Skip to content

WMI Active Script

Evidence: WMI Active Script
Description: Dump WMI Active Script Event Consumers
Category: System
Platform: windows
Short Name: wmiasc
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

WMI ActiveScript Event Consumers execute VBScript or JScript code when specific WMI events occur. This is a powerful persistence mechanism that allows attackers to run arbitrary scripts with SYSTEM privileges in response to system events.

ActiveScript consumers are particularly dangerous because they don’t require a file on disk (fileless persistence) and run with high privileges.

This collector gathers structured data about wmi active script.

FieldDescriptionExample
NameConsumer nameMaliciousConsumer
PayloadScriptEngineScripting engineVBScript
PayloadScriptTextScript codeSet objShell = CreateObject(“WScript.Shell”)…

This collector queries WMI for ActiveScriptEventConsumer instances in multiple namespaces:

  • ROOT\Subscription
  • ROOT\DEFAULT
  • ROOT\CIMV2

ActiveScript consumers are a common advanced persistence technique. Investigators use this data to detect WMI script-based persistence, identify malicious VBScript/JScript payloads, and track fileless malware techniques.