Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Renamed NirCmd.EXE Execution

Detects the execution of a renamed "NirCmd.exe" binary based on the PE metadata fields.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
X__Junior (Nextron Systems)Mon Mar 11windows
Detectionhightest

Renamed Office Binary Execution

Detects the execution of a renamed office binary

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Nasreddine Bencherchali (Nextron Systems)Tue Dec 20windows
Detectionhightest

Renamed PAExec Execution

Detects execution of renamed version of PAExec. Often used by attackers

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)+1Sat May 22windows
Detectionhightest

Renamed PingCastle Binary Execution

Detects the execution of a renamed "PingCastle" binary based on the PE metadata fields.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)+1Thu Jan 11windows
Detectionhightest

Renamed Plink Execution

Detects the execution of a renamed version of the Plink binary

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Nasreddine Bencherchali (Nextron Systems)Mon Jun 06windows
Detectionmediumtest

Visual Studio NodejsTools PressAnyKey Renamed Execution

Detects renamed execution of "Microsoft.NodejsTools.PressAnyKey.exe", which can be abused as a LOLBIN to execute arbitrary binaries

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Apr 11windows
Detectionhightest

Potential Renamed Rundll32 Execution

Detects when 'DllRegisterServer' is called in the commandline and the image is not rundll32. This could mean that the 'rundll32' utility has been renamed in order to avoid detection

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Aug 22windows
Detectionmediumtest

Renamed Remote Utilities RAT (RURAT) Execution

Detects execution of renamed Remote Utilities (RURAT) via Product PE header field

WindowsProcess Creation
TA0005 · Defense EvasionTA0009 · CollectionTA0011 · Command and ControlTA0007 · Discovery+1
Nasreddine Bencherchali (Nextron Systems)Mon Sep 19windows
Detectionhighexperimental

Renamed Schtasks Execution

Detects the execution of renamed schtasks.exe binary, which is a legitimate Windows utility used for scheduling tasks. One of the very common persistence techniques is schedule malicious tasks using schtasks.exe. Since, it is heavily abused, it is also heavily monitored by security products. To evade detection, threat actors may rename the schtasks.exe binary to schedule their malicious tasks.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionhightest

Renamed SysInternals DebugView Execution

Detects suspicious renamed SysInternals DebugView execution

WindowsProcess Creation
TA0042 · Resource DevelopmentT1588.002 · Tool
Florian Roth (Nextron Systems)Thu May 28windows
Detectionhightest

Renamed ProcDump Execution

Detects the execution of a renamed ProcDump executable. This often done by attackers or malware in order to evade defensive mechanisms.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Florian Roth (Nextron Systems)+1Mon Nov 18windows
Detectionhightest

Renamed PsExec Service Execution

Detects suspicious launch of a renamed version of the PSEXESVC service with, which is not often used by legitimate administrators

WindowsProcess Creation
TA0002 · Execution
Florian Roth (Nextron Systems)Thu Jul 21windows
Detectionhightest

Renamed Sysinternals Sdelete Execution

Detects the use of a renamed SysInternals Sdelete, which is something an administrator shouldn't do (the renaming)

WindowsProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Florian Roth (Nextron Systems)Tue Sep 06windows
Detectionhightest

Renamed Vmnat.exe Execution

Detects renamed vmnat.exe or portable version that can be used for DLL side-loading

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
elhoimFri Sep 09windows
Detectioncriticaltest

Renamed Whoami Execution

Detects the execution of whoami that has been renamed to a different name to avoid detection

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Thu Aug 12windows
Detectionmediumtest

Ruby Inline Command Execution

Detects execution of ruby using the "-e" flag. This is could be used as a way to launch a reverse shell or execute live ruby code.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionhightest

Potential Rundll32 Execution With DLL Stored In ADS

Detects execution of rundll32 where the DLL being called is stored in an Alternate Data Stream (ADS).

