T1546.003
Windows Management Instrumentation Event Subscription
Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription. WMI can be used to install event filters, providers, consumers, and bindings that execute code when a defined event occurs. Attackers use WMI subscriptions to achieve fileless persistence that survives reboots, runs as SYSTEM, and is not visible in the run keys or scheduled tasks that analysts typically check. Three components are required: an EventFilter (what triggers), an EventConsumer (what runs), and a FilterToConsumerBinding (links them together).
Microsoft Sentinel / Defender
kusto
let WmiConsumerCreation = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
"ActiveScriptEventConsumer", "CommandLineEventConsumer",
"__EventFilter", "__EventConsumer", "__FilterToConsumerBinding",
"ROOT\\subscription", "root/subscription"
)
| extend WmiComponent = case(
ProcessCommandLine has "__EventFilter", "EventFilter",
ProcessCommandLine has "__EventConsumer" or ProcessCommandLine has "CommandLineEventConsumer" or ProcessCommandLine has "ActiveScriptEventConsumer", "EventConsumer",
ProcessCommandLine has "__FilterToConsumerBinding", "Binding",
"Unknown"
)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, WmiComponent,
InitiatingProcessFileName, InitiatingProcessCommandLine;
let WmiPersistenceIndicators = DeviceFileEvents
| where Timestamp > ago(24h)
| where FolderPath has_any ("wbem", "repository")
| where FileName has_any ("OBJECTS.DATA", "index.btr", "mapping");
union WmiConsumerCreation, (WmiPersistenceIndicators | extend WmiComponent="RepositoryChange")
| sort by Timestamp desc high severity
high confidence
Data Sources
Process: Process Creation Command: Command Execution WMI: WMI Creation File: File Modification Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents DeviceFileEvents
False Positives
- Endpoint security products (Microsoft Defender for Endpoint, CrowdStrike, Carbon Black) that use WMI subscriptions for their own monitoring and persistence
- SCCM/ConfigMgr client that uses WMI subscriptions for hardware inventory and software distribution tracking
- Enterprise monitoring solutions (SolarWinds, SCOM, Nagios agents) that leverage WMI event subscriptions for system monitoring
- Legitimate software that uses WMI subscriptions for update triggers or license management (some AV products, backup agents)
Last updated: 2026-04-21 Research depth: deep
References (6)
- https://attack.mitre.org/techniques/T1546/003/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1546.003/T1546.003.md
- https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html
- https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-wp.pdf
- https://github.com/davidpany/WMI_Forensics
- https://github.com/mandiant/flare-wmi
Unlock Pro Content
Get the full detection package for T1546.003 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance
Related Detections
Parent Technique
T1546Event Triggered ExecutionRelated Sub-techniques
T1546.001Change Default File AssociationT1546.002ScreensaverT1546.004Unix Shell Configuration ModificationT1546.005TrapT1546.006LC_LOAD_DYLIB AdditionT1546.007Netsh Helper DLLT1546.008Accessibility FeaturesT1546.009AppCert DLLsT1546.010AppInit DLLsT1546.011Application ShimmingT1546.012Image File Execution Options InjectionT1546.013PowerShell ProfileT1546.014EmondT1546.015Component Object Model HijackingT1546.016Installer PackagesT1546.017Udev RulesT1546.018Python Startup Hooks