Powershell

Revised DateAuthorComment
21.03.2025Roger JohnsenArticle added

Introduction

Understanding PowerShell flags and commonly abused cmdlets is vital for threat hunters as attackers frequently exploit them for stealthy execution, data exfiltration, and persistence. This knowledge helps identify malicious activity, map it to known attack techniques like those in MITRE ATT&CK, and strengthen detection and response strategies against threats effectively.


Powershell Command Flags and Cmdlets

PowerShell Command Flags

FlagDescriptionMITRE ATT&CK Technique
-ExecutionPolicyOverrides the execution policy for the session. Example: -ExecutionPolicy Bypass.T1059.001 (PowerShell)
-EncodedCommandExecutes a base64-encoded command. Example: -EncodedCommand <BASE64_STRING>.T1027 (Obfuscated Files or Information) , T1059.001
-NoProfileRuns PowerShell without loading user-specific profiles.T1059.001 (PowerShell)
-FileRuns a specified script file. Example: -File script.ps1.T1204.002 (Malicious File)
-CommandExecutes specified commands directly. Example: -Command Write-Host "Hello, world!".T1059.001 (PowerShell)
-WindowStyleControls the window appearance. Example: -WindowStyle Hidden.T1564.003 (Hide Artifacts)
-InputFormatSpecifies the format of input data, either Text or XML.T1123 (Audio Capture) , depending on malicious use.
-OutputFormatSpecifies the format of output data, either Text or XML.T1020 (Data Transfer)
-VersionSpecifies the version of PowerShell to run. Example: -Version 2.0.T1070.004 (Indicator Removal on Host)
-NoExitKeeps the PowerShell session open after execution.T1059.001 (PowerShell)

Commonly Abused Cmdlets

CmdletDescriptionMITRE ATT&CK Technique
Invoke-ExpressionExecutes a string as a PowerShell command.T1059.001 (PowerShell)
Invoke-WebRequestDownloads files or sends requests over the web.T1105 (Ingress Tool Transfer)
Start-ProcessStarts a new process on the system.T1543 (Create or Modify System Processes)
New-ObjectCreates and initializes a .NET object, often used maliciously to download files or execute code.T1129 (Execution through Module Load)
Import-ModuleLoads a PowerShell module.T1059.001 (PowerShell)
Set-ExecutionPolicyChanges the PowerShell execution policy, potentially disabling security controls.T1059.001 (PowerShell)
Add-MemberAdds properties or methods to an object. Used for advanced customization, sometimes maliciously.T1059.001 (PowerShell)
Get-CredentialPrompts for user credentials in a secure dialog box.T1056.004 (Credential API Hooking)
Export-CsvExports data to a CSV file.T1020 (Data Transfer)
Where-ObjectFilters objects in the pipeline. May be used in scripts to obfuscate data collection.T1059.001 (PowerShell)