Active Script Event Consumers
Overview
Evidence: Active Script Event Consumers Description: Dump WMI Active Script Event Consumers Category: Persistence Platform: Windows Short Name: wmiasc Is Parsed: Yes - WMI consumers parsed into structured format Sent to Investigation Hub: Yes Collect File(s): No
Background
WMI ActiveScript Event Consumers execute VBScript or JScript code when specific WMI events occur. This is a powerful persistence mechanism that allows attackers to run arbitrary scripts with SYSTEM privileges in response to system events.
ActiveScript consumers are particularly dangerous because they don't require a file on disk (fileless persistence) and run with high privileges.
Data Collected
Name
Consumer name
MaliciousConsumer
PayloadScriptEngine
Scripting engine
VBScript
PayloadScriptText
Script code
Set objShell = CreateObject("WScript.Shell")...
Collection Method
This collector queries WMI for ActiveScriptEventConsumer instances in multiple namespaces:
ROOT\Subscription
ROOT\DEFAULT
ROOT\CIMV2
Usage
ActiveScript consumers are a common advanced persistence technique. Investigators use this data to detect WMI script-based persistence, identify malicious VBScript/JScript payloads, and track fileless malware techniques.
Known Limitations
Only shows current consumers
Can be in non-standard namespaces
Requires WMI service
Notes
Any ActiveScriptEventConsumer should be carefully investigated as this is a common ATT&CK technique (T1546.003). The script content should be analyzed for malicious behavior.
Last updated
Was this helpful?