Rule Category


Alert Message

MALWARE-OTHER PowerShell invocation with ExecutionPolicy Bypass attempt

Rule Explanation

This event is generated when a compiled binary contains PowerShell invocation with options to bypass ExecutionPolicy Impact: A Network Trojan was detected Details: PowerShell invocation from within a compiled application which bypasses ExecutionPolicy is suspect behavior. This could potentially be used to download and execute malicious PowerShell scripts. Ease of Attack:

What To Look For

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework



For reference, see the MITRE ATT&CK vulnerability types here:

Additional Links

Rule Vulnerability

CVE Additional Information