WMI Event Subscriptions
Created the Wednesday 02 April 2025. Updated 1 day, 13 hours ago.
Adversaries may leverage WMI event subscriptions to evade detection by triggering malicious actions only under specific conditions that are unlikely to occur in a sandboxed environment. For instance, a threat actor might configure an event subscription to monitor file system, network, or logon activity, ensuring that their second-stage payload is only downloaded and executed when a particular event suggests real user activity, thereby bypassing automated analysis
Technique Identifier
Code Snippets
Contributor
Additional Resources
External Links
The resources provided below are associated links that will give you even more detailed information and research on current evasion technique. It is important to note that, while these resources may be helpful, it is important to exercise caution when following external links. As always, be careful when clicking on links from unknown sources, as they may lead to malicious content.
- Event Triggered Execution, Technique T1546 - Enterprise | MITRE ATT&CK®
- offsec/persistence/windows/wmi-event-subscription at main · 1d8/offsec · GitHub