C0025 2016 Ukraine Electric Power Attack

During the 2016 Ukraine Electric Power Attack, Sandworm Team used PowerShell scripts to run a credential harvesting tool in memory to evade defenses.[6]

C0034 2022 Ukraine Electric Power Attack

During the 2022 Ukraine Electric Power Attack, Sandworm Team utilized a PowerShell utility called TANKTRAP to spread and launch a wiper using Windows Group Policy.[7]

S0677 AADInternals

AADInternals is written and executed via PowerShell.[8]

S1129 Akira

Akira will execute PowerShell commands to delete system volume shadow copies.[9][10]

G1024 Akira

Akira has used PowerShell scripts for credential harvesting and privilege escalation.[11]

S0622 AppleSeed

AppleSeed has the ability to execute its payload via PowerShell.[12]

G0073 APT19

APT19 used PowerShell commands to execute payloads.[13]

G0007 APT28

APT28 downloads and executes PowerShell scripts and performs PowerShell commands.[14][15][16]

C0051 APT28 Nearest Neighbor Campaign

During APT28 Nearest Neighbor Campaign, APT28 used PowerShell cmdlet Get-ChildItem to access credentials, among other PowerShell functions deployed.[17]

G0016 APT29

APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke.[18][19][20][21]

G0022 APT3

APT3 has used PowerShell on victim systems to download and run payloads after exploitation.[22]

G0050 APT32

APT32 has used PowerShell-based tools, PowerShell one-liners, and shellcode loaders for execution.[23][24][25]

G0064 APT33

APT33 has utilized PowerShell to download files from the C2 server and run various scripts. [26][27]

G0082 APT38

APT38 has used PowerShell to execute commands and other operational tasks.[28]

G0087 APT39

APT39 has used PowerShell to execute malicious code.[29][30]

G0096 APT41

APT41 leveraged PowerShell to deploy malware families in victims’ environments.[31][32]

G1044 APT42

APT42 has downloaded and executed PowerShell payloads.[33]

G1023 APT5

APT5 has used PowerShell to accomplish tasks within targeted environments.[34]

G0143 Aquatic Panda

Aquatic Panda has downloaded additional scripts and executed Base64 encoded commands in PowerShell.[35]

S0129 AutoIt backdoor

AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader.[36]

S1081 BADHATCH

BADHATCH can utilize powershell.exe to execute commands on a compromised host.[37][38]

S0234 Bandook

Bandook has used PowerShell loaders as part of execution.[39]

S0534 Bazar

Bazar can execute a PowerShell script received from C2.[40][41]

S1070 Black Basta

Black Basta has used PowerShell scripts for discovery and to execute files over the network.[42][43][44]

G1043 BlackByte

BlackByte used encoded PowerShell commands during operations.[45] BlackByte has used remote PowerShell commands in victim networks.[46]

S0521 BloodHound

BloodHound can use PowerShell to pull Active Directory information from the target environment.[47]

G0108 Blue Mockingbird

Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection.[48]

S0360 BONDUPDATER

BONDUPDATER is written in PowerShell.[49][50]

G0060 BRONZE BUTLER

BRONZE BUTLER has used PowerShell for execution.[51]

S1039 Bumblebee

Bumblebee can use PowerShell for execution.[52]

C0018 C0018

During C0018, the threat actors used encoded PowerShell scripts for execution.[53][54]

C0021 C0021

During C0021, the threat actors used obfuscated PowerShell to extract an encoded payload from within an .LNK file.[55][56]

C0032 C0032

During the C0032 campaign, TEMP.Veles used PowerShell to perform timestomping.[57]

S0674 CharmPower

CharmPower can use PowerShell for payload execution and C2 communication.[58]

G0114 Chimera

Chimera has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features.[59][60]

S1149 CHIMNEYSWEEP

CHIMNEYSWEEP can invoke the PowerShell command [Reflection.Assembly]::LoadFile(\"%s\")\n$i=\"\"\n$r=[%s]::%s(\"%s\",[ref] $i)\necho $r,$i\n to execute secondary payloads.[61]