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Harjot SinghSat Jan 21windows
Detectionhightest

Suspicious Advpack Call Via Rundll32.EXE

Detects execution of "rundll32" calling "advpack.dll" with potential obfuscated ordinal calls in order to leverage the "RegisterOCX" function

WindowsProcess Creation
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)+1Wed May 17windows
Detectionmediumtest

Rundll32 InstallScreenSaver Execution

An attacker may execute an application as a SCR File using rundll32.exe desk.cpl,InstallScreenSaver

WindowsProcess Creation
T1218.011 · Rundll32TA0005 · Defense Evasion
Christopher Peacock+2Thu Apr 28windows
Detectionhightest

Mshtml.DLL RunHTMLApplication Suspicious Usage

Detects execution of commands that leverage the "mshtml.dll" RunHTMLApplication export to run arbitrary code via different protocol handlers (vbscript, javascript, file, http...)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)+4Sun Aug 14windows
Detectionhightest

Rundll32 Execution Without CommandLine Parameters

Detects suspicious start of rundll32.exe without any parameters as found in CobaltStrike beacon activity

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)Thu May 27windows
Detectionmediumtest

Potential Obfuscated Ordinal Call Via Rundll32

Detects execution of "rundll32" with potential obfuscated ordinal calls

WindowsProcess Creation
TA0005 · Defense EvasionT1027.010 · Command Obfuscation
Nasreddine Bencherchali (Nextron Systems)+1Wed May 17windows
Detectionmediumtest

Rundll32 Spawned Via Explorer.EXE

Detects execution of "rundll32.exe" with a parent process of Explorer.exe. This has been observed by variants of Raspberry Robin, as first reported by Red Canary.

WindowsProcess Creation
TA0005 · Defense Evasion
CD_ROM_Sat May 21windows
Detectionhightest

Shell32 DLL Execution in Suspicious Directory

Detects shell32.dll executing a DLL in a suspicious directory

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32
Christian Burkard (Nextron Systems)Wed Nov 24windows
Detectionmediumtest

Potential ShellDispatch.DLL Functionality Abuse

Detects potential "ShellDispatch.dll" functionality abuse to execute arbitrary binaries via "ShellExecute"

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
X__Junior (Nextron Systems)Tue Jun 20windows
Detectionmediumtest

Potentially Suspicious Rundll32 Activity

Detects suspicious execution of rundll32, with specific calls to some DLLs with known LOLBIN functionalities

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
juju4+3Wed Jan 16windows
Detectionhightest

Suspicious Control Panel DLL Load

Detects suspicious Rundll32 execution from control.exe as used by Equation Group and Exploit Kits

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Florian Roth (Nextron Systems)Sat Apr 15windows
Detectionhightest

Suspicious Rundll32 Execution With Image Extension

Detects the execution of Rundll32.exe with DLL files masquerading as image files

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Hieu TranMon Mar 13windows
Detectionhightest

Suspicious Usage Of ShellExec_RunDLL

Detects suspicious usage of the ShellExec_RunDLL function to launch other commands as seen in the the raspberry-robin attack

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Detectionhightest

Suspicious ShellExec_RunDLL Call Via Ordinal

Detects suspicious call to the "ShellExec_RunDLL" exported function of SHELL32.DLL through the ordinal number to launch other commands. Adversary might only use the ordinal number in order to bypass existing detection that alert on usage of ShellExec_RunDLL on CommandLine.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Swachchhanda Shrawan PoudelSun Dec 01windows
Detectionmediumtest

Potentially Suspicious Rundll32.EXE Execution of UDL File

Detects the execution of rundll32.exe with the oledb32.dll library to open a UDL file. Threat actors can abuse this technique as a phishing vector to capture authentication credentials or other sensitive data.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0011 · Command and ControlT1218.011 · Rundll32+1
kostastsaleFri Aug 16windows
Detectionhightest

Rundll32 UNC Path Execution

Detects rundll32 execution where the DLL is located on a remote location (share)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares+1
Nasreddine Bencherchali (Nextron Systems)Wed Aug 10windows
Detectionmediumtest

Rundll32 Execution With Uncommon DLL Extension

Detects the execution of rundll32 with a command line that doesn't contain a common extension

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Tim Shelton+2Thu Jan 13windows
Detectionmediumtest

WebDav Client Execution Via Rundll32.EXE

Detects "svchost.exe" spawning "rundll32.exe" with command arguments like "C:\windows\system32\davclnt.dll,DavSetCookie". This could be an indicator of exfiltration or use of WebDav to launch code (hosted on a WebDav server).

