Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Access of Sudoers File Content

Detects the execution of a text-based file access or inspection utilities to read the content of /etc/sudoers in order to potentially list all users that have sudo rights.

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client Configurations
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionhighexperimental

Script Interpreter Spawning Credential Scanner - Linux

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets, as seen in the "Shai-Hulud: The Second Coming" campaign.

LinuxProcess Creation
TA0006 · Credential AccessT1552 · Unsecured CredentialsTA0002 · ExecutionTA0009 · Collection+2
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 25linux
Detectionhightest

Shell Execution Of Process Located In Tmp Directory

Detects execution of shells from a parent process located in a temporary (/tmp) directory

LinuxProcess Creation
TA0002 · Execution
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Execution Of Script Located In Potentially Suspicious Directory

Detects executions of scripts located in potentially suspicious locations such as "/tmp" via a shell such as "bash", "sh", etc.

LinuxProcess Creation
TA0002 · Execution
Joseliyo SanchezFri Jun 02linux
Detectionhightest

Triple Cross eBPF Rootkit Execve Hijack

Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionmediumtest

User Has Been Deleted Via Userdel

Detects execution of the "userdel" binary. Which is used to delete a user account and related files. This is sometimes abused by threat actors in order to cover their tracks

LinuxProcess Creation
TA0040 · ImpactT1531 · Account Access Removal
Tuan Le (NCSGroup)Mon Dec 26linux
Detectionhightest

Vim GTFOBin Abuse - Linux

Detects the use of "vim" and it's siblings commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionmediumtest

Potential Xterm Reverse Shell

Detects usage of "xterm" as a potential reverse shell tunnel

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
@d4ns4n_Mon Apr 24linux
Detectionlowtest

Startup Item File Created - MacOS

Detects the creation of a startup item plist file, that automatically get executed at boot initialization to establish persistence. Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1037.005 · Startup Items
Alejandro Ortuno+1Wed Oct 14macos
Detectionmediumtest

MacOS Scripting Interpreter AppleScript

Detects execution of AppleScript of the macOS scripting language AppleScript.

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScript
Alejandro Ortuno+1Wed Oct 21macos
Detectionmediumtest

Hidden Flag Set On File/Directory Via Chflags - MacOS

Detects the execution of the "chflags" utility with the "hidden" flag, in order to hide files on MacOS. When a file or directory has this hidden flag set, it becomes invisible to the default file listing commands and in graphical file browsers.

macOSProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Omar KhaledWed Aug 21macos
Detectionhightest

Clipboard Data Collection Via OSAScript

Detects possible collection of data from the clipboard via execution of the osascript binary

macOSProcess Creation
TA0009 · CollectionTA0002 · ExecutionT1115 · Clipboard DataT1059.002 · AppleScript
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionmediumtest

Disk Image Creation Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to create a disk image.

macOSProcess Creation
TA0010 · Exfiltration
Omar KhaledSat Aug 10macos
Detectionmediumtest

Disk Image Mounting Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to mount disk images.

macOSProcess Creation
TA0001 · Initial AccessTA0009 · CollectionT1566.001 · Spearphishing AttachmentT1560.001 · Archive via Utility
Omar KhaledSat Aug 10macos
Detectionmediumtest

Suspicious Installer Package Child Process

Detects the execution of suspicious child processes from macOS installer package parent process. This includes osascript, JXA, curl and wget amongst other interpreters

macOSProcess Creation
T1059 · Command and Scripting InterpreterT1059.007 · JavaScriptT1071 · Application Layer ProtocolT1071.001 · Web Protocols+2
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionmediumtest

JAMF MDM Potential Suspicious Child Process

Detects potential suspicious child processes of "jamf". Could be a sign of potential abuse of Jamf as a C2 server as seen by Typhon MythicAgent.

macOSProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Aug 22macos
Detectionlowtest

JAMF MDM Execution

Detects execution of the "jamf" binary to create user accounts and run commands. For example, the binary can be abused by attackers on the system in order to bypass security controls or remove application control polices.

macOSProcess Creation
TA0002 · Execution
Jay PanditTue Aug 22macos
Detectionhightest

JXA In-memory Execution Via OSAScript

Detects possible malicious execution of JXA in-memory via OSAScript

macOSProcess Creation
T1059.002 · AppleScriptT1059.007 · JavaScriptTA0002 · Execution
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionmediumtest

Launch Agent/Daemon Execution Via Launchctl

Detects the execution of programs as Launch Agents or Launch Daemons using launchctl on macOS.

macOSProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1569.001 · Launchctl+2
Pratinav ChandraMon May 13macos
Detectionmediumtest

File Download Via Nscurl - MacOS

Detects the execution of the nscurl utility in order to download files.

macOSProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Daniel CortezTue Jun 04macos
Detectionhightest

Suspicious Microsoft Office Child Process - MacOS

Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution

macOSProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059.002 · AppleScriptT1137.002 · Office Test+1
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionhightest

OSACompile Run-Only Execution

Detects potential suspicious run-only executions compiled using OSACompile

macOSProcess Creation
T1059.002 · AppleScriptTA0002 · Execution
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionmediumtest

Payload Decoded and Decrypted via Built-in Utilities

Detects when a built-in utility is used to decode and decrypt a payload after a macOS disk image (DMG) is executed. Malware authors may attempt to evade detection and trick users into executing malicious code by encoding and encrypting their payload and placing it in a disk image file. This behavior is consistent with adware or malware families such as Bundlore and Shlayer.

macOSProcess Creation
T1059 · Command and Scripting InterpreterT1204 · User ExecutionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+3
Tim Rauch+1Mon Oct 17macos
Detectionmediumexperimental

Remote Access Tool - Potential MeshAgent Execution - MacOS

Detects potential execution of MeshAgent which is a tool used for remote access. Historical data shows that threat actors rename MeshAgent binary to evade detection. Matching command lines with the '--meshServiceName' argument can indicate that the MeshAgent is being used for remote access.

macOSProcess Creation
TA0011 · Command and Controlattack.t1219.002
Norbert Jaśniewicz (AlphaSOC)Mon May 19macos
Detectionhighexperimental

Remote Access Tool - Renamed MeshAgent Execution - MacOS

Detects the execution of a renamed instance of the Remote Monitoring and Management (RMM) tool, MeshAgent. RMM tools such as MeshAgent are commonly utilized by IT administrators for legitimate remote support and system management. However, malicious actors may exploit these tools by renaming them to bypass detection mechanisms, enabling unauthorized access and control over compromised systems.

macOSProcess Creation
TA0011 · Command and ControlTA0005 · Defense Evasionattack.t1219.002T1036.003 · Rename System Utilities
Norbert Jaśniewicz (AlphaSOC)Mon May 19macos
Detectionmediumtest

Scheduled Cron Task/Job - MacOs

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

macOSProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.003 · Cron
Alejandro Ortuno+1Tue Oct 06macos
Detectionmediumtest

Osacompile Execution By Potentially Suspicious Applet/Osascript

Detects potential suspicious applet or osascript executing "osacompile".

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScript
Sohan G (D4rkCiph3r)+1Mon Apr 03macos
Detectionmediumtest

Suspicious Browser Child Process - MacOS

Detects suspicious child processes spawned from browsers. This could be a result of a potential web browser exploitation.

macOSProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1189 · Drive-by CompromiseT1203 · Exploitation for Client Execution+1
Sohan G (D4rkCiph3r)Wed Apr 05macos
Detectionmediumtest

Suspicious Execution via macOS Script Editor

Detects when the macOS Script Editor utility spawns an unusual child process.

macOSProcess Creation
T1566 · PhishingT1566.002 · Spearphishing LinkTA0001 · Initial AccessT1059 · Command and Scripting Interpreter+7
Tim Rauch+1Fri Oct 21macos
Detectionmediumtest

Potential Discovery Activity Using Find - MacOS

Detects usage of "find" binary in a suspicious manner to perform discovery

macOSProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28macos
Detectionmediumtest

Potential In-Memory Download And Compile Of Payloads

Detects potential in-memory downloading and compiling of applets using curl and osacompile as seen used by XCSSET malware

macOSProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1059.007 · JavaScriptT1105 · Ingress Tool Transfer
Sohan G (D4rkCiph3r)+1Tue Aug 22macos
Detectionmediumtest

System Information Discovery Via Sysctl - MacOS

Detects the execution of "sysctl" with specific arguments that have been used by threat actors and malware. It provides system hardware information. This process is primarily used to detect and avoid virtualization and analysis environments.

macOSProcess Creation
TA0005 · Defense EvasionT1497.001 · System ChecksTA0007 · DiscoveryT1082 · System Information Discovery
Pratinav ChandraMon May 27macos
Detectionmediumtest