G1021 Cinnamon Tempest

Cinnamon Tempest has used PowerShell to communicate with C2, download files, and execute reconnaissance commands.[62]

S0660 Clambling

The Clambling dropper can use PowerShell to download the malware.[63]

G0080 Cobalt Group

Cobalt Group has used powershell.exe to download and execute scripts.[64][65][66][67][68][69]

S0154 Cobalt Strike

Cobalt Strike can execute a payload on a remote host with PowerShell. This technique does not write any data to disk.[70][71] Cobalt Strike can also use PowerSploit and other scripting frameworks to perform execution.[72][73][74][75]

S0126 ComRAT

ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system.[76][77]

G0142 Confucius

Confucius has used PowerShell to execute malicious files and payloads.[78]

S0591 ConnectWise

ConnectWise can be used to execute PowerShell commands on target machines.[79]

G0052 CopyKittens

CopyKittens has used PowerShell Empire.[80]

S1155 Covenant

Covenant can create PowerShell-based launchers for Grunt installation.[81]

S0488 CrackMapExec

CrackMapExec can execute PowerShell commands via WMI.[82]

S1023 CreepyDrive

CreepyDrive can use Powershell for execution, including the cmdlets Invoke-WebRequest and Invoke-Expression.[83]

S1024 CreepySnail

CreepySnail can use PowerShell for execution, including the cmdlets Invoke-WebRequst and Invoke-Expression.[83]

S0625 Cuba

Cuba has been dropped onto systems and used for lateral movement via obfuscated PowerShell scripts.[84]

G1012 CURIUM

CURIUM has leveraged PowerShell scripts for initial process execution and data gathering in victim environments.[85]

G1034 Daggerfly

Daggerfly used PowerShell to download and execute remote-hosted files on victim systems.[86]

S1111 DarkGate

DarkGate has used PowerShell to create a remote shell.[87]

G0079 DarkHydrus

DarkHydrus leveraged PowerShell to download and execute additional scripts for execution.[88][89]

G0105 DarkVishnya

DarkVishnya used PowerShell to create shellcode loaders.[90]

S0673 DarkWatchman

DarkWatchman can execute PowerShell commands and has used PowerShell to execute a keylogger.[91]

G0009 Deep Panda

Deep Panda has used PowerShell scripts to download and execute programs in memory, without writing to disk.[92]

S0354 Denis

Denis has a version written in PowerShell.[25]

S0695 Donut

Donut can generate shellcode outputs that execute via PowerShell.[93]

S0186 DownPaper

DownPaper uses PowerShell for execution.[94]

G0035 Dragonfly

Dragonfly has used PowerShell scripts for execution.[95][96]

G1006 Earth Lusca

Earth Lusca has used PowerShell to execute commands.[97]

S0554 Egregor

Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement.[98]

G1003 Ember Bear

Ember Bear has used PowerShell commands to gather information from compromised systems, such as email servers.[99]

S0367 Emotet

Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz. [100][101][102][103][104]

S0363 Empire

Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the Invoke-PSRemoting module.[105][106]

S0512 FatDuke

FatDuke has the ability to execute PowerShell scripts.[107]

S0679 Ferocious

Ferocious can use PowerShell scripts for execution.[108]

G0051 FIN10

FIN10 uses PowerShell for execution as well as PowerShell Empire to establish persistence.[109][105]

G1016 FIN13

FIN13 has used PowerShell commands to obtain DNS data from a compromised network.[110]

G0037 FIN6

FIN6 has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener.[111][112][113]

G0046 FIN7

FIN7 used a PowerShell script to launch shellcode that retrieved an additional payload.[114][115][116][117][118] Additionally, FIN7 has executed a custom obfuscation of the shellcode invoker in PowerSploit called POWERTRASH.[119]

G0061 FIN8

FIN8's malicious spearphishing payloads are executed as PowerShell. FIN8 has also used PowerShell for lateral movement and credential access.[120][121][122][123]

S0381 FlawedAmmyy

FlawedAmmyy has used PowerShell to execute commands.[124]

G0117 Fox Kitten

Fox Kitten has used PowerShell scripts to access credential data.[125]