WindowsProcess Creation
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Suspicious WebDav Client Execution Via Rundll32.EXE

Detects "svchost.exe" spawning "rundll32.exe" with command arguments like C:\windows\system32\davclnt.dll,DavSetCookie. This could be an indicator of exfiltration or use of WebDav to launch code (hosted on WebDav Server) or potentially a sign of exploitation of CVE-2023-23397

WindowsProcess Creation
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocolcve.2023-23397
Nasreddine Bencherchali (Nextron Systems)+1Thu Mar 16windows
Detectionhightest

Rundll32 Execution Without Parameters

Detects rundll32 execution without parameters as observed when running Metasploit windows/smb/psexec exploit module

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesT1570 · Lateral Tool TransferTA0002 · Execution+1
Bartlomiej Czyz+1Sun Jan 31windows
Detectionlowtest

Run Once Task Execution as Configured in Registry

This rule detects the execution of Run Once task as configured in the registry

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Avneet Singh+2Sun Oct 18windows
Detectionmediumtest

Service StartupType Change Via Sc.EXE

Detect the use of "sc.exe" to change the startup type of a service to "disabled" or "demand"

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Mon Aug 01windows
Detectionhightest

Suspicious Schtasks Execution AppData Folder

Detects the creation of a schtask that executes a file from C:\Users\<USER>\AppData\Local

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+1Tue Mar 15windows
Detectionhightest

Suspicious Modification Of Scheduled Tasks

Detects when an attacker tries to modify an already existing scheduled tasks to run from a suspicious location Attackers can create a simple looking task in order to avoid detection on creation as it's often the most focused on Instead they modify the task after creation to include their malicious payload

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Thu Jul 28windows
Detectionlowtest

Scheduled Task Creation Via Schtasks.EXE

Detects the creation of scheduled tasks by user accounts via the "schtasks" utility.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+3
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionhightest

Suspicious Scheduled Task Creation Involving Temp Folder

Detects the creation of scheduled tasks that involves a temporary folder and runs only once

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Thu Mar 11windows
Detectionmediumexperimental

Scheduled Task Creation with Curl and PowerShell Execution Combo

Detects the creation of a scheduled task using schtasks.exe, potentially in combination with curl for downloading payloads and PowerShell for executing them. This facilitates executing malicious payloads or connecting with C&C server persistently without dropping the malware sample on the host.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+4
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionmediumtest

Schedule Task Creation From Env Variable Or Potentially Suspicious Path Via Schtasks.EXE

Detects Schtask creations that point to a suspicious folder or an environment variable often used by malware

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Mon Feb 21windows
Detectionhightest

Schtasks From Suspicious Folders

Detects scheduled task creations that have suspicious action command and folder combinations

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Fri Apr 15windows
Detectionmediumtest

Suspicious Scheduled Task Name As GUID

Detects creation of a scheduled task with a GUID like name

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Oct 31windows
Detectionhightest

Uncommon One Time Only Scheduled Task At 00:00

Detects scheduled task creation events that include suspicious actions, and is run once at 00:00

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task
Martin MuellerFri Jul 15windows
Detectionhighexperimental

Potential SSH Tunnel Persistence Install Using A Scheduled Task

Detects the creation of new scheduled tasks via commandline, using Schtasks.exe. This rule detects tasks creating that call OpenSSH, which may indicate the creation of reverse SSH tunnel to the attacker's server.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task+1
Rory DuncanMon Jul 14windows