Ah, good to know that there's people still making a complete mockery of windows even now.<p>Do note that VBS mitigates a majority of 'buffer overflow' exploits and Microsoft has historically shown to brush off these vulnerabilities so that 100k bounty is pretty far fetched.<p>Any WMI operation does touch the disk (because it's a database), but similar to any kind of other database they're mixed with writes that happen in a normal environment and are not really possible to tell between malicious applications.<p>WMI requires administrator privileges to write so the privilege escalation is not that interesting except in limited environments (and Microsoft has also shown in the past that they don't care about these), which is fair considering you can't call 'sudo' a security vulnerability.
From a Reddit comment [1]: “the repo contains two novel and different ways to run any process as the SYSTEM user. It also disables every antivirus through a novel process privilege deescalation exploit”<p>[1] <a href="https://old.reddit.com/r/ReverseEngineering/comments/1icgfua/got_bored_reversed_the_wmi_made_a_novel_virus/" rel="nofollow">https://old.reddit.com/r/ReverseEngineering/comments/1icgfua...</a>
Quoting the README: "The WMI is an extension of the Windows Driver Model. It's a CIM interface that provides all kinds of information about the system hardware, and provides for a lot of the core functionality in Windows. For example, when you create a startup registry key for an an application, that's really acting on the WMI at boot."
Persistence inside the WMI database is fun. There was a good talk about this at DerbyCon[0] years ago. I think it has gotten more press since several APT groups were using it but it still isn't a well-known persistence mechanism.<p>[0] <a href="https://www.irongeek.com/i.php?page=videos/derbycon5/break-me12-whymi-so-sexy-wmi-attacks-real-time-defense-and-advanced-forensic-analysis-matt-graeber-willi-ballenthin-claudiu-teodorescu" rel="nofollow">https://www.irongeek.com/i.php?page=videos/derbycon5/break-m...</a>
The fact that so many critical infrastructure systems still depend on Windows is absurd (I say from my Windows machine). Great find! Thank you for sharing.