Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Threat Huntmediumtest

Curl.EXE Execution With Custom UserAgent

Detects execution of curl.exe with custom useragent options

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocolsdetection.threat-hunting
François HubautSun Jan 23windows
Threat Huntmediumtest

ClickOnce Deployment Execution - Dfsvc.EXE Child Process

Detects child processes of "dfsvc" which indicates a ClickOnce deployment execution.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Huntmediumtest

Diskshadow Child Process Spawned

Detects any child process spawning from "Diskshadow.exe". This could be due to executing Diskshadow in interpreter mode or script mode and using the "exec" flag to launch other applications.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Harjot SinghFri Sep 15windows
Threat Huntmediumtest

Diskshadow Script Mode Execution

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag. Attackers often abuse "diskshadow" to execute scripts that deleted the shadow copies on the systems. Investigate the content of the scripts and its location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Ivan Dyachkov+1Wed Oct 07windows
Threat Huntlowtest

Potential Proxy Execution Via Explorer.EXE From Shell Process

Detects the creation of a child "explorer.exe" process from a shell like process such as "cmd.exe" or "powershell.exe". Attackers can use "explorer.exe" for evading defense mechanisms by proxying the execution through the latter. While this is often a legitimate action, this rule can be use to hunt for anomalies. Muddy Waters threat actor was seeing using this technique.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Furkan CALISKAN+1Mon Oct 05windows
Threat Huntmediumtest

Potential DLL Sideloading Activity Via ExtExport.EXE

Detects the execution of "Extexport.exe".A utility that is part of the Internet Explorer browser and is used to export and import various settings and data, particularly when switching between Internet Explorer and other web browsers like Firefox. It allows users to transfer bookmarks, browsing history, and other preferences from Internet Explorer to Firefox or vice versa. It can be abused as a tool to side load any DLL. If a folder is provided in the command line it'll load any DLL with one of the following names "mozcrt19.dll", "mozsqlite3.dll", or "sqlite.dll". Arbitrary DLLs can also be loaded if a specific number of flags was provided.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
François Hubaut+1Fri Nov 26windows
Threat Huntmediumtest

New Self Extracting Package Created Via IExpress.EXE

Detects the "iexpress.exe" utility creating self-extracting packages. Attackers where seen leveraging "iexpress" to compile packages on the fly via ".sed" files. Investigate the command line options provided to "iexpress" and in case of a ".sed" file, check the contents and legitimacy of it.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Joseliyo SanchezMon Feb 05windows
Threat Huntmediumtest

Microsoft Workflow Compiler Execution

Detects the execution of Microsoft Workflow Compiler, which may permit the execution of arbitrary unsigned code.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1218 · System Binary Proxy Execution+1
Nik Seetharaman+1Wed Jan 16windows
Threat Huntlowtest

Net.EXE Execution

Detects execution of "Net.EXE".

WindowsProcess Creation
TA0007 · DiscoveryT1007 · System Service DiscoveryT1049 · System Network Connections DiscoveryT1018 · Remote System Discovery+10
Michael Haag+2Wed Jan 16windows
Threat Huntmediumtest

Suspicious New Instance Of An Office COM Object

Detects an svchost process spawning an instance of an office application. This happens when the initial word application creates an instance of one of the Office COM objects such as 'Word.Application', 'Excel.Application', etc. This can be used by malicious actors to create malicious Office documents with macros on the fly. (See vba2clr project in the references)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Oct 13windows
Threat Huntlowtest

Unusually Long PowerShell CommandLine

Detects unusually long PowerShell command lines with a length of 1000 characters or more

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
oscd.community+1Tue Oct 06windows
Threat Huntmediumtest

Invocation Of Crypto-Classes From The "Cryptography" PowerShell Namespace

Detects the invocation of PowerShell commands with references to classes from the "System.Security.Cryptography" namespace. The PowerShell namespace "System.Security.Cryptography" provides classes for on-the-fly encryption and decryption. These can be used for example in decrypting malicious payload for defense evasion.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1027.010 · Command Obfuscation+1
Andreas Braathen (mnemonic.io)Fri Dec 01windows
Threat Huntlowtest

Import New Module Via PowerShell CommandLine

Detects usage of the "Import-Module" cmdlet in order to add new Cmdlets to the current PowerShell session

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Threat Huntmediumtest

Potentially Suspicious PowerShell Child Processes

Detects potentially suspicious child processes spawned by PowerShell. Use this rule to hunt for potential anomalies initiating from PowerShell scripts and commands.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Florian Roth (Nextron Systems)+1Tue Apr 26windows
Threat Huntmediumtest

