Skip to content

Latest commit

 

History

History
36 lines (21 loc) · 1008 Bytes

t1047-wmi-for-lateral-movement.md

File metadata and controls

36 lines (21 loc) · 1008 Bytes
description
Windows Management Instrumentation for code execution, lateral movement.

WMI for Lateral Movement

Execution

Spawning a new process on the target system 10.0.0.6 from another compromised system 10.0.0.2:

{% code title="attacker@victim" %}

wmic /node:10.0.0.6 /user:administrator process call create "cmd.exe /c calc"

{% endcode %}

Observations

Inspecting sysmon and windows audit logs, we can see 4648 logon events being logged on the source machine as well as processes being spawned by WmiPrvSe.exe on the target host:

Both on the host initiating the connection and on the host that is being logged on to, events 4624 and 4648 should be logged:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1047" %}