
Rule Info
Name
PS ExecutionContext Reflection Abuse
Author
X__Junior
Description
Detects attempts to abuse PowerShell `$ExecutionContext` and variable drives
to access the runtime environment via reflection methods (`Get-ChildItem`,
`Get-Item`, `.Name-*like`). Such techniques are commonly used in obfuscated
payloads to dynamically resolve and execute commands while evading detection.
This behavior is associated with defense evasion tactics and fileless malware
execution.
Date
2025-02-14 00:00:00
Modified
None
Id
a8e3ed21-549b-4b27-aefe-08cfac53897d
Tags
attack.defense-evasion
Type
Nextron Sigma feed only (private)