From 53ce3771236588ddd1bd5d4e5b5e11e8120dec9e Mon Sep 17 00:00:00 2001 From: Clifford Date: Thu, 1 May 2025 16:45:59 +0200 Subject: [PATCH] Update Wmic.yml Adding Antivirus recon LOLBAS --- yml/OSBinaries/Wmic.yml | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/yml/OSBinaries/Wmic.yml b/yml/OSBinaries/Wmic.yml index 2438396a..359232e9 100644 --- a/yml/OSBinaries/Wmic.yml +++ b/yml/OSBinaries/Wmic.yml @@ -59,6 +59,16 @@ Commands: Privileges: User MitreID: T1105 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 + - Command: WMIC.exe /Namespace:\\\\root\\SecurityCenter2 Path AntiVirusProduct Get displayName,productState + Description: Executes WMIC to gather the existing Antivirus or EDR solution installed on the machine. + Usecase: Recon + Category: Execute + Privileges: User + MitreID: T1518.001 + OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 + Tags: + - Execute: Discovery + - Execute: Antivirus Enumeration Full_Path: - Path: C:\Windows\System32\wbem\wmic.exe - Path: C:\Windows\SysWOW64\wbem\wmic.exe @@ -83,6 +93,7 @@ Resources: - Link: https://stackoverflow.com/questions/24658745/wmic-how-to-use-process-call-create-with-a-specific-working-directory - Link: https://subt0x11.blogspot.no/2018/04/wmicexe-whitelisting-bypass-hacking.html - Link: https://twitter.com/subTee/status/986234811944648707 + - Link: https://research.kudelskisecurity.com/2025/04/30/unmasking-blackbasta-inside-the-ransomware-syndicates-leaked-operations/ Acknowledgement: - Person: Casey Smith Handle: '@subtee'