Skip to content

Latest commit

 

History

History
38 lines (23 loc) · 1.03 KB

t1047-wmi-for-lateral-movement.md

File metadata and controls

38 lines (23 loc) · 1.03 KB
description
Windows Management Instrumentation for code execution, lateral movement.

T1047: WMI for Lateral Movement

Execution

Spawning a new process on the target system 10.0.0.6 from another compromised system 10.0.0.2:

{% code-tabs %} {% code-tabs-item title="attacker@victim" %}

wmic /node:10.0.0.6 /user:administrator process call create "cmd.exe /c calc"

{% endcode-tabs-item %} {% endcode-tabs %}

Observations

Inspecting sysmon and windows audit logs, we can see 4648 logon events being logged on the source machine as well as processes being spawned by WmiPrvSe.exe on the target host:

Both on the host initiating the connection and on the host that is being logged on to, events 4624 and 4648 should be logged:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1047" %}