• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

New WMI Enumeration Query

Risk Factors

A successful WMI query requires local or domain administrator privileges, making this enumeration technique less common when compared to other techniques. Enumeration activity typically does not negatively affect network performance, but attackers can leverage this information to advance an attack campaign.

The system might change the risk score for this detection.

Kill Chain

Reconnaissance

Risk Score

38

Detection diagram
Next in Reconnaissance: New Windows Registry Enumeration Attempt

Attack Background

Windows Management Instrumentation (WMI) is installed by default on Windows operating systems and enables administrators to remotely access services and collect management data from devices. An administrator can submit a query through WMI to retrieve WMI object data from remote devices. A WMI query shares a similar structure to SQL queries (where data is stored in tables with a row-column structure). An attacker with administrator privileges can submit a query to collect detailed system information about a target. For example, the WMI query SELECT * FROM AntiVirusProduct can identify antivirus software running on the target.

Mitigation Options

Block access to WMI or restrict access to authorized IP addresses in Windows firewall settings

Limit the number of administrator accounts that have WMI privileges

Separate credentials for administrators by the type of remote activity

Restrict access to specific WMI namespaces to only relative administrative user accounts

MITRE ATT&CK ID

What else can RevealX do for you?