Home  >  APT29  >  Results  >  Elastic  >  Windows Remote Management

Technique Results: Windows Remote Management (T1028) Technique Page Information

The ATT&CK technique page displays all procedures used to test the technique, and their respective detections. The Procedure column contains a description of how the technique was tested . The Step column is where the procedure occurred in the operational flow. Click the Step Number to view it in the Operational Flow panel. Detections are classified by one or more Detection Types, summarized by the Detection Notes, and may be supported by screenshots.

MITRE does not assign scores, rankings, or ratings. The evaluation results are available to the public, so other organizations may provide their own analysis and interpretation - these are not endorsed or validated by MITRE.

Vendor Configuration     All Results JSON Legend
Legend
Main Detection Categories: Detection Modifiers:

None

Telemetry

Indicator of
Compromise

General
Behavior

MSSP

General

Tactic

Specific
Behavior

Technique

Enrichment

Tainted

Alert

Correlated

Delayed

Host
Interrogation

Residual
Artifact

Configuration
Change

Innovative
Procedures Criteria Step
Detection Type Detection Notes
Established WinRM connection to remote host Scranton (10.0.1.4)
Network connection to Scranton (10.0.1.4) over port 5985
8.A.2
Technique (Correlated, Alert)
A Technique alert detection (orange indicator; medium severity) for "WMI Lateral Movement via PowerShell over WinRM" was generated for the user Pam invoking a WMI PowerShell cmdlet. The event was correlated to a parent General detection for malicious file execution. [1]
Telemetry (Correlated)
Telemetry showed network connection to remote host Scranton (10.0.1.4) over port TCP 5985. The event was correlated to a parent General detection for malicious file execution. [1]
Established a WinRM connection to the domain controller host NewYork (10.0.0.4)
Network connection to NewYork (10.0.0.4) over port 5985
16.C.1
Technique (Alert, Correlated)
A Technique alert detection (medium severity) for "WMI Lateral Movement via PowerShell over WinRM" was generated for WMI invoked on another host via a PowerShell WMI cmdlet. The detection was correlated to a parent alert for a suspicious Windows script. [1]
General (Alert)
A General alert detection (medium severity) for "First Seen Process in an Environment" was generated for the execution of the WinRM process (wsmprovhost.exe). [1]
Telemetry (Correlated)
Telemetry showed powershell.exe making a network connection to remote host NewYork (10.0.0.4) over port 5985. The detection was correlated to a parent alert for a suspicious Windows script. [1]
Established a WinRM connection to the remote host Scranton (10.0.1.4) using the Golden Ticket as credentials
Network connection to Scranton (10.0.1.4) over port 5985
20.B.2
Technique (Alert)
A Technique alert detection (medium severity) for "WMI Lateral Movement via PowerShell over WinRM" was generated for PowerShell executing on a remote host over WinRM. [1]
Telemetry
Telemetry showed PowerShell with an open network connection to the remote host Scranton (10.0.1.4) over port 5985. [1]