Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

HackTool - UACMe Akagi Execution

Detects the execution of UACMe, a tool used for UAC bypasses, via default PE metadata

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)+1Mon Aug 30windows
Detectioncriticaltest

HackTool - Windows Credential Editor (WCE) Execution

Detects the use of Windows Credential Editor (WCE), a popular post-exploitation tool used to extract plaintext passwords, hash, PIN code and Kerberos tickets from memory. It is often used by threat actors for credential dumping and lateral movement within compromised networks.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0005 · S0005
Florian Roth (Nextron Systems)Tue Dec 31windows
Detectionhightest

HackTool - winPEAS Execution

WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on book.hacktricks.xyz

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryT1082 · System Information DiscoveryT1087 · Account Discovery+1
Georg Lauenstein (sure[secure])Mon Sep 19windows
Detectionhightest

HackTool - WinPwn Execution

Detects commandline keywords indicative of potential usge of the tool WinPwn. A tool for Windows and Active Directory reconnaissance and exploitation.

WindowsProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionTA0007 · DiscoveryTA0002 · Execution+9
Swachchhanda Shrawan PoudelMon Dec 04windows
Detectionhightest

HackTool - Wmiexec Default Powershell Command

Detects the execution of PowerShell with a specific flag sequence that is used by the Wmiexec script

WindowsProcess Creation
TA0005 · Defense EvasionTA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Wed Mar 08windows
Detectionhighexperimental

HackTool - WSASS Execution

Detects execution of WSASS, a tool used to dump LSASS memory on Windows systems by leveraging WER's (Windows Error Reporting) WerFaultSecure.EXE to bypass PPL (Protected Process Light) protections.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan Poudel (Nextron Systems)Sun Nov 23windows
Detectionhightest

HackTool - XORDump Execution

Detects suspicious use of XORDump process memory dumping utility

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)Fri Jan 28windows
Detectionmediumtest

Suspicious ZipExec Execution

ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
François HubautSun Nov 07windows
Detectionlowtest

Suspicious Execution of Hostname

Use of hostname to get information

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
François HubautSat Jan 01windows
Detectionhightest

Suspicious HWP Sub Processes

Detects suspicious Hangul Word Processor (Hanword) sub processes that could indicate an exploitation

WindowsProcess Creation
TA0001 · Initial AccessT1566.001 · Spearphishing AttachmentTA0002 · ExecutionT1203 · Exploitation for Client Execution+2
Florian Roth (Nextron Systems)Thu Oct 24windows
Detectionhightest

File Download And Execution Via IEExec.EXE

Detects execution of the IEExec utility to download and execute files

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Mon May 16windows
Detectionhightest

Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location

Detects the use of iexpress.exe to create binaries via Self Extraction Directive (SED) files located in potentially suspicious locations. This behavior has been observed in-the-wild by different threat actors.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Joseliyo Sanchez+1Mon Feb 05windows
Detectionhightest

ImagingDevices Unusual Parent/Child Processes

Detects unusual parent or children of the ImagingDevices.exe (Windows Contacts) process as seen being used with Bumblebee activity

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Sep 27windows
Detectionhightest

Arbitrary File Download Via IMEWDBLD.EXE

Detects usage of "IMEWDBLD.exe" to download arbitrary files

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Swachchhanda Shrawan PoudelThu Nov 09windows
Detectionmediumtest

InfDefaultInstall.exe .inf Execution

Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautTue Jul 13windows
Detectionmediumtest

Suspicious Execution of InstallUtil Without Log

Uses the .NET InstallUtil.exe application in order to execute image without log

WindowsProcess Creation
TA0005 · Defense Evasion
François HubautSun Jan 23windows
Detectionmediumtest

Java Running with Remote Debugging

Detects a JAVA process running with remote debugging allowing more than just localhost to connect

WindowsProcess Creation
T1203 · Exploitation for Client ExecutionTA0002 · Execution
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionlowtest

JScript Compiler Execution

Detects the execution of the "jsc.exe" (JScript Compiler). Attacker might abuse this in order to compile JScript files on the fly and bypassing application whitelisting.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
François HubautMon May 02windows
Detectionhightest

Kavremover Dropped Binary LOLBIN Usage

Detects the execution of a signed binary dropped by Kaspersky Lab Products Remover (kavremover) which can be abused as a LOLBIN to execute arbitrary commands and binaries.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Nov 01windows
Detectionmediumtest

Windows Kernel Debugger Execution

Detects execution of the Windows Kernel Debugger "kd.exe".

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionmediumtest

Potentially Suspicious Child Process of KeyScrambler.exe

Detects potentially suspicious child processes of KeyScrambler.exe

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege Escalation+2
Swachchhanda Shrawan PoudelMon May 13windows
Detectionmediumtest

Computer Password Change Via Ksetup.EXE

Detects password change for the computer's domain account or host principal via "ksetup.exe"

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Apr 06windows
Detectionmediumtest

Logged-On User Password Change Via Ksetup.EXE

Detects password change for the logged-on user's via "ksetup.exe"

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Apr 06windows
Detectionmediumtest

Active Directory Structure Export Via Ldifde.EXE

Detects the execution of "ldifde.exe" in order to export organizational Active Directory structure.

