2021-08-19 16:09:31 +02:00
title : Powershell WMI Persistence
2021-08-19 15:37:28 +02:00
id : 9e07f6e7-83aa-45c6-998e-0af26efd0a85
status : experimental
author : frack113
date : 2021 /08/19
2021-10-16 08:18:49 +02:00
modified : 2021 /10/16
2021-08-19 15:37:28 +02:00
description : Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription.
references :
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1546.003/T1546.003.md
- https://github.com/EmpireProject/Empire/blob/master/data/module_source/persistence/Persistence.psm1#L545
tags :
- attack.privilege_escalation
- attack.t1546.003
logsource :
product : windows
2021-10-16 08:18:49 +02:00
category : ps_script
2021-08-19 15:37:28 +02:00
definition : EnableScriptBlockLogging must be set to enable
detection :
selection_ioc :
- ScriptBlockText|contains|all :
- 'New-CimInstance '
- '-Namespace root/subscription '
2021-08-19 15:42:19 +02:00
- '-ClassName __EventFilter '
2021-08-19 15:37:28 +02:00
- '-Property ' #is a variable name
- ScriptBlockText|contains|all :
- 'New-CimInstance '
- '-Namespace root/subscription '
- '-ClassName CommandLineEventConsumer '
- '-Property ' #is a variable name
2021-10-16 08:18:49 +02:00
condition : selection_ioc
2021-08-19 15:37:28 +02:00
falsepositives :
- Unknown
level : medium