Detection:
Wmic getting scripts from remote system
Alternate data streams
Execute a .EXE file stored as an Alternate Data Stream (ADS)
wmic.exe process call create "c:\ads\file.txt:program.exe"
Usecase:Execute binary file hidden in Alternate data streams to evade defensive counter measures
Privileges required:User
OS:Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Mitre:T1096
Execute
Execute calc from wmic
wmic.exe process call create calc
Usecase:Execute binary from wmic to evade defensive counter measures
Privileges required:User
OS:Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Mitre:T1218
Add cmd.exe as a debugger for the osk.exe process. Each time osk.exe is run, cmd.exe will be run as well.
Usecase:Execute binary by manipulate the debugger for a program to evade defensive counter measures
Privileges required:User
OS:Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Mitre:T1218
Execute evil.exe on the remote system.
wmic.exe /node:"192.168.0.1" process call create "evil.exe"
Usecase:Execute binary on a remote system
Privileges required:User
OS:Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Mitre:T1218
Create a scheduled execution of C:\GoogleUpdate.exe to run at 9pm.
wmic.exe /node:REMOTECOMPUTERNAME PROCESS call create "at 9:00PM c:\GoogleUpdate.exe ^> c:\notGoogleUpdateResults.txt"
Usecase:Execute binary with scheduled task created with wmic on a remote computer
Privileges required:User
OS:Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Mitre:T1218
Create a volume shadow copy of NTDS.dit that can be copied.