heroui logo

AgentExecutor PowerShell Execution

Sigma Rules

View Source
Summary
This rule detects the execution of the AgentExecutor.exe binary, which can be misused as a Living Off The Land Binary (LOLBIN) to run PowerShell scripts with the ExecutionPolicy set to 'Bypass'. The detection focuses specifically on instances where AgentExecutor.exe is called with specific command line arguments that signify it is being leveraged to run PowerShell commands or scripts. Given the nature of AgentExecutor.exe, its behavior often suggests potential evasion techniques being employed by threat actors, especially when invoked within specific parent processes like those related to Microsoft's Intune management. False positives can arise from legitimate usage scenarios in managed environments, so careful tuning around script paths and names is necessary to maintain an effective detection rate without compromising legitimate administrative actions.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-12-24