C0001 Frankenstein

During Frankenstein, the threat actors used PowerShell to run a series of Base64-encoded commands that acted as a stager and enumerated hosts.[126]

G0093 GALLIUM

GALLIUM used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines.[127]

G0084 Gallmaker

Gallmaker used PowerShell to download additional payloads and for execution.[128]

G0047 Gamaredon Group

Gamaredon Group has used obfuscated PowerShell scripts for staging.[129][130] Additionally, (LinkById : G0047) has used PowerShell based tools later in its attack chain.[131] Additionally, Gamaredon Group has used the PowerShell cmdlet Get-Command to download and execute the next stage payload.[132]

S1117 GLASSTOKEN

GLASSTOKEN can use PowerShell for command execution.[133]

G0115 GOLD SOUTHFIELD

GOLD SOUTHFIELD has staged and executed PowerShell scripts on compromised hosts.[134]

S1138 Gootloader

Gootloader can use an encoded PowerShell stager to write to the Registry for persistence.[135][136]

G0078 Gorgon Group

Gorgon Group malware can use PowerShell commands to download and execute a payload and open a decoy document on the victim’s machine.[137]

S0417 GRIFFON

GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet.[138]

G0125 HAFNIUM

HAFNIUM has used the Exchange Power Shell module Set-OabVirtualDirectoryPowerShell to export mailbox data.[139][140]

S0151 HALFBAKED

HALFBAKED can execute PowerShell scripts.[114]

S0037 HAMMERTOSS

HAMMERTOSS is known to use PowerShell.[141]

S0499 Hancitor

Hancitor has used PowerShell to execute commands.[142]

S1229 Havoc

Havoc can facilitate the execution of PowerShell commands.[143]

S0170 Helminth

One version of Helminth uses a PowerShell script.[144]

G1001 HEXANE

HEXANE has used PowerShell-based tools and scripts for discovery and collection on compromised hosts.[145][146][147]

C0038 HomeLand Justice

During HomeLand Justice, threat actors used PowerShell cmdlets New-MailboxSearch and Get-Recipient for discovery.[148][149]

G0100 Inception

Inception has used PowerShell to execute malicious commands and payloads.[150][151]

G0119 Indrik Spider

Indrik Spider has used PowerShell Empire for execution of malware.[152][153]

S1245 InvisibleFerret

InvisibleFerret has utilized a PowerShell script created in the victim’s home directory named "conf.ps1" that is used to modify configuration files for AnyDesk remote services.[154]

S1132 IPsec Helper

IPsec Helper can run arbitrary PowerShell commands passed to it.[155]

S0389 JCry

JCry has used PowerShell to execute payloads.[156]

S0648 JSS Loader

JSS Loader has the ability to download and execute PowerShell scripts.[157]

C0044 Juicy Mix

During Juicy Mix, OilRig used a PowerShell script to steal credentials.[158]

S0387 KeyBoy

KeyBoy uses PowerShell commands to download and execute payloads.[159]

S0526 KGH_SPY

KGH_SPY can execute PowerShell commands on the victim's machine.[160]

G0094 Kimsuky

Kimsuky has executed a variety of PowerShell scripts including Invoke-Mimikatz.[161][162][163][164][165] Kimsuky has also utilized PowerShell scripts for execution, persistence, and defense evasion.[166]

S0250 Koadic

Koadic has used PowerShell to establish persistence.[167]

S0669 KOCTOPUS

KOCTOPUS has used PowerShell commands to download additional files.[167]

S0356 KONNI

KONNI used PowerShell to download and execute a specific 64-bit version of the malware.[168][169]

G0032 Lazarus Group

Lazarus Group has used PowerShell to execute commands and malicious code.[170]

G0140 LazyScripter

LazyScripter has used PowerShell scripts to execute malicious code.[167]

G0065 Leviathan

Leviathan has used PowerShell for execution.[171][172][173][174]

S0680 LitePower

LitePower can use a PowerShell script to execute commands.[108]

S0681 Lizar

Lizar has used PowerShell scripts.[175]

S1199 LockBit 2.0

LockBit 2.0 can use the PowerShell module InvokeGPUpdate to modify Group Policy.[176][177]