Regsvr32.EXE Calling of DllRegisterServer Export Function Implicitly

Detects execution of regsvr32 with the silent flag and no other flags on a DLL located in an uncommon or potentially suspicious location. When Regsvr32 is called in such a way, it implicitly calls the DLL export function 'DllRegisterServer'.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Andreas Braathen (mnemonic.io)+1Tue Oct 17windows
Threat Huntmediumtest

Remote Access Tool - Action1 Arbitrary Code Execution and Remote Sessions

Detects the execution of Action1 in order to execute arbitrary code or establish a remote session. Action1 is a powerful Remote Monitoring and Management tool that enables users to execute commands, scripts, and binaries. Through the web interface of action1, the administrator must create a new policy or an app to establish remote execution and then points that the agent is installed. Hunting Opportunity 1- Weed Out The Noise When threat actors execute a script, a command, or a binary through these new policies and apps, the names of these become visible in the command line during the execution process. Below is an example of the command line that contains the deployment of a binary through a policy with name "test_app_1": ParentCommandLine: "C:\WINDOWS\Action1\action1_agent.exe schedule:Deploy_App__test_app_1_1681327673425 runaction:0" After establishing a baseline, we can split the command to extract the policy name and group all the policy names and inspect the results with a list of frequency occurrences. Hunting Opportunity 2 - Remote Sessions On Out Of Office Hours If you have admins within your environment using remote sessions to administer endpoints, you can create a threat-hunting query and modify the time of the initiated sessions looking for abnormal activity.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002detection.threat-hunting
kostastsaleThu Apr 13windows
Threat Huntmediumtest

Remote Access Tool - Ammy Admin Agent Execution

Detects the execution of the Ammy Admin RMM agent for remote management.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistencedetection.threat-hunting
kostastsaleMon Aug 05windows
Threat Huntmediumtest

Remote Access Tool - Cmd.EXE Execution via AnyViewer

Detects execution of "cmd.exe" via the AnyViewer RMM agent on a remote management sessions.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistencedetection.threat-hunting
kostastsaleSat Aug 03windows
Threat Huntmediumtest

Remote Access Tool - ScreenConnect Remote Command Execution - Hunting

Detects remote binary or command execution via the ScreenConnect Service. Use this rule in order to hunt for potentially anomalous executions originating from ScreenConnect

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Fri Feb 23windows
Threat Huntmediumtest

Scheduled Task Creation From Potential Suspicious Parent Location

Detects the execution of "schtasks.exe" from a parent that is located in a potentially suspicious location. Multiple malware strains were seen exhibiting a similar behavior in order to achieve persistence.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+1
Florian Roth (Nextron Systems)Wed Feb 23windows
Threat Huntlowtest

SC.EXE Query Execution

Detects execution of "sc.exe" to query information about registered services on the system

WindowsProcess Creation
TA0007 · DiscoveryT1007 · System Service Discoverydetection.threat-hunting
François HubautMon Dec 06windows
Threat Huntmediumtest

Elevated System Shell Spawned

Detects when a shell program such as the Windows command prompt or PowerShell is launched with system privileges. Use this rule to hunt for potential suspicious processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter+1
Nasreddine Bencherchali (Nextron Systems)+1Thu Nov 23windows
Threat Huntlowtest

Potential Suspicious Execution From GUID Like Folder Names

Detects potential suspicious execution of a GUID like folder name located in a suspicious location such as %TEMP% as seen being used in IcedID attacks. Use this rule to hunt for potentially suspicious activity stemming from uncommon folders.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Informationdetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Threat Huntmediumtest

Execution From Webserver Root Folder

Detects a program executing from a web server root folder. Use this rule to hunt for potential interesting activity such as webshell or backdoors

WindowsProcess Creation
TA0003 · PersistenceT1505.003 · Web Shelldetection.threat-hunting
Florian Roth (Nextron Systems)Wed Jan 16windows
Threat Huntmediumtest

Tunneling Tool Execution

Detects the execution of well known tools that can be abused for data exfiltration and tunneling.

WindowsProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1041 · Exfiltration Over C2 ChannelT1572 · Protocol Tunneling+2
Daniil Yugoslavskiy+1Thu Oct 24windows
Threat Huntlowexperimental

HTML File Opened From Download Folder

Detects web browser process opening an HTML file from a user's Downloads folder. This behavior is could be associated with phishing attacks where threat actors send HTML attachments to users. When a user opens such an attachment, it can lead to the execution of malicious scripts or the download of malware. During investigation, analyze the HTML file for embedded scripts or links, check for any subsequent downloads or process executions, and investigate the source of the email or message containing the attachment.

