Malware doesn’t need fancy tools to be dangerous. Sometimes, all it takes is WMIC, a quiet, native utility that’s still doing damage.
In the past weeks, we’ve seen a consistent pattern in some ANY.RUN sandbox sessions: malware keeps reaching for WMIC to do its dirty work.
Let’s take a closer look at five WMIC command categories that cybercriminals still rely on today, and why they matter for defenders.
If you’re monitoring threats, investigating suspicious behavior, or just want to understand how malware operates from the inside out, this is where you start.
WMIC (Windows Management Instrumentation Command-line) is a built-in Windows tool that lets users and attackers interact with system components. It can query hardware info, modify settings, uninstall programs, and more.
It was originally designed for administrators, but attackers love it because:
Let’s break down the WMIC commands most commonly seen in malware samples.
Before malware makes its next move, it usually takes a moment to understand where it’s landed. Is it running on a real machine or a virtual one? What’s the operating system? What hardware is present?
This stage is called system profiling, and attackers use it to:
One of the easiest ways to gather this information is using the WMIC command-line tool built into Windows.
Attackers run commands like:
These commands might seem small, but they’re a major clue during early infection. In fact, in a recent ANY.RUN sandbox session, we saw the Trox malware use wmic csproduct get uuid right after launch.
Take a look at the Trox session here.
In the Process Tree, you’ll notice WMIC.exe being executed. The exact command used here is wmic csproduct get uuid:
Inside the sandbox, we also see the warnings triggered under two MITRE ATT&CK techniques:
ANY.RUN flags these behaviors in real time, letting analysts quickly see that this sample is probing the environment, often a sign that malware is trying to avoid sandboxes or tailor its behavior.
See every command, understand attacker behavior in real time, and stop threats before they spread -> Try ANY.RUN now
System profiling is usually step one in an attack. If you catch it early, you can stop malware before it begins exfiltrating data, encrypting files, or digging deeper into the network.
Tools like WMIC might be old, but they’re still incredibly useful for both sysadmins and threat actors. With ANY.RUN, spotting these behaviors is easy and instant.
In this case, malware behaves like a software activator. Think of tools that activate Microsoft products without a valid license, these are often abused by malware to either:
This trick is commonly seen in malware hidden inside third-party activators or cracked software installers. They may actually perform activation-related functions, but they often do much more behind the scenes.
A typical command looks like:
wmic path SoftwareLicensingService call InstallProductKey
This installs a product key on the system, usually a routine action. But in the hands of malware, it can serve several stealthy purposes:
You may also see:
wmic call RefreshLicenseStatus
This command triggers a license check on the system, another behavior that can either reinforce the disguise or quietly collect status data.
In a recent ANY.RUN sandbox session, we observed multiple WMIC.exe processes tied to activation-related commands, clearly not part of any normal system workflow.
Take a look at this task log:
In this sandbox analysis session, you’ll notice:
In the process timeline, these commands are scattered across short intervals, pointing to a scripted or stealthy attempt to simulate activation behavior.
Some malware doesn’t try to disable antivirus software, it just steps around it. One of the easiest ways to do that is adding itself to the list of files that won’t be scanned.
This tactic is known as AV evasion, and it’s surprisingly effective. Malware doesn’t need to kill the antivirus process or tamper with system files.
Instead, it quietly tells Windows Defender to ignore certain folders or paths, allowing the malicious files to run freely.
Here’s the WMIC command used for this behavior:
wmic /Namespace:\\root\Microsoft\Windows\Defender class MSFT_MpPreference call Add ExclusionPath=”C:\”
This command tells Windows Defender to exclude the entire C:\ drive from scans.
Yes, the whole system is now off-limits for real-time protection.
Attackers may target specific folders too, like:
Add ExclusionPath=”C:\Users\Public”
This can make detection nearly impossible unless other defenses are in place.
In this sandbox session with AsyncRat, we saw this exact command used early in the execution chain.
View sandbox session with AsyncRat
Here’s what stands out in the ANY.RUN analysis:
You can also see that the command is linked to MITRE technique T1012 – Query Registry, since it interacts with Defender’s settings under the hood.
This tactic doesn’t involve malware rewriting system files or crashing antivirus, it simply asks Defender not to look, and Defender obeys.
It’s subtle. It’s quiet. And without behavioral analysis, it’s easy to miss. But in ANY.RUN’s sandbox, this move gets picked up instantly:
Once malware has encrypted your files or taken control of your system, it doesn’t want you undoing the damage. That’s where shadow copy deletion is used.
Shadow copies are automatic backups created by Windows. They’re often your last chance to restore files after a ransomware attack. So, naturally, attackers wipe them out first.
Some commonly seen commands for this purpose are:
By combining these, attackers make sure the victim can’t recover files without paying.
In this ANY.RUN sandbox session, the malware (identified as Chaos) ran a the command wmic shadowcopy delete to block recovery.
Here’s what you’ll see inside the sandbox:
By deleting shadow copies and disabling recovery tools, attackers increase the pressure on victims to pay the ransom.
These are destructive but subtle changes that don’t always trigger alarms, especially when done using built-in tools like WMIC.
Not all malware wants to stick around forever. In some cases, attackers deliberately clean up after themselves, especially when their goal is a quick hit: run a payload, exfiltrate some data, and disappear without a trace.
Other times, they use WMIC to terminate rival processes, disable competing malware, or kill security tools. This is part of what’s known as persistence removal or post-exploitation cleanup.
Here’s some of the most straightforward WMIC commands used for this:
wmic process call terminate
This command attempts to terminate a running process, any process it has permission to kill. Malware might use this to:
Attackers often pair this with a filter to target specific executables. For example:
wmic process where “name=’svchost.exe'” call terminate
For instance, in this sandbox session, malware used WMIC to issue a termination command targeting a suspicious file located in the Public directory.
Take a look at the detection: View analysis session
This is a strong sign that the malware either launched a payload from an unusual location and is now terminating it to cover its tracks, or is targeting a competing process or tool running from that same path.
If there’s one thing these five command categories reveal, it’s this: WMIC is still a go-to tool for malware, and it’s often used in the earliest stages of an attack.
From system profiling and antivirus evasion to deleting backups and terminating processes, these WMIC commands may look small on their own but together, they form a blueprint for how attackers:
That’s why real-time visibility into WMIC activity is important.
ANY.RUN’s interactive sandbox makes it easy to detect and understand how malware uses WMIC. Here’s how it works in your favor:
Whether you’re part of a blue team, threat intel group, or an incident response team, ANY.RUN helps you move from “What happened?” to “Here’s exactly what the malware did” in minutes, instead of hours.
Don’t Let Silent Commands Turn Into Full-Blown Incidents
Built-in tools like WMIC might seem harmless but in the wrong hands, they’re the quiet start of something much worse.
With real-time visibility into command-line activity, process behavior, and post-exploitation tactics, you can catch these threats before they become ransomware events or full system compromises.
Start your 14-day trial of ANY.RUN and see exactly how malicious processes unfold live, in an interactive sandbox.