S1202 LockBit 3.0

LockBit 3.0 can use PowerShell to apply Group Policy changes.[178]

S0447 Lokibot

Lokibot has used PowerShell commands embedded inside batch scripts.[179]

S1213 Lumma Stealer

Lumma Stealer has used PowerShell for initial user execution and other fuctions.[180][181][182][183]

S1141 LunarWeb

LunarWeb has the ability to run shell commands via PowerShell.[184]

S1060 Mafalda

Mafalda can execute PowerShell commands on a compromised machine.[185]

G0059 Magic Hound

Magic Hound has used PowerShell for execution and privilege escalation.[186][187][188][189][190]

G1051 Medusa Group

Medusa Group has leveraged PowerShell for execution and defense evasion.[191][192][193] Medusa Group has also utilized PowerShell to execute a bitsadmin transfer from file hosting site.[194]

S1244 Medusa Ransomware

Medusa Ransomware has launched PowerShell scripts for execution and defense evasion.[194][195]

G0045 menuPass

menuPass uses PowerSploit to inject shellcode into PowerShell.[196][197]

S0688 Meteor

Meteor can use PowerShell commands to disable the network adapters on a victim machines.[198]

S0553 MoleNet

MoleNet can use PowerShell to set persistence.[199]

G0021 Molerats

Molerats used PowerShell implants on target machines.[200]

S0256 Mosquito

Mosquito can launch PowerShell Scripts.[201]

G1019 MoustachedBouncer

MoustachedBouncer has used plugins to execute PowerShell scripts.[202]

G0069 MuddyWater

MuddyWater has used PowerShell for execution.[203][204][205][206][207][208][209][210][211][212]

G0129 Mustang Panda

Mustang Panda has used malicious PowerShell scripts to enable execution.[213][214][215]

S0457 Netwalker

Netwalker has been written in PowerShell and executed directly in memory, avoiding detection.[216][217]

S0198 NETWIRE

The NETWIRE binary has been executed via PowerShell script.[218]

S0385 njRAT

njRAT has executed PowerShell commands via auto-run registry key persistence.[219]

G0133 Nomadic Octopus

Nomadic Octopus has used PowerShell for execution.[220]

G0049 OilRig

OilRig has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.[49][221][222][223]

C0022 Operation Dream Job

During Operation Dream Job, Lazarus Group used PowerShell commands to explore the environment of compromised victims.[224]

C0014 Operation Wocao

During Operation Wocao, threat actors used PowerShell on compromised systems.[225]

S0352 OSX_OCEANLOTUS.D

OSX_OCEANLOTUS.D uses PowerShell scripts.[226]

G0040 Patchwork

Patchwork used PowerSploit to download payloads, run a reverse shell, and execute malware on the victim's machine.[227][228]

C0036 Pikabot Distribution February 2024

Pikabot Distribution February 2024 passed execution from obfuscated JavaScript files to PowerShell scripts to download and install Pikabot.[229]

S0517 Pillowmint

Pillowmint has used a PowerShell script to install a shim database.[230]

G1040 Play

Play has used Base64-encoded PowerShell scripts to disable Microsoft Defender.[231]

G0033 Poseidon Group

The Poseidon Group's Information Gathering Tool (IGT) includes PowerShell components.[232]

S0150 POSHSPY

POSHSPY uses PowerShell to execute various commands, one to execute its payload.[233]

S1173 PowerExchange

PowerExchange can use PowerShell to execute commands received from C2.[234]

S1012 PowerLess

PowerLess is written in and executed via PowerShell without using powershell.exe.[235]

S0685 PowerPunch

PowerPunch has the ability to execute through PowerShell.[129]

S0441 PowerShower

PowerShower is a backdoor written in PowerShell.[150]

S0145 POWERSOURCE

POWERSOURCE is a PowerShell backdoor.[236][237]

S0194 PowerSploit

PowerSploit modules are written in and executed via PowerShell.[238][239]

S0393 PowerStallion

PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.[240]

S0223 POWERSTATS

POWERSTATS uses PowerShell for obfuscation and execution.[241][207][242][211]

