Atomic Red Team

Description

Atomic Test Results: Return value unclear for test T1047-1 WMI Reconnaissance Users Return value unclear for test T1047-2 WMI Reconnaissance Processes Return value unclear for test T1047-3 WMI Reconnaissance Software Return value unclear for test T1047-4 WMI Reconnaissance List Remote Services Return value unclear for test T1047-5 WMI Execute Local Process Return value unclear for test T1047-6 WMI Execute Remote Process

MITRE ATT&CK Techniques

ID Technique Tactic
T1047 Windows Management Instrumentation Execution

Environment Details

Field Value
Environment attack_range
Directory atomic_red_team
Test Date 2020-11-30

Datasets

The following datasets were collected during this attack simulation:

4104-Cimmethod-Windows-Powershell

  • Path: /datasets/attack_techniques/T1047/atomic_red_team/4104-cimmethod-windows-powershell.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:Microsoft-Windows-PowerShell/Operational

Invokewmiexec_windows-Powershell

  • Path: /datasets/attack_techniques/T1047/atomic_red_team/invokewmiexec_windows-powershell.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:Microsoft-Windows-PowerShell/Operational

Windows-Sysmon

  • Path: /datasets/attack_techniques/T1047/atomic_red_team/windows-sysmon.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational

The following detections in our security content repository use this attack data for testing:

Detection Name Type Source MITRE ATT&CK Analytic Story
PowerShell Invoke WmiExec Usage TTP Endpoint T1047 Scattered Lapsus$ Hunters, Suspicious WMI Use
Process Execution via WMI TTP Endpoint T1047 Suspicious WMI Use
Remote WMI Command Attempt TTP Endpoint T1047 Graceful Wipe Out Attack, Volt Typhoon, Living Off The Land, IcedID, Suspicious WMI Use, CISA AA23-347A
Windows WMI Process Call Create Hunting Endpoint T1047 Volt Typhoon, Qakbot, IcedID, Suspicious WMI Use, CISA AA23-347A, Cactus Ransomware
Remote Process Instantiation via WMI TTP Endpoint T1047 CISA AA23-347A, China-Nexus Threat Activity, Ransomware, Suspicious WMI Use, Salt Typhoon, Active Directory Lateral Movement
PowerShell Invoke CIMMethod CIMSession Anomaly Endpoint T1047 Scattered Lapsus$ Hunters, Malicious PowerShell, Active Directory Lateral Movement

Usage Instructions

Replay with Splunk Attack Data

Replay attack data with replay.py from Splunk Attack Data.

1python replay.py --dataset /datasets/attack_techniques/T1047/atomic_red_team/4104-cimmethod-windows-powershell.log --index attack_data

Manual Import

  1. Download the dataset files from the paths listed above
  2. Configure your Splunk instance with the appropriate sourcetypes
  3. Import the logs using the Splunk Add Data wizard

Find more detections and analytics for this attack technique in our security content repository.


Source: GitHub | Version: 1.0