diff --git a/atomics/Indexes/Indexes-CSV/index.csv b/atomics/Indexes/Indexes-CSV/index.csv
index e1365cdc..bac3c9f2 100644
--- a/atomics/Indexes/Indexes-CSV/index.csv
+++ b/atomics/Indexes/Indexes-CSV/index.csv
@@ -358,6 +358,7 @@ defense-evasion,T1112,Modify Registry,2,Modify Registry of Local Machine - cmd,2
defense-evasion,T1112,Modify Registry,3,Modify registry to store logon credentials,c0413fb5-33e2-40b7-9b6f-60b29f4a7a18,command_prompt
defense-evasion,T1112,Modify Registry,4,Add domain to Trusted sites Zone,cf447677-5a4e-4937-a82c-e47d254afd57,powershell
defense-evasion,T1112,Modify Registry,5,Javascript in registry,15f44ea9-4571-4837-be9e-802431a7bfae,powershell
+defense-evasion,T1112,Modify Registry,6,Change Powershell Execution Policy to Bypass,f3a6cceb-06c9-48e5-8df8-8867a6814245,powershell
defense-evasion,T1218.005,Mshta,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject,1483fab9-4f52-4217-a9ce-daa9d7747cae,command_prompt
defense-evasion,T1218.005,Mshta,2,Mshta executes VBScript to execute malicious command,906865c3-e05f-4acc-85c4-fbc185455095,command_prompt
defense-evasion,T1218.005,Mshta,3,Mshta Executes Remote HTML Application (HTA),c4b97eeb-5249-4455-a607-59f95485cb45,powershell
diff --git a/atomics/Indexes/Indexes-CSV/windows-index.csv b/atomics/Indexes/Indexes-CSV/windows-index.csv
index fd8864e1..5b1499d2 100644
--- a/atomics/Indexes/Indexes-CSV/windows-index.csv
+++ b/atomics/Indexes/Indexes-CSV/windows-index.csv
@@ -144,6 +144,7 @@ defense-evasion,T1112,Modify Registry,2,Modify Registry of Local Machine - cmd,2
defense-evasion,T1112,Modify Registry,3,Modify registry to store logon credentials,c0413fb5-33e2-40b7-9b6f-60b29f4a7a18,command_prompt
defense-evasion,T1112,Modify Registry,4,Add domain to Trusted sites Zone,cf447677-5a4e-4937-a82c-e47d254afd57,powershell
defense-evasion,T1112,Modify Registry,5,Javascript in registry,15f44ea9-4571-4837-be9e-802431a7bfae,powershell
+defense-evasion,T1112,Modify Registry,6,Change Powershell Execution Policy to Bypass,f3a6cceb-06c9-48e5-8df8-8867a6814245,powershell
defense-evasion,T1218.005,Mshta,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject,1483fab9-4f52-4217-a9ce-daa9d7747cae,command_prompt
defense-evasion,T1218.005,Mshta,2,Mshta executes VBScript to execute malicious command,906865c3-e05f-4acc-85c4-fbc185455095,command_prompt
defense-evasion,T1218.005,Mshta,3,Mshta Executes Remote HTML Application (HTA),c4b97eeb-5249-4455-a607-59f95485cb45,powershell
diff --git a/atomics/Indexes/Indexes-Markdown/index.md b/atomics/Indexes/Indexes-Markdown/index.md
index d575cdea..460f8ba8 100644
--- a/atomics/Indexes/Indexes-Markdown/index.md
+++ b/atomics/Indexes/Indexes-Markdown/index.md
@@ -668,6 +668,7 @@
- Atomic Test #3: Modify registry to store logon credentials [windows]
- Atomic Test #4: Add domain to Trusted sites Zone [windows]
- Atomic Test #5: Javascript in registry [windows]
+ - Atomic Test #6: Change Powershell Execution Policy to Bypass [windows]
- [T1218.005 Mshta](../../T1218.005/T1218.005.md)
- Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows]
- Atomic Test #2: Mshta executes VBScript to execute malicious command [windows]
diff --git a/atomics/Indexes/Indexes-Markdown/windows-index.md b/atomics/Indexes/Indexes-Markdown/windows-index.md
index 9f6dd5b5..2ce1aa96 100644
--- a/atomics/Indexes/Indexes-Markdown/windows-index.md
+++ b/atomics/Indexes/Indexes-Markdown/windows-index.md
@@ -266,6 +266,7 @@
- Atomic Test #3: Modify registry to store logon credentials [windows]
- Atomic Test #4: Add domain to Trusted sites Zone [windows]
- Atomic Test #5: Javascript in registry [windows]
+ - Atomic Test #6: Change Powershell Execution Policy to Bypass [windows]
- [T1218.005 Mshta](../../T1218.005/T1218.005.md)
- Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows]
- Atomic Test #2: Mshta executes VBScript to execute malicious command [windows]
diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml
index b4bd3ad9..9a8c0529 100644
--- a/atomics/Indexes/index.yaml
+++ b/atomics/Indexes/index.yaml
@@ -29312,6 +29312,27 @@ defense-evasion:
cleanup_command: 'Remove-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" -Name T1112 -ErrorAction Ignore
+'
+ name: powershell
+ - name: Change Powershell Execution Policy to Bypass
+ auto_generated_guid: f3a6cceb-06c9-48e5-8df8-8867a6814245
+ description: |
+ Attackers needs to change the powershell execution policy in order to run their malicious powershell scripts.
