AgentExecutor PowerShell Execution

Rule Info

Name
AgentExecutor PowerShell Execution
Author
Nasreddine Bencherchali (Nextron Systems), memory-shards
Description
Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument
Date
2022-12-24 00:00:00
Modified
2024-08-07 00:00:00
Id
7efd2c8d-8b18-45b7-947d-adfe9ed04f61
Tags
attack.defense-evasion attack.t1218
Type
Community Rule

Rule History

Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
Josh
Merge PR #4955 from @joshnck - Fix `agentexecutor.exe` related rules
2024-08-07
Ryan Plas
Merge PR #4893 from @ryanplasma - Update Microsoft references URLS
2024-07-02
github-actions[bot]
Merge PR #4533 from @nasbench - Promote `experimental` rules
2023-11-02
Nasreddine Bencherchali
feat: aspnet compile + agentexecutor rename
2023-08-14
Wagga
fix: typos in multiple rules (#4011)
2023-02-06
Nasreddine Bencherchali
chore: add nextron authors tag
2023-02-01
Nasreddine Bencherchali
fix: enhance logic of `AgentExecutor` rules
2022-12-24
frack113
Update proc_creation_win_lolbin_agentexecutor.yml
2022-12-23
memory-shards
Update proc_creation_win_lolbin_agentexecutor.yml
2022-07-31
memory-shards
Update proc_creation_win_lolbin_agentexecutor.yml
2022-07-31
memory-shards
Create proc_creation_win_lolbin_agentexecutor.yml
2022-07-31