WMI_Forensics: find evidence in WMI repositories
WMI_Forensics
This repository contains scripts used to find evidence in WMI repositories, specifically OBJECTS.DATA files located at:
- C:\WINDOWS\system32\wbem\Repository\OBJECTS.DATA
- C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA
Download
CCM_RUA_Finder.py
CCM_RUA_finder.py extracts SCCM software metering RecentlyUsedApplication logs from OBJECTS.DATA files.
Usage
The output file will be TSV formatted. Excel will automatically parse TSV files with .xls extensions.
PyWMIPersistenceFinder.py
PyWMIPersistenceFinder.py is designed to find WMI persistence via FitlerToConsumerBindings solely by keyword searching the OBJECTS.DATA file without parsing the full WMI repository.
In testing, this script has found the exact same data as python-cim’s show_FilterToConsumerBindings.py without requiring the setup. Only further testing will indicate if this script misses any data that python-cim can find.
In theory, this script will detect FilterToConsumerBindings that are deleted and remain in unallocated WMI space, but I haven’t had a chance to test yet.
Usage
The output is text based in the following format for each binding: