
Rule Info
Name
AgentExecutor PowerShell Execution
Author
Nasreddine Bencherchali (Nextron Systems), memory-shards
Description
Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument
Date
2022-12-24 00:00:00
Modified
2024-08-07 00:00:00
Id
7efd2c8d-8b18-45b7-947d-adfe9ed04f61
Tags
attack.defense-evasion attack.t1218
Type
Community Rule
Link to Public Repo
Rule History
Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
github-actions[bot]
Merge PR #4533 from @nasbench - Promote `experimental` rules
2023-11-02