WindowsProcess Creation
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

Import LDAP Data Interchange Format File Via Ldifde.EXE

Detects the execution of "Ldifde.exe" with the import flag "-i". The can be abused to include HTTP-based arguments which will allow the arbitrary download of files from a remote server.

WindowsProcess Creation
TA0011 · Command and ControlTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1105 · Ingress Tool Transfer
@gott_cyberFri Sep 02windows
Detectionmediumtest

Rebuild Performance Counter Values Via Lodctr.EXE

Detects the execution of "lodctr.exe" to rebuild the performance counter registry values. This can be abused by attackers by providing a malicious config file to overwrite performance counter configuration to confuse and evade monitoring and security solutions.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jun 15windows
Detectionhightest

Suspicious Windows Trace ETW Session Tamper Via Logman.EXE

Detects the execution of "logman" utility in order to disable or delete Windows trace sessions

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1070.001 · Clear Windows Event Logs
Florian Roth (Nextron Systems)Thu Feb 11windows
Detectionmediumtest

Suspicious Diantz Alternate Data Stream Execution

Compress target file into a cab file stored in the Alternate Data Stream (ADS) of the target file.

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautFri Nov 26windows
Detectionmediumtest

Suspicious Extrac32 Execution

Download or Copy file with Extrac32

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautFri Nov 26windows
Detectionmediumtest

Suspicious Extrac32 Alternate Data Stream Execution

Extract data from cab file and hide it in an alternate data stream

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautFri Nov 26windows
Detectionmediumtest

Potential Reconnaissance Activity Via GatherNetworkInfo.VBS

Detects execution of the built-in script located in "C:\Windows\System32\gatherNetworkInfo.vbs". Which can be used to gather information about the target machine

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1615 · Group Policy DiscoveryT1059.005 · Visual Basic
blueteamer8699Mon Jan 03windows
Detectionmediumtest

Gpscript Execution

Detects the execution of the LOLBIN gpscript, which executes logon or startup scripts configured in Group Policy

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautMon May 16windows
Detectionmediumtest

Launch-VsDevShell.PS1 Proxy Execution

Detects the use of the 'Launch-VsDevShell.ps1' Microsoft signed script to execute commands.

WindowsProcess Creation
TA0005 · Defense EvasionT1216.001 · PubPrn
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionhightest

Potential Manage-bde.wsf Abuse To Proxy Execution

Detects potential abuse of the "manage-bde.wsf" script as a LOLBIN to proxy execution

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
oscd.community+2Tue Oct 13windows
Detectionhightest

MpiExec Lolbin

Detects a certain command line flag combination used by mpiexec.exe LOLBIN from HPC pack that can be used to execute any other binary

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Florian Roth (Nextron Systems)Tue Jan 11windows
Detectionmediumtest

Execute Files with Msdeploy.exe

Detects file execution using the msdeploy.exe lolbin

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+1Sun Oct 18windows
Detectionmediumtest

Use of OpenConsole

Detects usage of OpenConsole binary as a LOLBIN to launch other binaries to bypass application Whitelisting

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Thu Jun 16windows
Detectionmediumtest

Use of Pcalua For Execution

Detects execition of commands and binaries from the context of The program compatibility assistant (Pcalua.exe). This can be used as a LOLBIN in order to bypass application whitelisting.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)+3Tue Jun 14windows
Detectionlowtest

Indirect Command Execution By Program Compatibility Wizard

Detect indirect command execution via Program Compatibility Assistant pcwrun.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Execution
A. Sungurov+1Mon Oct 12windows
Detectionhightest

Execute Pcwrun.EXE To Leverage Follina

Detects indirect command execution via Program Compatibility Assistant "pcwrun.exe" leveraging the follina (CVE-2022-30190) vulnerability

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jun 13windows
Detectionmediumtest

Code Execution via Pcwutl.dll

Detects launch of executable by calling the LaunchApplication function from pcwutl.dll library.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Julia Fomina+1Mon Oct 05windows
Detectionmediumtest

Execute Code with Pester.bat as Parent

Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1216 · System Script Proxy Execution
François Hubaut+1Sat Aug 20windows
Detectionmediumtest

Execute Code with Pester.bat

Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1216 · System Script Proxy Execution
Julia Fomina+1Thu Oct 08windows
Detectionhightest

PrintBrm ZIP Creation of Extraction

Detects the execution of the LOLBIN PrintBrm.exe, which can be used to create or extract ZIP files. PrintBrm.exe should not be run on a normal workstation.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool TransferTA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautMon May 02windows
Detectionmediumtest

Pubprn.vbs Proxy Execution

Detects the use of the 'Pubprn.vbs' Microsoft signed script to execute commands.

WindowsProcess Creation
TA0005 · Defense EvasionT1216.001 · PubPrn
François HubautSat May 28windows
Detectionmediumtest

DLL Execution via Rasautou.exe

Detects using Rasautou.exe for loading arbitrary .DLL specified in -d option and executes the export specified in -p.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Julia Fomina+1Fri Oct 09windows
Detectionmediumtest

REGISTER_APP.VBS Proxy Execution

Detects the use of a Microsoft signed script 'REGISTER_APP.VBS' to register a VSS/VDS Provider as a COM+ application.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

Suspicious Runscripthelper.exe

Detects execution of powershell scripts via Runscripthelper.exe

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
Victor Sergeev+1Fri Oct 09windows