System Information Discovery Using System_Profiler

Detects the execution of "system_profiler" with specific "Data Types" that have been seen being used by threat actors and malware. It provides system hardware and software configuration information. This process is primarily used for system information discovery. However, "system_profiler" can also be used to determine if virtualization software is being run for defense evasion purposes.

macOSProcess Creation
TA0007 · DiscoveryTA0005 · Defense EvasionT1082 · System Information DiscoveryT1497.001 · System Checks
Stephen Lincoln (AttackIQ)Tue Jan 02macos
Detectionhightest

Potential Base64 Decoded From Images

Detects the use of tail to extract bytes at an offset from an image and then decode the base64 value to create a new file with the decoded content. The detected execution is a bash one-liner.

macOSProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Joseliyo SanchezWed Dec 20macos
Detectionhightest

Potential WizardUpdate Malware Infection

Detects the execution traces of the WizardUpdate malware. WizardUpdate is a macOS trojan that attempts to infiltrate macOS machines to steal data and it is associated with other types of malicious payloads, increasing the chances of multiple infections on a device.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionmediumtest

Potential XCSSET Malware Infection

Identifies the execution traces of the XCSSET malware. XCSSET is a macOS trojan that primarily spreads via Xcode projects and maliciously modifies applications. Infected users are also vulnerable to having their credentials, accounts, and other vital data stolen.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionmediumtest

Cisco Modify Configuration

Modifications to a config that will serve an adversary's impacts or persistence

Ciscoaaa
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0040 · Impact+4
Austin ClarkMon Aug 12network
Detectionhightest

DNS TXT Answer with Possible Execution Strings

Detects strings used in command execution in DNS TXT Answer

dns
TA0011 · Command and ControlT1071.004 · DNS
Markus NeisWed Aug 08network
Detectionmediumtest

MITRE BZAR Indicators for Execution

Windows DCE-RPC functions which indicate an execution techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE

Zeek (Bro)dce_rpc
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1047 · Windows Management Instrumentation+2
@neu5ron+1Thu Mar 19network
Detectionlowtest

DNS Events Related To Mining Pools

Identifies clients that may be performing DNS lookups associated with common currency mining pools.

Zeek (Bro)dns
TA0002 · ExecutionT1569.002 · Service ExecutionTA0040 · ImpactT1496 · Resource Hijacking
Saw Winn Naung+1Thu Aug 19network
Detectionmediumtest

Remote Task Creation via ATSVC Named Pipe - Zeek

Detects remote task creation via at.exe or API interacting with ATSVC namedpipe

Zeek (Bro)smb_files
TA0004 · Privilege EscalationTA0002 · ExecutionTA0008 · Lateral MovementTA0003 · Persistence+3
Samir BousseadenFri Apr 03network
Detectionhightest

Suspicious PsExec Execution - Zeek

detects execution of psexec or paexec with renamed service name, this rule helps to filter out the noise if psexec is used for legit purposes or if attacker uses a different psexec client other than sysinternal one

Zeek (Bro)smb_files
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Samir Bousseaden+1Thu Apr 02network
Detectionlowtest

Download From Suspicious TLD - Blacklist

Detects download of certain file types from hosts in suspicious TLDs

Proxy Log
TA0001 · Initial AccessT1566 · PhishingTA0002 · ExecutionT1203 · Exploitation for Client Execution+1
Florian Roth (Nextron Systems)Tue Nov 07web
Detectionlowtest

Download From Suspicious TLD - Whitelist

Detects executable downloads from suspicious remote systems

Proxy Log
TA0001 · Initial AccessT1566 · PhishingTA0002 · ExecutionT1203 · Exploitation for Client Execution+1
Florian Roth (Nextron Systems)Mon Mar 13web
Detectionmediumtest

F5 BIG-IP iControl Rest API Command Execution - Proxy

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 08web
Detectionhightest

Flash Player Update from Suspicious Location

Detects a flashplayer update from an unofficial location

Proxy Log
TA0001 · Initial AccessT1189 · Drive-by CompromiseTA0002 · ExecutionT1204.002 · Malicious File+2
Florian Roth (Nextron Systems)Wed Oct 25web
Detectionhightest

Suspicious External WebDAV Execution

Detects executables launched from external WebDAV shares using the WebDAV Explorer integration, commonly seen in initial access campaigns.

Proxy Log
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing
Ahmed FaroukFri May 10web
Detectionmediumtest

F5 BIG-IP iControl Rest API Command Execution - Webserver

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

Web Server Log
TA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationTA0001 · Initial Access
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 08web