+ They can either specify it during the execution of the powershell script or change the registry value for it.
+ supported_platforms:
+ - windows
+ input_arguments:
+ default_execution_policy:
+ description: Specify the default poweshell execution policy
+ type: String
+ default: Default
+ executor:
+ command: 'Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope LocalMachine
+
+'
+ cleanup_command: 'Set-ExecutionPolicy -ExecutionPolicy #{default_execution_policy}
+ -Scope LocalMachine
+
'
name: powershell
T1218.005:
diff --git a/atomics/T1112/T1112.md b/atomics/T1112/T1112.md
index 8c866913..edd18a78 100644
--- a/atomics/T1112/T1112.md
+++ b/atomics/T1112/T1112.md
@@ -20,6 +20,8 @@ The Registry of a remote system may be modified to aid in execution of files as
- [Atomic Test #5 - Javascript in registry](#atomic-test-5---javascript-in-registry)
+- [Atomic Test #6 - Change Powershell Execution Policy to Bypass](#atomic-test-6---change-powershell-execution-policy-to-bypass)
+
@@ -186,4 +188,38 @@ Remove-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Se
+
+
+
+## Atomic Test #6 - Change Powershell Execution Policy to Bypass
+Attackers needs to change the powershell execution policy in order to run their malicious powershell scripts.
+They can either specify it during the execution of the powershell script or change the registry value for it.
+
+**Supported Platforms:** Windows
+
+
+
+
+#### Inputs:
+| Name | Description | Type | Default Value |
+|------|-------------|------|---------------|
+| default_execution_policy | Specify the default poweshell execution policy | String | Default|
+
+
+#### Attack Commands: Run with `powershell`!
+
+
+```powershell
+Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope LocalMachine
+```
+
+#### Cleanup Commands:
+```powershell
+Set-ExecutionPolicy -ExecutionPolicy #{default_execution_policy} -Scope LocalMachine
+```
+
+
+
+
+
diff --git a/atomics/T1112/T1112.yaml b/atomics/T1112/T1112.yaml
index 6a0a4024..00911dd5 100644
--- a/atomics/T1112/T1112.yaml
+++ b/atomics/T1112/T1112.yaml
@@ -91,3 +91,21 @@ atomic_tests:
Remove-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings" -Name T1112 -ErrorAction Ignore
name: powershell
+- name: Change Powershell Execution Policy to Bypass
+ auto_generated_guid: f3a6cceb-06c9-48e5-8df8-8867a6814245
+ description: |
+ Attackers need to change the powershell execution policy in order to run their malicious powershell scripts.
+ They can either specify it during the execution of the powershell script or change the registry value for it.
+ supported_platforms:
+ - windows
+ input_arguments:
+ default_execution_policy:
+ description: Specify the default poweshell execution policy
+ type: String
+ default: Default
+ executor:
+ command: |
+ Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope LocalMachine
+ cleanup_command: |
+ Set-ExecutionPolicy -ExecutionPolicy #{default_execution_policy} -Scope LocalMachine
+ name: powershell