S0371 POWERTON

POWERTON is written in PowerShell.[243]

S1046 PowGoop

PowGoop has the ability to use PowerShell scripts to execute commands.[211]

S0184 POWRUNER

POWRUNER is written in PowerShell.[49]

S1058 Prestige

Prestige can use PowerShell for payload execution on targeted systems.[244]

S0613 PS1

PS1 can utilize a PowerShell loader.[245]

S0196 PUNCHBUGGY

PUNCHBUGGY has used PowerShell scripts.[246]

S0192 Pupy

Pupy has a module for loading and executing PowerShell scripts.[247]

S1032 PyDCrypt

PyDCrypt has attempted to execute with PowerShell.[248]

S0583 Pysa

Pysa has used Powershell scripts to deploy its ransomware.[249]

S0650 QakBot

QakBot can use PowerShell to download and execute payloads.[250]

S1242 Qilin

Qilin has been deployed on VMware vCenter and ESXi servers via custom PowerShell script.[251][252]

S0269 QUADAGENT

QUADAGENT uses PowerShell scripts for execution.[253]

S1212 RansomHub

RansomHub can use PowerShell to delete volume shadow copies.[254]

S0241 RATANKBA

There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form.[255][256]

G1039 RedCurl

RedCurl has used PowerShell to execute commands and to download malware.[257][258][259]

C0047 RedDelta Modified PlugX Infection Chain Operations

Mustang Panda used LNK files to execute PowerShell commands leading to eventual PlugX installation during RedDelta Modified PlugX Infection Chain Operations.[260]

S0511 RegDuke

RegDuke can extract and execute PowerShell scripts from C2 communications.[107]

S0379 Revenge RAT

Revenge RAT uses the PowerShell command Reflection.Assembly to load itself into memory to aid in execution.[261]

S0496 REvil

REvil has used PowerShell to delete volume shadow copies and download files.[262][263][264][265]

S0270 RogueRobin

RogueRobin uses a command prompt to run a PowerShell script from Excel.[88] To assist in establishing persistence, RogueRobin creates %APPDATA%\OneDrive.bat and saves the following string to it:powershell.exe -WindowStyle Hidden -exec bypass -File "%APPDATA%\OneDrive.ps1".[266][88]

G1031 Saint Bear

Saint Bear relies extensively on PowerShell execution from malicious attachments and related content to retrieve and execute follow-on payloads.[267]

S1018 Saint Bot

Saint Bot has used PowerShell for execution.[267]

G0034 Sandworm Team

Sandworm Team has used PowerShell scripts to run a credential harvesting tool in memory to evade defenses.[268][6]

S1085 Sardonic

Sardonic has the ability to execute PowerShell commands on a compromised machine.[269]

G1015 Scattered Spider

Scattered Spider has used the PowerShell cmdlet Get-ADUser.[270]

S0053 SeaDuke

SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket.[18]

S0382 ServHelper

ServHelper has the ability to execute a PowerShell script to get information from the infected host.[271]

C0058 SharePoint ToolShell Exploitation

During SharePoint ToolShell Exploitation, threat actors used PowerShell to execute attacker-controlled encoded commands.[272][273][274][275]

S0546 SharpStage

SharpStage can execute arbitrary commands with PowerShell.[199][276]

S0450 SHARPSTATS

SHARPSTATS has the ability to employ a custom PowerShell script.[242]

S1178 ShrinkLocker

ShrinkLocker uses PowerShell to disable protectors used to secure the BitLocker encryption key on victim machines and then delete the key from the system.[277]

G0121 Sidewinder

Sidewinder has used PowerShell to drop and execute malware loaders.[278]

G0091 Silence

Silence has used PowerShell to download and execute payloads.[279][280]

S0692 SILENTTRINITY

SILENTTRINITY can use PowerShell to execute commands.[281]

S0633 Sliver

Sliver has built-in functionality to launch a Powershell command prompt.[282]

S0649 SMOKEDHAM

SMOKEDHAM can execute Powershell commands sent from its C2 server.[283]

S1086 Snip3

Snip3 can use a PowerShell script for second-stage execution.[284][285]

