Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Potentially Suspicious File Download From File Sharing Domain Via PowerShell.EXE

Detects potentially suspicious file downloads from file sharing domains using PowerShell.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Feb 23windows
Detectionhightest

DSInternals Suspicious PowerShell Cmdlets

Detects execution and usage of the DSInternals PowerShell module. Which can be used to perform what might be considered as suspicious activity such as dumping DPAPI backup keys or manipulating NTDS.DIT files. The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)+1Wed Jun 26windows
Detectionmediumtest

Suspicious Execution of Powershell with Base64

Commandline to launch powershell with a base64 payload

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Jan 02windows
Detectionlowtest

Potential Encoded PowerShell Patterns In CommandLine

Detects specific combinations of encoding methods in PowerShell via the commandline

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Teymur Kheirkhabarov+3Sun Oct 11windows
Detectionmediumtest

Powershell Inline Execution From A File

Detects inline execution of PowerShell code from a file

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Dec 25windows
Detectionmediumtest

Certificate Exported Via PowerShell

Detects calls to cmdlets that are used to export certificates from the local certificate store. Threat actors were seen abusing this to steal private keys from compromised machines.

WindowsProcess Creation
TA0006 · Credential AccessTA0002 · ExecutionT1552.004 · Private KeysT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Thu May 18windows
Detectionhightest

Base64 Encoded PowerShell Command Detected

Detects usage of the "FromBase64String" function in the commandline which is used to decode a base64 encoded string

WindowsProcess Creation
T1027 · Obfuscated Files or InformationTA0005 · Defense EvasionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+1
Florian Roth (Nextron Systems)Wed Jan 29windows
Detectionhightest

Suspicious PowerShell IEX Execution Patterns

Detects suspicious ways to run Invoke-Execution using IEX alias

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Thu Mar 24windows
Detectionmediumtest

Import PowerShell Modules From Suspicious Directories - ProcCreation

Detects powershell scripts that import modules from suspicious directories

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Jan 10windows
Detectionmediumtest

Suspicious Invoke-WebRequest Execution With DirectIP

Detects calls to PowerShell with Invoke-WebRequest cmdlet using direct IP access

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Fri Apr 21windows
Detectionhightest

Suspicious Invoke-WebRequest Execution

Detects a suspicious call to Invoke-WebRequest cmdlet where the and output is located in a suspicious location

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionhightest

Malicious PowerShell Commandlets - ProcessCreation

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsProcess Creation
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionlowtest

Non Interactive PowerShell Process Spawned

Detects non-interactive PowerShell activity by looking at the "powershell" process with a non-user GUI process such as "explorer.exe" as a parent.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Roberto Rodriguez (Cyb3rWard0g)+1Thu Sep 12windows
Detectionhightest

Potential PowerShell Obfuscation Via WCHAR/CHAR

Detects suspicious encoded character syntax often used for defense evasion

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Thu Jul 09windows
Detectionhightest

Execution of Powershell Script in Public Folder

This rule detects execution of PowerShell scripts located in the "C:\Users\Public" folder

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Max Altgelt (Nextron Systems)Wed Apr 06windows
Detectionhightest

RemoteFXvGPUDisablement Abuse Via AtomicTestHarnesses

Detects calls to the AtomicTestHarnesses "Invoke-ATHRemoteFXvGPUDisablementCommand" which is designed to abuse the "RemoteFXvGPUDisablement.exe" binary to run custom PowerShell code via module load-order hijacking.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautTue Jul 13windows
Detectionhighstable

Potential Powershell ReverseShell Connection

Detects usage of the "TcpClient" class. Which can be abused to establish remote connections and reverse-shells. As seen used by the Nishang "Invoke-PowerShellTcpOneLine" reverse shell and other.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
FPT.EagleEye+2Wed Mar 03windows
Detectionhightest

Run PowerShell Script from ADS

Detects PowerShell script execution from Alternate Data Stream (ADS)

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Sergey Soldatov+2Wed Oct 30windows
Detectionhightest

Run PowerShell Script from Redirected Input Stream

Detects PowerShell script execution via input stream redirect

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Moriarty Meng+2Sat Oct 17windows
Detectionmediumtest

Suspicious PowerShell Invocation From Script Engines

Detects suspicious powershell invocations from interpreters or unusual programs

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionhightest

PowerShell Script Change Permission Via Set-Acl

Detects PowerShell execution to set the ACL of a file or a folder

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Oct 18windows
Detectionmediumtest

Change PowerShell Policies to an Insecure Level

Detects changing the PowerShell script execution policy to a potentially insecure level using the "-ExecutionPolicy" flag.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautMon Nov 01windows
Detectionmediumtest

Service StartupType Change Via PowerShell Set-Service

Detects the use of the PowerShell "Set-Service" cmdlet to change the startup type of a service to "disabled" or "manual"

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Sat Mar 04windows
Detectionhightest

Exchange PowerShell Snap-Ins Usage

Detects adding and using Exchange PowerShell snap-ins to export mailbox data. As seen used by HAFNIUM and APT27

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0009 · CollectionT1114 · Email Collection
FPT.EagleEye+1Wed Mar 03windows
Detectionhightest

