Windows Management Instrumentation Event Subscription (T1546.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Privilege Escalation
  • Persistence

Privilege Escalation (TA0004)

The adversary is trying to gain higher-level permissions. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include: * SYSTEM/root level * local administrator * user account with admin-like access * user accounts with access to specific system or perform specific function These techniques often overlap with Persistence techniques, as OS features that let an adversary persist can execute in an elevated context.

View on ATT&CK

Procedure Examples

Description Source(s)
Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensics. Retrieved March 30, 2016. FireEye WMI 2015
Dell SecureWorks Counter Threat Unit™ (CTU) Research Team. (2016, March 28). A Novel WMI Persistence Implementation. Retrieved March 30, 2016. Dell WMI Persistence
Devon Kerr. (2015). There's Something About WMI. Retrieved May 4, 2020. FireEye WMI SANS 2015
French, D. (2018, October 9). Detecting & Removing an Attacker’s WMI Persistence. Retrieved October 11, 2019. Medium Detecting WMI Persistence
French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020. Elastic - Hunting for Persistence Part 1
Mandiant. (2015, February 24). M-Trends 2015: A View from the Front Lines. Retrieved May 18, 2016. Mandiant M-Trends 2015
Microsoft. (n.d.). Retrieved January 24, 2020. Microsoft Register-WmiEvent
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. TechNet Autoruns
Satran, M. (2018, May 30). Managed Object Format (MOF). Retrieved January 24, 2020. Microsoft MOF May 2018