โ† Back to hub

WMIC Abuse for APT Reconnaissance and Remote Execution

Detects anomalous wmic.exe usage with high-risk arguments typical of nation-state APT actors: remote process execution via /node:, Shadow Copy deletion, and system/network enumeration. Based on TTPs documented by Intel 471 for APT groups abusing WMI for stealthy operations that evade traditional security controls.

๐Ÿ”’

Premium Content

This query requires an active subscription to access the code.

Get Access