~/Privilege Escalation/Windows/Binaries# cat AgentExecutor.exe.md █
Intune Management Extension included on Intune Managed Devices
Paths:
C:\Program Files (x86)\Microsoft Intune Management Extension
Detection:
Execute
Spawns powershell.exe and executes a provided powershell script with ExecutionPolicy Bypass argument
AgentExecutor.exe -powershell "c:\temp\malicious.ps1" "c:\temp\test.log" "c:\temp\test1.log" "c:\temp\test2.log" 60000 "C:\Windows\SysWOW64\WindowsPowerShell\v1.0" 0 1
If we place a binary named powershell.exe in the path c:\temp, agentexecutor.exe will execute it successfully
AgentExecutor.exe -powershell "c:\temp\malicious.ps1" "c:\temp\test.log" "c:\temp\test1.log" "c:\temp\test2.log" 60000 "C:\temp\" 0 1