Windows PowerShell / WMI Event Subscriptions
Author | Issac Briones (1d8) |
Platform | Windows |
Language | PowerShell |
Technique | WMI Event Subscriptions |
Code
# This requires file auditing from GPO to be applied to work
$query = "SELECT * FROM __InstanceCreationEvent WITHIN 5 WHERE TargetInstance ISA 'Win32_NTLogEvent' AND (TargetInstance.EventCode = '4663')"
Register-WmiEvent -Query $query -Action {
Write-Host '[+] File deletion or network share access detected. Likely not a sandbox...'
New-Item -Path "C:\Users\Administrator\Desktop\SandboxStop.txt" -ItemType File
}
Created
April 2, 2025
Last Revised
April 2, 2025