WindowsProcess Creation
T1598.002 · Spearphishing AttachmentT1566.001 · Spearphishing AttachmentTA0001 · Initial AccessTA0043 · Reconnaissance+1
Joseph KamauFri Dec 05windows
Threat Huntmediumtest

Manual Execution of Script Inside of a Compressed File

This is a threat-hunting query to collect information related to the interactive execution of a script from inside a compressed file (zip/rar). Windows will automatically run the script using scripting interpreters such as wscript and cscript binaries. From the query below, the child process is the script interpreter that will execute the script. The script extension is also a set of standard extensions that Windows OS recognizes. Selections 1-3 contain three different execution scenarios. 1. Compressed file opened using 7zip. 2. Compressed file opened using WinRar. 3. Compressed file opened using native windows File Explorer capabilities. When the malicious script is double-clicked, it will be extracted to the respected directories as signified by the CommandLine on each of the three Selections. It will then be executed using the relevant script interpreter."

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.threat-hunting
kostastsaleWed Feb 15windows
Threat Huntlowtest

Process Terminated Via Taskkill

Detects execution of "taskkill.exe" in order to stop a service or a process. Look for suspicious parents executing this command in order to hunt for potential malicious activity. Attackers might leverage this in order to conduct data destruction or data encrypted for impact on the data stores of services like Exchange and SQL Server.

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stopdetection.threat-hunting
François Hubaut+2Sun Dec 26windows
Threat Huntinformationaltest

Suspicious Tasklist Discovery Command

Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discoverydetection.threat-hunting
François HubautSat Dec 11windows
Threat Huntlowexperimental

Process Execution From WebDAV Share

Detects execution of processes with image paths starting with WebDAV shares (\\), which might indicate malicious file execution from remote web shares. Execution of processes from WebDAV shares can be a sign of lateral movement or exploitation attempts, especially if the process is not a known legitimate application. Exploitation Attempt of vulnerabilities like CVE-2025-33053 also involves executing processes from WebDAV paths.

WindowsProcess Creation
TA0002 · ExecutionTA0011 · Command and ControlTA0008 · Lateral MovementT1105 · Ingress Tool Transfer+1
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 13windows
Threat Huntmediumexperimental

FTP Connection Open Attempt Via Winscp CLI

Detects the execution of Winscp with the "-command" and the "open" flags in order to open an FTP connection. Akira ransomware was seen using this technique in order to exfiltrate data.

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocoldetection.threat-hunting
François HubautSun Oct 12windows
Threat Huntmediumexperimental

Winscp Execution From Non Standard Folder

Detects the execution of Winscp from an a non standard folder. This could indicate the execution of Winscp portable.

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocoldetection.threat-hunting
François HubautSun Oct 12windows
Threat Huntmediumtest

WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Detects script file execution (.js, .jse, .vba, .vbe, .vbs, .wsf) by Wscript/Cscript

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScriptdetection.threat-hunting
Michael HaagWed Jan 16windows
Threat Huntmediumtest

Arbitrary Command Execution Using WSL

Detects potential abuse of Windows Subsystem for Linux (WSL) binary as a Living of the Land binary in order to execute arbitrary Linux or Windows commands.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution+1
oscd.community+2Mon Oct 05windows
Threat Huntmediumtest

Cab File Extraction Via Wusa.EXE

Detects execution of the "wusa.exe" (Windows Update Standalone Installer) utility to extract cab using the "/extract" argument that is no longer supported.

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Aug 04windows
Threat Huntlowtest

Scheduled Task Created - Registry

Detects the creation of a scheduled task via Registry keys.

WindowsRegistry Event
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationS0111 · schtasks+3
Center for Threat Informed Defense (CTID) Summiting the Pyramid TeamWed Sep 27windows
Threat Huntmediumtest

Registry Set With Crypto-Classes From The "Cryptography" PowerShell Namespace

Detects the setting of a registry inside the "\Shell\Open\Command" value with PowerShell classes from the "System.Security.Cryptography" namespace. The PowerShell namespace "System.Security.Cryptography" provides classes for on-the-fly encryption and decryption. These can be used for example in decrypting malicious payload for defense evasion.

WindowsRegistry Set
TA0005 · Defense EvasionTA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege Escalation+4
Andreas Braathen (mnemonic.io)Fri Dec 01windows
Threat Huntlowtest

Command Executed Via Run Dialog Box - Registry

Detects execution of commands via the run dialog box on Windows by checking values of the "RunMRU" registry key. This technique was seen being abused by threat actors to deceive users into pasting and executing malicious commands, often disguised as CAPTCHA verification steps.

WindowsRegistry Set
detection.threat-huntingTA0002 · Execution
Ahmed Farouk+1Fri Nov 01windows