Came across a (relatively) new #SocGholish killchain.
After successfully passing the familiar WMI fingerprint check, another JS payload is returned.
This next payload performs additional WMI queries (see screenshot) and then sets up a beacon which repeatedly calls out to a C2, waiting to execute any response.
Including the deobfuscated beacon here - https://gist.github.com/rerednawyerg/aeb3870e7ad77d3f97ced6594e539592

