Skip to content

Hide Navigation Hide TOC

Suspicious AgentExecutor PowerShell Execution (c0b40568-b1e9-4b03-8d6c-b096da6da9ab)

Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument

Cluster A Galaxy A Cluster B Galaxy B Level
System Binary Proxy Execution - T1218 (457c7820-d331-465a-915e-42f85500ccc4) Attack Pattern Suspicious AgentExecutor PowerShell Execution (c0b40568-b1e9-4b03-8d6c-b096da6da9ab) Sigma-Rules 1