Artifacts Generated: Process Inject
Summary
Execute PowerShell commands in a remote process. Leverages the currently set injection technique to inject the PowerShell loader.Arguments (Positional or Popup)
PID
Target process ID.Command
PowerShell command to be executed.Usage
MITRE ATT&CK Mapping
- T1059
- T1055