Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Use of Scriptrunner.exe

The "ScriptRunner.exe" binary can be abused to proxy execution through it and bypass possible whitelisting

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jul 01windows
Detectionhightest

Using SettingSyncHost.exe as LOLBin

Detects using SettingSyncHost.exe to run hijacked binary

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense Evasion+1
Anton Kutepov+1Wed Feb 05windows
Detectionmediumtest

Use Of The SFTP.EXE Binary As A LOLBIN

Detects the usage of the "sftp.exe" binary as a LOLBIN by abusing the "-D" flag

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Thu Nov 10windows
Detectionhightest

Suspicious GrpConv Execution

Detects the suspicious execution of a utility to convert Windows 3.x .grp files or for persistence purposes by malicious software or actors

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
Florian Roth (Nextron Systems)Thu May 19windows
Detectionmediumtest

Potential DLL Injection Or Execution Using Tracker.exe

Detects potential DLL injection and execution using "Tracker.exe"

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.001 · Dynamic-link Library Injection
Avneet Singh+1Sun Oct 18windows
Detectionmediumtest

Potential Register_App.Vbs LOLScript Abuse

Detects potential abuse of the "register_app.vbs" script that is part of the Windows SDK. The script offers the capability to register new VSS/VDS Provider as a COM+ application. Attackers can use this to install malicious DLLs for persistence and execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Austin SongerFri Nov 05windows
Detectionhightest

MMC20 Lateral Movement

Detects MMC20.Application Lateral Movement; specifically looks for the spawning of the parent MMC.exe with a command line of "-Embedding" as a child of svchost.exe

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
(Security Risk Advisors) - rule; Teymur KheirkhabarovWed Mar 04windows
Detectionhighexperimental

MMC Executing Files with Reversed Extensions Using RTLO Abuse

Detects malicious behavior where the MMC utility (`mmc.exe`) executes files with reversed extensions caused by Right-to-Left Override (RLO) abuse, disguising them as document formats.

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious FileTA0005 · Defense EvasionT1218.014 · MMC+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionhightest

Potential Suspicious Mofcomp Execution

Detects execution of the "mofcomp" utility as a child of a suspicious shell or script running utility or by having a suspicious path in the commandline. The "mofcomp" utility parses a file containing MOF statements and adds the classes and class instances defined in the file to the WMI repository. Attackers abuse this utility to install malicious MOF scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionmediumtest

Suspicious Msbuild Execution By Uncommon Parent Process

Detects suspicious execution of 'Msbuild.exe' by a uncommon parent process

WindowsProcess Creation
TA0005 · Defense Evasion
François HubautThu Nov 17windows
Detectionhightest

MSDT Execution Via Answer File

Detects execution of "msdt.exe" using an answer file which is simulating the legitimate way of calling msdt via "pcwrun.exe" (For example from the compatibility tab).

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jun 13windows
Detectionhightest

Potential Arbitrary Command Execution Using Msdt.EXE

Detects processes leveraging the "ms-msdt" handler or the "msdt.exe" binary to execute arbitrary commands as seen in the follina (CVE-2022-30190) vulnerability

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Sun May 29windows
Detectionmediumtest

Suspicious Cabinet File Execution Via Msdt.EXE

Detects execution of msdt.exe using the "cab" flag which could indicates suspicious diagcab files with embedded answer files leveraging CVE-2022-30190

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)+2Tue Jun 21windows
Detectionmediumtest

Arbitrary File Download Via MSEDGE_PROXY.EXE

Detects usage of "msedge_proxy.exe" to download arbitrary files

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Swachchhanda Shrawan PoudelThu Nov 09windows
Detectionhightest

Remotely Hosted HTA File Executed Via Mshta.EXE

Detects execution of the "mshta" utility with an argument containing the "http" keyword, which could indicate that an attacker is executing a remotely hosted malicious hta file

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.005 · Mshta
Nasreddine Bencherchali (Nextron Systems)Mon Aug 08windows
Detectionmediumtest

Wscript Shell Run In CommandLine

Detects the presence of the keywords "Wscript", "Shell" and "Run" in the command, which could indicate a suspicious activity

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Aug 31windows
Detectionhightest

Suspicious JavaScript Execution Via Mshta.EXE

Detects execution of javascript code using "mshta.exe".

