WMI Event Subscriptions
Adversaries may leverage WMI event subscriptions to evade detection by triggering malicious actions only under specific conditions that are unlikely to occur in a sandboxed environment. For instance, a threat actor might configure an event subscription to monitor file system, network, or logon activity, ensuring that their second-stage payload is only downloaded and executed when a particular event suggests real user activity, thereby bypassing automated analysis
Technique Identifier
Evasion Categories
Code Snippets
Contributor
Additional Resources
External Links
The resources provided below are associated links that will give you even more detailed information and research on current evasion technique. It is important to note that, while these resources may be helpful, it is important to exercise caution when following external links. As always, be careful when clicking on links from unknown sources, as they may lead to malicious content.- Event Triggered Execution, Technique T1546 - Enterprise | MITRE ATT&CK®
- offsec/persistence/windows/wmi-event-subscription at main · 1d8/offsec · GitHub
Created
April 2, 2025
Last Revised
March 24, 2026