S0273 Socksbot

Socksbot can write and execute PowerShell scripts.[228]

C0024 SolarWinds Compromise

During the SolarWinds Compromise, APT29 used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and execute other commands.[286][287][288]

S1140 Spica

Spica can use an obfuscated PowerShell command to create a scheduled task for persistence.[289]

S0390 SQLRat

SQLRat has used PowerShell to create a Meterpreter session.[290]

S1030 Squirrelwaffle

Squirrelwaffle has used PowerShell to execute its payload.[291][292]

G0038 Stealth Falcon

Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.[293]

G1053 Storm-0501

Storm-0501 has leveraged PowerShell to execute commands and scripts.[294][295]

G1046 Storm-1811

Storm-1811 has used PowerShell for multiple purposes, such as using PowerShell scripts executing in an infinite loop to create an SSH connection to a command and control server.[296]

S1183 StrelaStealer

StrelaStealer variants have used PowerShell scripts to download or drop payloads, including obfuscated variants to connect to a WebDAV server to download and executed an encrypted DLL for installation.[297]

S0491 StrongPity

StrongPity can use PowerShell to add files to the Windows Defender exclusions list.[298]

G1018 TA2541

TA2541 has used PowerShell to download files and to inject into various Windows processes.[299]

G0062 TA459

TA459 has used PowerShell for execution of a payload.[300]

G0092 TA505

TA505 has used PowerShell to download and execute malware and reconnaissance scripts.[301][302][303][304]

S1193 TAMECAT

TAMECAT has used PowerShell to download and run additional content.[305]

G0139 TeamTNT

TeamTNT has executed PowerShell commands in batch scripts.[306]

G0027 Threat Group-3390

Threat Group-3390 has used PowerShell for execution.[307][63]

G0076 Thrip

Thrip leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.[308]

G1022 ToddyCat

ToddyCat has used Powershell scripts to perform post exploit collection.[309]

G0131 Tonto Team

Tonto Team has used PowerShell to download additional payloads.[310]

S1201 TRANSLATEXT

TRANSLATEXT has used PowerShell to collect system information and to upload the collected data to a Github repository.[311]

S0266 TrickBot

TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers.
[312]

C0030 Triton Safety Instrumented System Attack

In the Triton Safety Instrumented System Attack, TEMP.Veles used a publicly available PowerShell-based tool, WMImplant.[313]

S1196 Troll Stealer

Troll Stealer creates and executes a PowerShell script to delete itself.[314]

G0010 Turla

Turla has used PowerShell to execute commands/scripts, in some cases via a custom executable or code from Empire's PSInject.[315][240][316] Turla has also used PowerShell scripts to load and execute malware in memory.

G1048 UNC3886

UNC3886 has used a PowerShell script to search memory dumps for credentials.[317]

S0386 Ursnif

Ursnif droppers have used PowerShell in download cradles to download and execute the malware's full executable payload.[318]

S0476 Valak

Valak has used PowerShell to download additional modules.[319]

G1017 Volt Typhoon

Volt Typhoon has used PowerShell including for remote system discovery.[320][321][322]

S0670 WarzoneRAT

WarzoneRAT can use PowerShell to download files and execute commands.[323][324]

S0514 WellMess

WellMess can execute PowerShell scripts received from C2.[325][326]

S0689 WhisperGate

WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.[327][328][329]

G1035 Winter Vivern

Winter Vivern passed execution from document macros to PowerShell scripts during initial access operations.[330] Winter Vivern used batch scripts that called PowerShell commands as part of initial access and installation operations.[331]

G0090 WIRTE

WIRTE has used PowerShell for script execution.[332]

G0102 Wizard Spider

Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines.[333] It has also used PowerShell to execute commands and move laterally through a victim network.[334][335][336][337]

S1065 Woody RAT

Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, WoodyPowerSession.[338]

S0341 Xbash

Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution.[339]

S1151 ZeroCleare

ZeroCleare can use a malicious PowerShell script to bypass Windows controls.[340]

S0330 Zeus Panda

Zeus Panda uses PowerShell to download and execute the payload.[341]