PowerShell can be used to enumerate and exploit a target in many ways, hence techniques to evade and abuse it existThis article delves into a Huntress blog post and analyzes PowerShell code implementation intricacies and low-level nuancesUsing a PowerShell v1 target environment helps script execution bypass AMSI and hastens the exploitation processThe above code snippets shows how to target a registry key and execute the code with Invoke-ExpressionCode-wise, PowerShell script has benefits over C code in things like location of libraries is handled by the systemSystem.dll and UnsafeNativeMethods class are used in PowerShell script to link .NET code with unmanaged windows APIsDelegate type function plays a vital role in invocation of API functions by malicious actorsUser-mode malware typically involves allocation of memory and passing shellcode in that memory space to execute concurrentlyConditional logic is added to the code for avoiding newer 64-bit versions of PowerShell with AMSI incorporatedThe article describes the understanding gained from the observation of the TTPs used by threat actors in a PowerShell script