<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HPWBEM — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/hpwbem/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/hpwbem/feed.xml" rel="self" type="application/rss+xml"/><item><title>WMI Incoming Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-wmi-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-wmi-lateral-movement/</guid><description>Detection of processes executed via Windows Management Instrumentation (WMI) on a remote host indicating potential adversary lateral movement.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of lateral movement within a Windows environment via Windows Management Instrumentation (WMI). WMI, a core Windows feature, is often exploited by adversaries to remotely execute processes, bypassing traditional security measures. This activity is detected by monitoring network connections and process executions, while filtering out common false positives associated with legitimate administrative use, security tools, and system processes. The goal is to highlight potential threats indicative of unauthorized lateral movement.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker uses WMI to initiate a connection to a remote host on port 135.</li>
<li>The svchost.exe process on the target host accepts an incoming RPC connection from the attacker-controlled system.</li>
<li>WmiPrvSE.exe, the WMI provider host process, spawns a new process based on the attacker&rsquo;s WMI command.</li>
<li>The spawned process executes the attacker&rsquo;s payload or command on the remote host.</li>
<li>The attacker leverages the executed process for further actions, such as data exfiltration or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and lateral movement via WMI can lead to unauthorized access to sensitive data, compromise of critical systems, and propagation of malware throughout the network. While specific victim counts or sector targeting data are unavailable, the broad applicability of WMI across Windows environments makes this a relevant threat for a wide range of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging to provide necessary data for the rules below.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious WMI activity and tune them for your environment.</li>
<li>Review and create exceptions for known administrative accounts or specific IP addresses used by IT staff to reduce false positives, as mentioned in the overview.</li>
<li>Isolate any affected host from the network to prevent further lateral movement if suspicious WMI activity is detected.</li>
<li>Monitor network connections with destination port 135 for unusual activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>wmi</category><category>windows</category></item></channel></rss>