Skip to content

Latest commit

 

History

History
36 lines (26 loc) · 1.56 KB

evtx-5861-event-consumer-created.md

File metadata and controls

36 lines (26 loc) · 1.56 KB

WMI-Activity/Operational/5861: New WMI Event Consumer

This event, logged to the WMI-Activity/Operational channel, is logged when a new WMI event consumer is registered on the system.

Behavioral Indications

  • Behavioral - Persistence (TA0003)

Analysis Value

  • Account - Security Identifier (SID)

Operating System Availability

  • Windows 11
  • Windows 10
  • Windows 8
  • Windows 7
  • Windows Vista

Artifact Location(s)

  • %SystemRoot%\System32\Winevt\Logs\Microsoft-Windows-WMI-Activity%4Operational.evtx

Artifact Interpretation

Because new WMI event consumers on Windows enpoints are rather rare, this artifact provides a high-fidelity indicator of persistence activity. The information that you find in this event may vary depending on specific attacker techniques. In general, suspicious WMI event consumers will be of the following types, which are indicated in the event data for event ID 5861:

  • CommandLineEventConsumer
  • ActiveScriptEventConsumer

Analysis Tips

Proximate Execution

Depending on the method an attacker has used to install a WMI event consumer, they will either have run mofcomp.exe or powershell. Consider cross-referencing this finding with artifacts that provide evidence of execution and searching for such activity.

Live System Collection

Evidence of WMI event consumers may also be queried on a live system through Powershell's Get-WMI module as follows:

Get-WMIObject -Namespace root/Subscription -Class CommandLineEventConsumer

Example

Example Image