WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis

DerbyCon V - Unity

Presented by: William Ballenthin, Matthew Graeber, Claudiu Teodorescu
Date: Saturday September 26, 2015
Time: 14:00 - 14:50
Location: Track 1
Track: Break Me

Windows Management Instrumentation (WMI) is a remote management framework that enables the collection of host information, execution of code, and provides an eventing system that can respond to operating system events in real time. FireEye has recently seen a surge in attacker use of WMI to carry out objectives such as system reconnaissance, remote code execution, persistence, lateral movement, covert data storage, and VM detection. Defenders and forensic analysts have largely remained unaware of the value of WMI due to its relative obscurity and completely undocumented file format. After extensive reverse engineering, our team has documented the WMI repository file format in detail, developed libraries to parse it, and formed a methodology for finding evil in the repository. In this talk, we will take a deep dive into the architecture of WMI, reveal a case study in attacker use of WMI in the wild, describe WMI attack mitigation strategies, show how to mine its repository for forensic artifacts, and demonstrate how to detect attacker activity in real-time by tapping into the WMI eventing system. By the end of this talk, we will have convinced the audience that WMI is a valuable asset not just for system administrators and attackers, but equally so for defenders and forensic analysts.

Matthew Graeber

William Ballenthin

Claudiu Teodorescu


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats