Source host
The following processes are related to WMI activity on the source host:
-
wmic.exe: client command line utility to interact withWMI(locally or on a remote computer). The/nodeparameter can be used to specify a remote computer and theprocess call create "<COMMAND>"command to create a process to execute the specified command.PowerShell
Invoke-WmiMethodcmdlet can be used as an alternative towmicto executeWMIquery locally or on a remote computer.For example, to spawn a process on a remote computer using the
Win32_ProcessWMIclass:wmic /node:<REMOTE_HOST> /user:<USERNAME> /password:<PASSWORD> process call create "<COMMAND>" Invoke-WmiMethod -Computer <REMOTE_HOST> [-Credential <PS_CREDENTIALS>] -Class Win32_Process -Name create -Argument "<COMMAND>"
Destination host
The following processes are related to WMI activity on the destination host:
-
WmiPrvSE.exe:WMI Provider Hostprogram that is executed to runWMIcommands. If a program is executed throughWMI, it will be spawned as a child of thewmiprvse.exeprocess.Suspicious child process of
WmiPrvSE.exe(such aspowershell.exeorcmd.exe) can be an indicator of lateral movement overWMIor persistence through aWMI Event Subscription. -
scrcons.exe:WMI Standard Event Consumerprocess that spawn forActiveScriptEventConsumerexecution.
As WMI can be used legitimately in the environment, the execution of a WMI
related program may not necessarily be an indicator of malicious activity.
View on GitHub