WindowsProcess Creation
TA0005 · Defense EvasionT1218.005 · Mshta
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhightest

Potential LethalHTA Technique Execution

Detects potential LethalHTA technique where the "mshta.exe" is spawned by an "svchost.exe" process

WindowsProcess Creation
TA0005 · Defense EvasionT1218.005 · Mshta
Markus NeisThu Jun 07windows
Detectionhightest

Suspicious MSHTA Child Process

Detects a suspicious process spawning from an "mshta.exe" process, which could be indicative of a malicious HTA script execution

WindowsProcess Creation
TA0005 · Defense EvasionT1218.005 · Mshta2013-02-003 · CAR 2013-02-0032013-03-001 · CAR 2013-03-001+1
Michael HaagWed Jan 16windows
Detectionhightest

MSHTA Execution with Suspicious File Extensions

Detects execution of mshta.exe with file types that looks like they do not typically represent HTA (HTML Application) content, such as .png, .jpg, .zip, .pdf, and others, which are often polyglots. MSHTA is a legitimate Windows utility for executing HTML Applications containing VBScript or JScript. Threat actors often abuse this lolbin utility to download and execute malicious scripts disguised as benign files or hosted under misleading extensions to evade detection.

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationT1218.005 · MshtaTA0002 · Execution+2
Diego Perez+3Fri Feb 22windows
Detectionhightest

Suspicious Mshta.EXE Execution Patterns

Detects suspicious mshta process execution patterns

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native API
Florian Roth (Nextron Systems)+1Sat Jul 17windows
Detectionmediumtest

Suspicious MsiExec Embedding Parent

Adversaries may abuse msiexec.exe to proxy the execution of malicious payloads

WindowsProcess Creation
T1218.007 · MsiexecTA0005 · Defense Evasion
François HubautSat Apr 16windows
Detectionmediumtest

Suspicious Msiexec Execute Arbitrary DLL

Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi)

WindowsProcess Creation
TA0005 · Defense EvasionT1218.007 · Msiexec
François HubautSun Jan 16windows
Detectionmediumtest

Msiexec Quiet Installation

Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi)

WindowsProcess Creation
TA0005 · Defense EvasionT1218.007 · Msiexec
François HubautSun Jan 16windows
Detectionhightest

Potential MsiExec Masquerading

Detects the execution of msiexec.exe from an uncommon directory

WindowsProcess Creation
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Florian Roth (Nextron Systems)Thu Nov 14windows
Detectionlowexperimental

Windows MSIX Package Support Framework AI_STUBS Execution

Detects execution of Advanced Installer MSIX Package Support Framework (PSF) components, specifically AI_STUBS executables with original filename 'popupwrapper.exe'. This activity may indicate malicious MSIX packages build with Advanced Installer leveraging the Package Support Framework to bypass application control restrictions.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy ExecutionT1553.005 · Mark-of-the-Web Bypass+1
Michael Haag+1Mon Nov 03windows
Detectionmediumtest

Arbitrary File Download Via MSOHTMED.EXE

Detects usage of "MSOHTMED" to download arbitrary files

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

Arbitrary File Download Via MSPUB.EXE

Detects usage of "MSPUB" (Microsoft Publisher) to download arbitrary files

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

Detection of PowerShell Execution via Sqlps.exe

This rule detects execution of a PowerShell code through the sqlps.exe utility, which is included in the standard set of utilities supplied with the MSSQL Server. Script blocks are not logged in this case, so this utility helps to bypass protection mechanisms based on the analysis of these logs.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Agro oscd.communitySat Oct 10windows
Detectionmediumtest

SQL Client Tools PowerShell Session Detection

This rule detects execution of a PowerShell code through the sqltoolsps.exe utility, which is included in the standard set of utilities supplied with the Microsoft SQL Server Management studio. Script blocks are not logged in this case, so this utility helps to bypass protection mechanisms based on the analysis of these logs.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Agro oscd.communitlyTue Oct 13windows
Detectionlowtest

Mstsc.EXE Execution With Local RDP File

Detects potential RDP connection via Mstsc using a local ".rdp" file

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)+1Tue Apr 18windows
Detectionhightest

Suspicious Mstsc.EXE Execution With Local RDP File

Detects potential RDP connection via Mstsc using a local ".rdp" file located in suspicious locations.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionhightest

Mstsc.EXE Execution From Uncommon Parent

Detects potential RDP connection via Mstsc using a local ".rdp" file located in suspicious locations.

