T1059.001 PowerShell Mappings

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Examples include the <code>Start-Process</code> cmdlet which can be used to run an executable and the <code>Invoke-Command</code> cmdlet which runs a command locally or on a remote computer (though administrator permissions are required to use PowerShell to connect to remote systems).

PowerShell may also be used to download and run executables from the Internet, which can be executed from disk or in memory without touching disk.

A number of PowerShell-based offensive testing tools are available, including Empire, PowerSploit, PoshC2, and PSAttack.(Citation: Github PSAttack)

PowerShell commands/scripts can also be executed without directly invoking the <code>powershell.exe</code> binary through interfaces to PowerShell's underlying <code>System.Management.Automation</code> assembly DLL exposed through the .NET framework and Windows Common Language Interface (CLI). (Citation: Sixdub PowerPick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015)(Citation: Microsoft PSfromCsharp APR 2014)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-2 Account Management Protects T1059.001 PowerShell
AC-3 Access Enforcement Protects T1059.001 PowerShell
AC-5 Separation of Duties Protects T1059.001 PowerShell
AC-6 Least Privilege Protects T1059.001 PowerShell
CM-2 Baseline Configuration Protects T1059.001 PowerShell
CM-5 Access Restrictions for Change Protects T1059.001 PowerShell
CM-6 Configuration Settings Protects T1059.001 PowerShell
CM-8 System Component Inventory Protects T1059.001 PowerShell
IA-2 Identification and Authentication (organizational Users) Protects T1059.001 PowerShell
IA-8 Identification and Authentication (non-organizational Users) Protects T1059.001 PowerShell
IA-9 Service Identification and Authentication Protects T1059.001 PowerShell
RA-5 Vulnerability Monitoring and Scanning Protects T1059.001 PowerShell
SI-2 Flaw Remediation Protects T1059.001 PowerShell
SI-3 Malicious Code Protection Protects T1059.001 PowerShell
SI-4 System Monitoring Protects T1059.001 PowerShell
SI-7 Software, Firmware, and Information Integrity Protects T1059.001 PowerShell
CVE-2014-0295 n/a uncategorized T1059.001 PowerShell
action.hacking.variety.Abuse of functionality Abuse of functionality related-to T1059.001 Command and Scripting Interpreter: PowerShell
action.hacking.vector.Command shell Remote shell related-to T1059.001 Command and Scripting Interpreter: PowerShell
aws_web_application_firewall AWS Web Application Firewall technique_scores T1059.001 PowerShell