Skip to main content
Blog

BETA DETECTION: NPM Axios Supply Chain Renamed PowerShell

  • March 31, 2026
  • 0 replies
  • 3 views
Aaron Beardslee
Forum|alt.badge.img
name: Axios Supply Chain Renamed PowerShell Executing from ProgramData Analytic
category: 'Defense Evasion'
threatname: 'Masquerading: Rename System Utilities'
functionality: 'Endpoint Management Systems'
description: |
  Detects a Windows Terminal process name (wt.exe) executing from %PROGRAMDATA% with
  PowerShell-style arguments, consistent with the axios supply chain RAT delivery chain.
  The malicious VBScript dropper copies powershell.exe to C:\ProgramData\wt.exe before
  executing the stage-2 RAT. wt.exe is the legitimate filename for Windows Terminal
  (WindowsTerminal.exe), making this an intentional naming collision to bypass
  process-name-based EDR heuristics. The renamed binary is invoked with -w hidden and
  -ep bypass to suppress the window and circumvent execution policy. PowerShell executing
  from ProgramData is anomalous under any circumstances; PowerShell masquerading as
  Windows Terminal is a strong indicator of compromise.
reference:
  - https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package
  - https://attack.mitre.org/techniques/T1036/003/
labels:
  - attack.defense_evasion
  - attack.t1036.003
  - attack.t1059.001
  - axios
  - supply_chain
  - masquerading
  - wt.exe
logsource:
  category: process_creation
  product: windows
detection:
  selection_wt_from_programdata:
    Image|contains: '\ProgramData\'
    Image|endswith: '\wt.exe'
  selection_ps_args:
    CommandLine|contains:
      - '-ep bypass'
      - '-ExecutionPolicy bypass'
      - '-ExecutionPolicy Bypass'
      - '-w hidden'
      - '-WindowStyle Hidden'
      - '-file '
      - '-EncodedCommand'
  filter_legitimate_wt:
    Image|startswith:
      - 'C:\Program Files\WindowsApps\'
      - 'C:\Windows\System32\'
  condition: selection_wt_from_programdata and selection_ps_args and not filter_legitimate_wt
criticality: Critical
saveasthreat: true


violation_summary:
  grouping_attribute: 'accountname'
  level2_attribute: 'devicehostname'
  level2_metadata_attributes:

 



TECHNICAL DETAILS:


    The renamed binary executes the stage-2 PowerShell RAT as:
    C:\ProgramData\wt.exe -w hidden -ep bypass -file %TEMP%\6202033.ps1

    After execution, 6202033.ps1 deletes itself, leaving only wt.exe and system.bat.
    The Huntress SOC analyst Chad Hudson identified this technique during triage:
    "wt.exe is just Windows Terminal — being used as a PowerShell bypass."

    Persistence created by the stage-2 RAT:
      File:  C:\ProgramData\system.bat (hidden, download cradle re-fetching RAT on login)
      RegKey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftUpdate → system.bat

    Artifact to hunt:
      dir C:\ProgramData\wt.exe
      If found — system is compromised. Do NOT clean in place. Rebuild from known-good image.

 


Policy building walkthrough can be found in this previous post:

 

https://connect.securonix.com/threat%2Dresearch%2Dintelligence%2D62/beta%2Ddetection%2Dtelnyx%2Dteampcp%2Dcredential%2Dexfiltration%2D241