pipe
sigmamedium
WMI Incoming Lateral Movement
elasticmedium
WMI Permanent Event Subscription
splunk_escu
WMI Temporary Event Subscription
splunk_escu
WMIC Remote Command Execution
sigmamedium
WMIC Unquoted Services Path Lookup - PowerShell
sigmamedium
Wmiexec Default Output File
sigmacritical
WMImplant Hack Tool
sigmahigh
Wmiprvse LOLBAS Execution Process Spawn
splunk_escu
WmiPrvSE Spawned A Process
sigmamedium
Wmiprvse Wbemcomn DLL Hijack
sigmahigh
Wmiprvse Wbemcomn DLL Hijack - File
sigmacritical
XSL Script Execution Via WMIC.EXE
sigmamedium