EXPLORE
← Back to Explore
T1546.003

Windows Management Instrumentation Event Subscription

Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription. WMI can be used to install event filters, providers, consumers, and bindings that execute code when a defined event occurs. Examples of events that may be subscribed to are the wall clock time, user login, or the computer's uptime.(Citation: Mandiant M-Trends 2015) Adversaries may use the capabilities of WMI to subscribe to an ev...

Windows
17
Detections
3
Sources
10
Threat Actors

BY SOURCE

11sigma3elastic3splunk_escu

PROCEDURES (11)

Persist2 detections

Auto-extracted: 2 detections for persist

Persist2 detections

Auto-extracted: 2 detections for persist

Module Load Monitoring2 detections

Auto-extracted: 2 detections for module load monitoring

Process Creation Monitoring2 detections

Auto-extracted: 2 detections for process creation monitoring

Suspicious2 detections

Auto-extracted: 2 detections for suspicious

Privilege2 detections

Auto-extracted: 2 detections for privilege

Privilege1 detections

Auto-extracted: 1 detections for privilege

File Monitoring1 detections

Auto-extracted: 1 detections for file monitoring

Privilege1 detections

Auto-extracted: 1 detections for privilege

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Privilege1 detections

Auto-extracted: 1 detections for privilege

DETECTIONS (17)