--- Name: AgentExecutor.exe Description: Intune Management Extension included on Intune Managed Devices Author: Eleftherios Panos Created: 2020-07-23 Commands: - Command: AgentExecutor.exe -powershell "{PATH_ABSOLUTE:.ps1}" "{PATH_ABSOLUTE:.1.log}" "{PATH_ABSOLUTE:.2.log}" "{PATH_ABSOLUTE:.3.log}" 60000 "C:\Windows\SysWOW64\WindowsPowerShell\v1.0" 0 1 Description: Spawns powershell.exe and executes a provided powershell script with ExecutionPolicy Bypass argument Usecase: Execute unsigned powershell scripts Category: Execute Privileges: User MitreID: T1218 OperatingSystem: Windows 10 Tags: - Execute: PowerShell - Command: AgentExecutor.exe -powershell "{PATH_ABSOLUTE:.ps1}" "{PATH_ABSOLUTE:.1.log}" "{PATH_ABSOLUTE:.2.log}" "{PATH_ABSOLUTE:.3.log}" 60000 "{PATH_ABSOLUTE:folder}" 0 1 Description: If we place a binary named powershell.exe in the specified folder path, agentexecutor.exe will execute it successfully Usecase: Execute a provided EXE Category: Execute Privileges: User MitreID: T1218 OperatingSystem: Windows 10 Tags: - Execute: EXE Full_Path: - Path: C:\Program Files (x86)\Microsoft Intune Management Extension\AgentExecutor.exe Detection: - Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor_susp_usage.yml Acknowledgement: - Person: Eleftherios Panos Handle: '@lefterispan'