Suspicious PowerShell Download and Execute Pattern

Detects suspicious PowerShell download patterns that are often used in malicious scripts, stagers or downloaders (make sure that your backend applies the strings case-insensitive)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Feb 28windows
Detectionhightest

Suspicious PowerShell Parameter Substring

Detects suspicious PowerShell invocation with a parameter substring

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionhightest

Suspicious PowerShell Parent Process

Detects a suspicious or uncommon parent processes of PowerShell

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Teymur Kheirkhabarov+1Fri Mar 20windows
Detectionmediumtest

PowerShell Script Run in AppData

Detects a suspicious command line execution that invokes PowerShell with reference to an AppData folder

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 09windows
Detectionhightest

Net WebClient Casing Anomalies

Detects PowerShell command line contents that include a suspicious abnormal casing in the Net.Webclient (e.g. nEt.WEbCliEnT) string as used in obfuscation techniques

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue May 24windows
Detectionmediumtest

Suspicious XOR Encoded PowerShell Command

Detects presence of a potentially xor encoded powershell command

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1140 · Deobfuscate/Decode Files or Information+1
Sami Ruohonen+6Wed Sep 05windows
Detectionmediumtest

Arbitrary File Download Via PresentationHost.EXE

Detects usage of "PresentationHost" which is a utility that runs ".xbap" (Browser Applications) files to download arbitrary files

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

XBAP Execution From Uncommon Locations Via PresentationHost.EXE

Detects the execution of ".xbap" (Browser Applications) files via PresentationHost.EXE from an uncommon location. These files can be abused to run malicious ".xbap" files any bypass AWL

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jul 01windows
Detectionmediumtest

Visual Studio NodejsTools PressAnyKey Arbitrary Binary Execution

Detects child processes of Microsoft.NodejsTools.PressAnyKey.exe that can be used to execute any other binary

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionmediumtest

Potential Provlaunch.EXE Binary Proxy Execution Abuse

Detects child processes of "provlaunch.exe" which might indicate potential abuse to proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Aug 08windows
Detectionhightest

Suspicious Provlaunch.EXE Child Process

Detects suspicious child processes of "provlaunch.exe" which might indicate potential abuse to proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Aug 08windows
Detectionmediumtest

Screen Capture Activity Via Psr.EXE

Detects execution of Windows Problem Steps Recorder (psr.exe), a utility used to record the user screen and clicks.

WindowsProcess Creation
TA0009 · CollectionT1113 · Screen Capture
Beyu Denis+1Sat Oct 12windows
Detectionhightest

PUA - 3Proxy Execution

Detects the use of 3proxy, a tiny free proxy server

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Florian Roth (Nextron Systems)Tue Sep 13windows
Detectionmediumexperimental

PUA - AdFind.EXE Execution

Detects execution of Adfind.exe utility, which can be used for reconnaissance in an Active Directory environment

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain Account
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 26windows
Detectionhightest

PUA - AdFind Suspicious Execution

Detects AdFind execution with common flags seen used during attacks

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System DiscoveryT1087.002 · Domain AccountT1482 · Domain Trust Discovery+2
Janantha Marasinghe+3Tue Feb 02windows
Detectionmediumtest

PUA - Advanced IP Scanner Execution

Detects the use of Advanced IP Scanner. Seems to be a popular tool for ransomware groups.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service DiscoveryT1135 · Network Share Discovery
Nasreddine Bencherchali (Nextron Systems)Tue May 12windows
Detectionmediumtest

PUA - Advanced Port Scanner Execution

Detects the use of Advanced Port Scanner.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service DiscoveryT1135 · Network Share Discovery
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionmediumtest

PUA - AdvancedRun Execution

Detects the execution of AdvancedRun utility

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1564.003 · Hidden Window+2
Florian Roth (Nextron Systems)Thu Jan 20windows
Detectionhightest

PUA - AdvancedRun Suspicious Execution

Detects the execution of AdvancedRun utility in the context of the TrustedInstaller, SYSTEM, Local Service or Network Service accounts

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.002 · Create Process with Token
Florian Roth (Nextron Systems)Thu Jan 20windows
Detectionhightest

PUA - Chisel Tunneling Tool Execution

Detects usage of the Chisel tunneling tool via the commandline arguments

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Florian Roth (Nextron Systems)Tue Sep 13windows
Detectionhightest

PUA - CleanWipe Execution

Detects the use of CleanWipe a tool usually used to delete Symantec antivirus.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionhightest

PUA - Crassus Execution

Detects Crassus, a Windows privilege escalation discovery tool, based on PE metadata characteristics.

WindowsProcess Creation
TA0007 · DiscoveryTA0043 · ReconnaissanceT1590.001 · Domain Properties
Martin MuellerMon Apr 17windows
Detectionhightest

PUA - CsExec Execution

Detects the use of the lesser known remote execution tool named CsExec a PsExec alternative

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · MalwareTA0002 · ExecutionT1569.002 · Service Execution
Florian Roth (Nextron Systems)Mon Aug 22windows
Detectionhightest

PUA - DefenderCheck Execution

Detects the use of DefenderCheck, a tool to evaluate the signatures used in Microsoft Defender. It can be used to figure out the strings / byte chains used in Microsoft Defender to detect a tool and thus used for AV evasion.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.005 · Indicator Removal from Tools
Florian Roth (Nextron Systems)Tue Aug 30windows