MITRE ATT&CK Technique
Lateral Movement T1021.006
Description

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user. WinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).(Citation: Microsoft WinRM) It may be called with the `winrm` command or by any number of programs such as PowerShell.(Citation: Jacobsen 2014) WinRM can be used as a method of remotely interacting with [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047).(Citation: MSDN WMI)

Supported Platforms
Windows
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-02-11T18:29:47.757Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may use [Valid '
                'Accounts](https://attack.mitre.org/techniques/T1078) to '
                'interact with remote systems using Windows Remote Management '
                '(WinRM). The adversary may then perform actions as the '
                'logged-on user.\n'
                '\n'
                'WinRM is the name of both a Windows service and a protocol '
                'that allows a user to interact with a remote system (e.g., '
                'run an executable, modify the Registry, modify '
                'services).(Citation: Microsoft WinRM) It may be called with '
                'the `winrm` command or by any number of programs such as '
                'PowerShell.(Citation: Jacobsen 2014) WinRM  can be used as a '
                'method of remotely interacting with [Windows Management '
                'Instrumentation](https://attack.mitre.org/techniques/T1047).(Citation: '
                'MSDN WMI)',
 'external_references': [{'external_id': 'T1021.006',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1021/006'},
                         {'description': 'French, D. (2018, September 30). '
                                         'Detecting Lateral Movement Using '
                                         'Sysmon and Splunk. Retrieved October '
                                         '11, 2019.',
                          'source_name': 'Medium Detecting Lateral Movement',
                          'url': 'https://medium.com/threatpunter/detecting-lateral-movement-using-sysmon-and-splunk-318d3be141bc'},
                         {'description': 'Jacobsen, K. (2014, May 16). Lateral '
                                         'Movement with '
                                         'PowerShell[slides]. '
                                         'Retrieved November 12, 2014.',
                          'source_name': 'Jacobsen 2014',
                          'url': 'https://www.slideshare.net/kieranjacobsen/lateral-movement-with-power-shell-2'},
                         {'description': 'Microsoft. (n.d.). Windows '
                                         'Management Instrumentation. '
                                         'Retrieved April 27, 2016.',
                          'source_name': 'MSDN WMI',
                          'url': 'https://msdn.microsoft.com/en-us/library/aa394582.aspx'},
                         {'description': 'Microsoft. (n.d.). Windows Remote '
                                         'Management. Retrieved September 12, '
                                         '2024.',
                          'source_name': 'Microsoft WinRM',
                          'url': 'https://learn.microsoft.com/en-us/windows/win32/winrm/portal'}],
 'id': 'attack-pattern--60d0c01d-e2bf-49dd-a453-f8a9c9fa6f65',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'lateral-movement'}],
 'modified': '2025-10-24T17:48:51.000Z',
 'name': 'Windows Remote Management',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Windows'],
 'x_mitre_version': '1.2'}
Quick Actions
Related Threat Actors (5)
Wizard Spider
High

Chimera
High

Threat Group-3390
High

FIN13
High

Storm-0501
High