<<< Hide Navigation Hide TOC >>>
Execute Code with Pester.bat (59e938ff-0d6d-4dc3-b13f-36cc28734d4e)
Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | Execute Code with Pester.bat (59e938ff-0d6d-4dc3-b13f-36cc28734d4e) | Sigma-Rules | 1 |
Execute Code with Pester.bat (59e938ff-0d6d-4dc3-b13f-36cc28734d4e) | Sigma-Rules | System Script Proxy Execution - T1216 (f6fe9070-7a65-49ea-ae72-76292f42cebe) | Attack Pattern | 1 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | 2 |