Skip to content

AndrewRathbun/WMI-Parser

 
 

Repository files navigation

WMI-Parser

TLDR

This is an updated version of woanware's WMI-Parser, which can be found here. That tool was a C# rewrite of davidpany's WMI_Forensics Python script, found here

Usage

Below is an updated version of the original example from the previous WMI-Parser repo:

.\wmi-parser.exe -i C:\temp\testdata\OBJECTS.DATA -o c:\temp\testdata

wmi-parser v1.0.0

Author: Mark Woan / woanware (markwoan@gmail.com)
https://github.com/woanware/wmi-parser

Updated By: Andrew Rathbun / https://github.com/AndrewRathbun
https://github.com/AndrewRathbun/wmi-parser

  SCM Event Log Consumer-SCM Event Log Filter - (Common binding based on consumer and filter names, possibly legitimate)
    Consumer: NTEventLogEventConsumer ~ SCM Event Log Consumer ~ sid ~ Service Control Manager

    Filter:
      Filter Name : SCM Event Log Filter
      Filter Query: select * from MSFT_SCMEventLogEvent

  BadStuff-DeviceDocked

    Name: BadStuff
    Type: CommandLineEventConsumer
    Arguments: powershell.exe -NoP Start-Process ('badstuff.exe')

    Filter:
      Filter Name : DeviceDocked
      Filter Query: SELECT * FROM Win32_SystemConfigurationChangeEvent 

Below is an example of parsing an infected OBJECTS.DATA file, the sample of which can be found here:

image

Output

This will output to TSV, which can ingested into a tool like Timeline Explorer for easy analysis.