Windows PowerShell / WMI Event Subscriptions

Author Issac Briones (1d8)
Platform Windows
Language PowerShell
Technique WMI Event Subscriptions

Code

# This requires file auditing from GPO to be applied to work
$query = "SELECT * FROM __InstanceCreationEvent WITHIN 5 WHERE TargetInstance ISA 'Win32_NTLogEvent' AND (TargetInstance.EventCode = '4663')"
Register-WmiEvent -Query $query -Action {
	Write-Host '[+] File deletion or network share access detected. Likely not a sandbox...'
	New-Item -Path "C:\Users\Administrator\Desktop\SandboxStop.txt" -ItemType File
}

Created

April 2, 2025

Last Revised

April 2, 2025