Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

CreateDump Process Dump

Detects uses of the createdump.exe LOLOBIN utility to dump process memory

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)+1Tue Jan 04windows
Detectionmediumtest

Dynamic .NET Compilation Via Csc.EXE

Detects execution of "csc.exe" to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Delivery
Florian Roth (Nextron Systems)+1Sat Aug 24windows
Detectionhightest

Csc.EXE Execution Form Potentially Suspicious Parent

Detects a potentially suspicious parent of "csc.exe", which could be a sign of payload delivery.

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScriptTA0005 · Defense Evasion+2
Florian Roth (Nextron Systems)+2Mon Feb 11windows
Detectionmediumtest

Suspicious Csi.exe Usage

Csi.exe is a signed binary from Microsoft that comes with Visual Studio and provides C# interactive capabilities. It can be used to run C# code from a file passed as a parameter in command line. Early version of this utility provided with Microsoft “Roslyn” Community Technology Preview was named 'rcsi.exe'

WindowsProcess Creation
TA0008 · Lateral MovementTA0002 · ExecutionT1072 · Software Deployment ToolsTA0005 · Defense Evasion+1
Konstantin Grishchenko+1Sat Oct 17windows
Detectionhightest

Suspicious Use of CSharp Interactive Console

Detects the execution of CSharp interactive console by PowerShell

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Michael R.Sun Mar 08windows
Detectionmediumtest

Active Directory Structure Export Via Csvde.EXE

Detects the execution of "csvde.exe" in order to export organizational Active Directory structure.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1087.002 · Domain Account
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

Potential Cookies Session Hijacking

Detects execution of "curl.exe" with the "-c" flag in order to save cookie data.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionmediumtest

Curl Web Request With Potential Custom User-Agent

Detects execution of "curl.exe" with a potential custom "User-Agent". Attackers can leverage this to download or exfiltrate data via "curl" to a domain that only accept specific "User-Agent" strings

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionmediumtest

File Download From IP URL Via Curl.EXE

Detects file downloads directly from IP address URL using curl.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Oct 18windows
Detectionhightest

Suspicious File Download From IP Via Curl.EXE

Detects potentially suspicious file downloads directly from IP addresses using curl.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionhightest

Suspicious File Download From File Sharing Domain Via Curl.EXE

Detects potentially suspicious file download from file sharing domains using curl.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionmediumtest

Insecure Transfer Via Curl.EXE

Detects execution of "curl.exe" with the "--insecure" flag.

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)Fri Jun 30windows
Detectionmediumtest

Insecure Proxy/DOH Transfer Via Curl.EXE

Detects execution of "curl.exe" with the "insecure" flag over proxy or DOH.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionmediumtest

Local File Read Using Curl.EXE

Detects execution of "curl.exe" with the "file://" protocol handler in order to read local files.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionhightest

Suspicious CustomShellHost Execution

Detects the execution of CustomShellHost.exe where the child isn't located in 'C:\Windows\explorer.exe'. CustomShellHost is a known LOLBin that can be abused by attackers for defense evasion techniques.

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionhightest

ManageEngine Endpoint Central Dctask64.EXE Potential Abuse

Detects the execution of "dctask64.exe", a signed binary by ZOHO Corporation part of ManageEngine Endpoint Central. This binary can be abused for DLL injection, arbitrary command and process execution.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.001 · Dynamic-link Library Injection
Florian Roth (Nextron Systems)+1Tue Jan 28windows
Detectionmediumtest

Uncommon Child Process Of Defaultpack.EXE

Detects uncommon child processes of "DefaultPack.EXE" binary as a proxy to launch other programs

WindowsProcess Creation
T1218 · System Binary Proxy ExecutionTA0005 · Defense EvasionTA0002 · Execution
François HubautSat Dec 31windows
Detectionhightest

Suspicious Desktopimgdownldr Command

Detects a suspicious Microsoft desktopimgdownldr execution with parameters used to download files from the Internet

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)Fri Jul 03windows
Detectionhighexperimental

Devcon Execution Disabling VMware VMCI Device

Detects execution of devcon.exe with commands that disable the VMware Virtual Machine Communication Interface (VMCI) device. This can be legitimate during VMware Tools troubleshooting or driver conflicts, but may also indicate malware attempting to hijack communication with the hardware via the VMCI device. This has been used to facilitate VMware ESXi vulnerability exploits to escape VMs and execute code on the ESXi host.

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service+1
Matt Anderson+2Fri Jan 02windows
Detectionmediumtest

DeviceCredentialDeployment Execution

Detects the execution of DeviceCredentialDeployment to hide a process from view.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

Arbitrary MSI Download Via Devinit.EXE

Detects a certain command line flag combination used by "devinit.exe", which can be abused as a LOLBIN to download arbitrary MSI packages on a Windows system

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Florian Roth (Nextron Systems)Tue Jan 11windows
Detectionmediumtest

Potentially Suspicious Child Process Of ClickOnce Application

Detects potentially suspicious child processes of a ClickOnce deployment application

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Detectionlowtest

DirLister Execution

Detect the usage of "DirLister.exe" a utility for quickly listing folder or drive contents. It was seen used by BlackCat ransomware to create a list of accessible directories and files.

WindowsProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautSat Aug 20windows
Detectionmediumtest

Potentially Suspicious Child Process Of DiskShadow.EXE

Detects potentially suspicious child processes of "Diskshadow.exe". This could be an attempt to bypass parent/child relationship detection or application whitelisting rules.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 15windows
Detectionmediumtest

Diskshadow Script Mode - Uncommon Script Extension Execution

Detects execution of "Diskshadow.exe" in script mode to execute an script with a potentially uncommon extension. Initial baselining of the allowed extension list is required.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 15windows
Detectionmediumtest

Diskshadow Script Mode - Execution From Potential Suspicious Location

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag where the script is located in a potentially suspicious location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 15windows
Detectionhightest

DLL Sideloading by VMware Xfer Utility

Detects execution of VMware Xfer utility (VMwareXferlogs.exe) from the non-default directory which may be an attempt to sideload arbitrary DLL

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionhightest

Dllhost.EXE Execution Anomaly

Detects a "dllhost" process spawning with no commandline arguments which is very rare to happen and could indicate process injection activity or malware mimicking similar system processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Nasreddine Bencherchali (Nextron Systems)Mon Jun 27windows
Detectionhightest

DNS Exfiltration and Tunneling Tools Execution

Well-known DNS Exfiltration tools execution

WindowsProcess Creation
TA0010 · ExfiltrationT1048.001 · Exfiltration Over Symmetric Encrypted Non-C2 ProtocolTA0011 · Command and ControlT1071.004 · DNS+1
Daniil Yugoslavskiy+1Thu Oct 24windows
Detectionhightest

Unusual Child Process of dns.exe

Detects an unexpected process spawning from dns.exe which may indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionmediumtest

Potential Discovery Activity Via Dnscmd.EXE

Detects an attempt to leverage dnscmd.exe to enumerate the DNS zones of a domain. DNS zones used to host the DNS records for a particular domain.

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · Execution
@gott_cyberSun Jul 31windows
Detectionmediumtest

Potential Application Whitelisting Bypass via Dnx.EXE

Detects the execution of Dnx.EXE. The Dnx utility allows for the execution of C# code. Attackers might abuse this in order to bypass application whitelisting.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1027.004 · Compile After Delivery
Beyu Denis+1Sat Oct 26windows
Detectionmediumtest

Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE

Detects execution of arbitrary DLLs or unsigned code via a ".csproj" files via Dotnet.EXE.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+1Sun Oct 18windows
Detectionmediumtest

Binary Proxy Execution Via Dotnet-Trace.EXE

Detects commandline arguments for executing a child process via dotnet-trace.exe

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Jimmy BayneTue Jan 02windows
Detectionmediumtest

Process Memory Dump Via Dotnet-Dump

Detects the execution of "dotnet-dump" with the "collect" flag. The execution could indicate potential process dumping of critical processes such as LSASS.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

DriverQuery.EXE Execution

Detect usage of the "driverquery" utility. Which can be used to perform reconnaissance on installed drivers

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Jan 19windows
Detectionmediumtest

Domain Trust Discovery Via Dsquery

Detects execution of "dsquery.exe" for domain trust discovery

WindowsProcess Creation
TA0007 · DiscoveryT1482 · Domain Trust Discovery
E.M. Anhaus+3Thu Oct 24windows
Detectionmediumtest

DumpMinitool Execution

Detects the use of "DumpMinitool.exe" a tool that allows the dump of process memory via the use of the "MiniDumpWriteDump"

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)+1Wed Apr 06windows
Detectionhightest

Suspicious DumpMinitool Execution

Detects suspicious ways to use the "DumpMinitool.exe" binary

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1036 · MasqueradingT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Wed Apr 06windows
Detectionmediumtest

New Capture Session Launched Via DXCap.EXE

Detects the execution of "DXCap.EXE" with the "-c" flag, which allows a user to launch any arbitrary binary or windows package through DXCap itself. This can be abused to potentially bypass application whitelisting.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+2Sat Oct 26windows
Detectionhightest

File Explorer Folder Opened Using Explorer Folder Shortcut Via Shell

Detects the initial execution of "cmd.exe" which spawns "explorer.exe" with the appropriate command line arguments for opening the "My Computer" folder.

WindowsProcess Creation
TA0007 · DiscoveryT1135 · Network Share Discovery
kostastsaleThu Dec 22windows
Detectionmediumtest

Remote File Download Via Findstr.EXE

Detects execution of "findstr" with specific flags and a remote share path. This specific set of CLI flags would allow "findstr" to download the content of the file located on the remote share as described in the LOLBAS entry.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionmediumtest

Recon Command Output Piped To Findstr.EXE

Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example. Attackers often time use this technique to extract specific information they require in their reconnaissance phase.

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discovery
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 06windows
Detectionmediumtest

Security Tools Keyword Lookup Via Findstr.EXE

Detects execution of "findstr" to search for common names of security tools. Attackers often pipe the results of recon commands such as "tasklist" or "whoami" to "findstr" in order to filter out the results. This detection focuses on the keywords that the attacker might use as a filter.

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 20windows
Detectionlowtest

Insensitive Subfolder Search Via Findstr.EXE

Detects execution of findstr with the "s" and "i" flags for a "subfolder" and "insensitive" search respectively. Attackers sometimes leverage this built-in utility to search the system for interesting files or filter through results of commands.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionhightest

Finger.EXE Execution

Detects execution of the "finger.exe" utility. Finger.EXE or "TCPIP Finger Command" is an old utility that is still present on modern Windows installation. It Displays information about users on a specified remote computer (typically a UNIX computer) that is running the finger service or daemon. Due to the old nature of this utility and the rareness of machines having the finger service. Any execution of "finger.exe" can be considered "suspicious" and worth investigating.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+2Wed Feb 24windows
Detectionhightest

Forfiles.EXE Child Process Masquerading

Detects the execution of "forfiles" from a non-default location, in order to potentially spawn a custom "cmd.exe" from the current working directory.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Nasreddine Bencherchali (Nextron Systems)+1Fri Jan 05windows
Detectionmediumtest

Forfiles Command Execution

Detects the execution of "forfiles" with the "/c" flag. While this is an expected behavior of the tool, it can be abused in order to proxy execution through it with any binary. Can be used to bypass application whitelisting.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+4Tue Jun 14windows