Rule Category

MALWARE-OTHER --

Alert Message

MALWARE-OTHER PowerShell invocation with ExecutionPolicy Bypass attempt

Rule Explanation

This event is generated when a compiled binary contains PowerShell invocation with options to bypass ExecutionPolicy Impact: A Network Trojan was detected Details: PowerShell invocation from within a compiled application which bypasses ExecutionPolicy is suspect behavior. This could potentially be used to download and execute malicious PowerShell scripts. Ease of Attack:

What To Look For

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic:

Technique:

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

CVE Additional Information