WMI + NewScheduledTaskAction Lateral Movement
PreviousLateral Movement via SMB RelayingNextWMI + PowerShell Desired State Configuration Lateral Movement
Last updated
Last updated
On the victim system, let's run a simple loop to see when a new scheduled task gets added:
Now from the compromised victim system, let's execute code laterally:
Graphic showing both of the above commands and also the process ancestry on the target system:
As usual, services.exe spawning unusual binaries should raise a wary defender's suspicion. You may also want consider monitoring for new scheduled tasks that get created on your systems:
Sysmon config master version 64 from https://github.com/SwiftOnSecurity/sysmon-config does not log the calc.exe Process Creation event being spawned by the services.exe