System Script Proxy Execution
Adversaries may use trusted scripts, often signed with certificates, to proxy the execution of malicious files. Several Microsoft signed scripts that have been downloaded from Microsoft or are default on Windows installations can be used to proxy execution of other files.(Citation: LOLBAS Project) This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List)
BY SOURCE
PROCEDURES (6)
Auto-extracted: 6 detections for process creation monitoring
Auto-extracted: 5 detections for powershell
Auto-extracted: 1 detections for file monitoring
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for remote