Detection Library
highproductionWindowsNetworkT1047

Lateral Movement via WMI Remote Execution

Detects remote WMI execution commonly used for lateral movement, persistence, and command execution across network hosts.

Updated Sep 10, 2024 · Detection Engineering Team

wmilateral-movementwindowsremote-execution

Problem Statement

WMI provides a legitimate Windows management interface that attackers abuse for remote code execution. It produces minimal network noise and often bypasses traditional security tools.

Sample Logs

{"EventID":4688,"Computer":"CORP-SERVER02","SubjectUserName":"CORP\svc-backup","ParentProcessName":"C:\Windows\System32\wbem\WmiPrvSE.exe","NewProcessName":"C:\Windows\System32\cmd.exe","CommandLine":"cmd.exe /c net user hacker P@ssw0rd123 /add"}

Required Fields

ParentProcessName
NewProcessName
CommandLine
Computer
SubjectUserName

False Positives

  • ·Legitimate WMI-based management tools
  • ·Monitoring agents using WMI
  • ·Software inventory solutions

Tuning Guidance

Whitelist known WMI management tools and their expected child processes. Focus on interactive user context vs service accounts.