WindowsProcess Creation
TA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionmediumtest

Msxsl.EXE Execution

Detects the execution of the MSXSL utility. This can be used to execute Extensible Stylesheet Language (XSL) files. These files are commonly used to describe the processing and rendering of data within XML files. Adversaries can abuse this functionality to execute arbitrary files while potentially bypassing application whitelisting defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1220 · XSL Script Processing
Timur Zinniatullin+1Mon Oct 21windows
Detectionhightest

Remote XSL Execution Via Msxsl.EXE

Detects the execution of the "msxsl" binary with an "http" keyword in the command line. This might indicate a potential remote execution of XSL files.

WindowsProcess Creation
TA0005 · Defense EvasionT1220 · XSL Script Processing
Swachchhanda Shrawan PoudelThu Nov 09windows
Detectionlowtest

Start Windows Service Via Net.EXE

Detects the usage of the "net.exe" command to start a service using the "start" flag

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service Execution
Timur Zinniatullin+2Mon Oct 21windows
Detectionhightest

Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE

Detects Netsh command execution that whitelists a program located in a suspicious location in the Windows Firewall

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Sander Wiebing+3Mon May 25windows
Detectionmediumtest

Firewall Rule Update Via Netsh.EXE

Detects execution of netsh with the "advfirewall" and the "set" option in order to set new values for properties of a existing rule

WindowsProcess Creation
TA0005 · Defense Evasion
X__Junior (Nextron Systems)Tue Jul 18windows
Detectionmediumtest

Potential Persistence Via Netsh Helper DLL

Detects the execution of netsh with "add helper" flag in order to add a custom helper DLL. This technique can be abused to add a malicious helper DLL that can be used as a persistence proxy that gets called when netsh.exe is executed.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.007 · Netsh Helper DLLS0108 · S0108
Victor Sergeev+1Fri Oct 25windows
Detectionmediumtest

New Network Trace Capture Started Via Netsh.EXE

Detects the execution of netsh with the "trace" flag in order to start a network capture

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Kutepov Anton+1Thu Oct 24windows
Detectionmediumtest

New Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+3Tue Jan 29windows
Detectionhightest

RDP Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh to configure a port forwarding of port 3389 (RDP) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+1Tue Jan 29windows
Detectionlowtest

Nltest.EXE Execution

Detects nltest commands that can be used for information discovery

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration DiscoveryT1018 · Remote System DiscoveryT1482 · Domain Trust Discovery
Arun ChauhanFri Feb 03windows
Detectionhightest

Potential Arbitrary Code Execution Via Node.EXE

Detects the execution node.exe which is shipped with multiple software such as VMware, Adobe...etc. In order to execute arbitrary code. For example to establish reverse shell as seen in Log4j attacks...etc

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionmediumtest

Node Process Executions

Detects the execution of other scripts using the Node executable packaged with Adobe Creative Cloud

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1059.007 · JavaScript
Max Altgelt (Nextron Systems)Wed Apr 06windows
Detectionlowexperimental

Notepad Password Files Discovery

Detects the execution of Notepad to open a file that has the string "password" which may indicate unauthorized access to credentials or suspicious activity.

WindowsProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
The DFIR ReportFri Feb 21windows
Detectionmediumtest

Suspicious Usage Of Active Directory Diagnostic Tool (ntdsutil.exe)

Detects execution of ntdsutil.exe to perform different actions such as restoring snapshots...etc.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)Wed Sep 14windows
Detectionmediumtest

Invocation of Active Directory Diagnostic Tool (ntdsutil.exe)

Detects execution of ntdsutil.exe, which can be used for various attacks against the NTDS database (NTDS.DIT)

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Thomas PatzkeWed Jan 16windows