<<< Hide Navigation Hide TOC >>>
Execute Invoke-command on Remote Host (7b836d7f-179c-4ba4-90a7-a7e60afb48e6)
Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Execute Invoke-command on Remote Host (7b836d7f-179c-4ba4-90a7-a7e60afb48e6) | Sigma-Rules | Windows Remote Management - T1021.006 (60d0c01d-e2bf-49dd-a453-f8a9c9fa6f65) | Attack Pattern | 1 |
Remote Services - T1021 (54a649ff-439a-41a4-9856-8d144a2551ba) | Attack Pattern | Windows Remote Management - T1021.006 (60d0c01d-e2bf-49dd-a453-f8a9c9fa6f65) | Attack Pattern | 2 |