PowerShell Profile (T1546.013)

View on ATT&CK

In Playbook

Associated Tactics

  • Privilege Escalation
  • Persistence

Privilege Escalation (TA0004)

The adversary is trying to gain higher-level permissions. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include: * SYSTEM/root level * local administrator * user account with admin-like access * user accounts with access to specific system or perform specific function These techniques often overlap with Persistence techniques, as OS features that let an adversary persist can execute in an elevated context.

View on ATT&CK

Procedure Examples

Description Source(s)
DeRyke, A.. (2019, June 7). Lab Notes: Persistence and Privilege Elevation using the Powershell Profile. Retrieved July 8, 2019. Wits End and Shady PowerShell Profiles
Faou, M. and Dumont R.. (2019, May 29). A dive into Turla PowerShell usage. Retrieved June 14, 2019. ESET Turla PowerShell May 2019
Malware Archaeology. (2016, June). WINDOWS POWERSHELL LOGGING CHEAT SHEET - Win 7/Win 2008 or later. Retrieved June 24, 2016. Malware Archaeology PowerShell Cheat Sheet
Microsoft. (2017, November 29). About Profiles. Retrieved June 14, 2019. Microsoft About Profiles
Microsoft. (2021, September 27). about_Profiles. Retrieved February 4, 2022. Microsoft Profiles