CIMplant v20210714.1 releases: C# port of WMImplant
CIMplant
C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or the current user’s session.
Note: Some commands will use PowerShell in combination with WMI, denoted with ** in the --show-commands
command.
Introduction
CIMplant is a C# rewrite and expansion on @christruncer‘s WMImplant. It allows you to gather data about a remote system, execute commands, exfil data, and more. The tool allows connections using Windows Management Instrumentation, WMI, or Common Interface Model, CIM; well more accurately Windows Management Infrastructure, MI. CIMplant requires local administrator permissions on the target system.
Usage
Some Helpful Commands
Some Example Usage Commands
Cobalt Strike Execute-Assembly
I wanted to code CIMplant in a way that would allow usage through execute-assembly so everything is packed into one executable and loaded reflectively. You should be able to run all commands through the beacon without issue. Enjoy!
Important Files
- Program.cs
This is the brains of the operation, the driver for the program.
- Connector.cs
This is where the initial CIM/WMI connections are made and passed to the rest of the application
- ExecuteWMI.cs
All function code for the WMI commands
- ExecuteCIM.cs
All function code for the CIM (MI) commands
Detection
Of course, the first thing we’ll want to be aware of is the initial WMI or CIM connection. In general, WMI uses DCOM as a communication protocol whereas CIM uses WSMan (or, WinRM). This can be modified for CIM and is in CIMplant, but let’s just go over the default values for now. For DCOM, the first thing we can do is look for initial TCP connections over port 135. The connecting and receiving systems will then decide on a new, very high port to use so that will vary drastically. For WSMan, the initial TCP connection is over port 5985.
Next, you’ll want to look at the Microsoft-Windows-WMI-Activity/Trace event log in the Event Viewer. Search for Event ID 11 and filter on the IsLocal property if possible. You can also look for Event ID 1295 within the Microsoft-Windows-WinRM/Analytic log.
Finally, you’ll want to look for any modifications to the DebugFilePath property with the Win32_OSRecoveryConfiguration class. More detailed information about detection can be found in Part 1 of our blog series here: CIMplant Part 1: Detection of a C# Implementation of WMImplant
Changelog v20210714.1
- 0154634 Added all functions to README
Installation
Copyright (C) 2021FortyNorthSecurity