Remote Process Instantiation Via WMI

Description

This search looks for wmic.exe being launched with parameters to spawn a process on a remote system.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection

Category

Lateral Movement

Alert Volume

This search looks for wmic.exe being launched with parameters to spawn a process on a remote system.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Execution

MITRE ATT&CK Techniques

Windows Management Instrumentation

Windows Management Instrumentation

MITRE Threat Groups

APT29
APT32
APT41
Blue Mockingbird
Chimera
Deep Panda
FIN6
FIN8
Frankenstein
Lazarus Group
Leviathan
MuddyWater
OilRig
Soft Cell
Stealth Falcon
Threat Group-3390
Wizard Spider
menuPass

Kill Chain Phases

Actions On Objectives

Data Sources

Endpoint Detection and Response

   Help

Remote Process Instantiation Via WMI Help

You must be ingesting data that records process activity from your hosts to populate the Endpoint data model in the Processes node. You must also be ingesting logs with both the process name and command line from your endpoints. The command-line arguments are mapped to the "process" field in the Endpoint data model.

   Search

Open in Search