Rule Library

Sigma Rules

217 rules found for "attack.T1059.001"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Suspicious Execution of Powershell with Base64

Commandline to launch powershell with a base64 payload

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Jan 02windows
Detectionlowtest

Potential Encoded PowerShell Patterns In CommandLine

Detects specific combinations of encoding methods in PowerShell via the commandline

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Teymur Kheirkhabarov+3Sun Oct 11windows
Detectionmediumtest

Powershell Inline Execution From A File

Detects inline execution of PowerShell code from a file

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Dec 25windows
Detectionmediumtest

Certificate Exported Via PowerShell

Detects calls to cmdlets that are used to export certificates from the local certificate store. Threat actors were seen abusing this to steal private keys from compromised machines.

WindowsProcess Creation
TA0006 · Credential AccessTA0002 · ExecutionT1552.004 · Private KeysT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Thu May 18windows
Detectionhightest

Base64 Encoded PowerShell Command Detected

Detects usage of the "FromBase64String" function in the commandline which is used to decode a base64 encoded string

WindowsProcess Creation
T1027 · Obfuscated Files or InformationTA0005 · Defense EvasionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+1
Florian Roth (Nextron Systems)Wed Jan 29windows
Detectionhightest

Suspicious PowerShell IEX Execution Patterns

Detects suspicious ways to run Invoke-Execution using IEX alias

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Thu Mar 24windows
Detectionmediumtest

Import PowerShell Modules From Suspicious Directories - ProcCreation

Detects powershell scripts that import modules from suspicious directories

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Jan 10windows
Detectionhightest

Malicious PowerShell Commandlets - ProcessCreation

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsProcess Creation
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionlowtest

Non Interactive PowerShell Process Spawned

Detects non-interactive PowerShell activity by looking at the "powershell" process with a non-user GUI process such as "explorer.exe" as a parent.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Roberto Rodriguez (Cyb3rWard0g)+1Thu Sep 12windows
Detectionhightest

Potential PowerShell Obfuscation Via WCHAR/CHAR

Detects suspicious encoded character syntax often used for defense evasion

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Thu Jul 09windows
Detectionhightest

Execution of Powershell Script in Public Folder

This rule detects execution of PowerShell scripts located in the "C:\Users\Public" folder

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Max Altgelt (Nextron Systems)Wed Apr 06windows
Detectionhighstable

Potential Powershell ReverseShell Connection

Detects usage of the "TcpClient" class. Which can be abused to establish remote connections and reverse-shells. As seen used by the Nishang "Invoke-PowerShellTcpOneLine" reverse shell and other.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
FPT.EagleEye+2Wed Mar 03windows
Detectionmediumtest

Suspicious PowerShell Invocation From Script Engines

Detects suspicious powershell invocations from interpreters or unusual programs

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionmediumtest

Change PowerShell Policies to an Insecure Level

Detects changing the PowerShell script execution policy to a potentially insecure level using the "-ExecutionPolicy" flag.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautMon Nov 01windows
Detectionhightest

Exchange PowerShell Snap-Ins Usage

Detects adding and using Exchange PowerShell snap-ins to export mailbox data. As seen used by HAFNIUM and APT27

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0009 · CollectionT1114 · Email Collection
FPT.EagleEye+1Wed Mar 03windows
Detectionhightest

Suspicious PowerShell Download and Execute Pattern

Detects suspicious PowerShell download patterns that are often used in malicious scripts, stagers or downloaders (make sure that your backend applies the strings case-insensitive)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Feb 28windows
Detectionhightest

Suspicious PowerShell Parameter Substring

Detects suspicious PowerShell invocation with a parameter substring

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionhightest

Suspicious PowerShell Parent Process

Detects a suspicious or uncommon parent processes of PowerShell

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Teymur Kheirkhabarov+1Fri Mar 20windows
Detectionmediumtest

PowerShell Script Run in AppData

Detects a suspicious command line execution that invokes PowerShell with reference to an AppData folder

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 09windows
Detectionhightest

Net WebClient Casing Anomalies

Detects PowerShell command line contents that include a suspicious abnormal casing in the Net.Webclient (e.g. nEt.WEbCliEnT) string as used in obfuscation techniques

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue May 24windows
Detectionmediumtest

Suspicious XOR Encoded PowerShell Command

Detects presence of a potentially xor encoded powershell command

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1140 · Deobfuscate/Decode Files or Information+1
Sami Ruohonen+6Wed Sep 05windows
Detectionhightest

Suspicious Schtasks Execution AppData Folder

Detects the creation of a schtask that executes a file from C:\Users\<USER>\AppData\Local

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+1Tue Mar 15windows
Detectionhightest

Potential Persistence Via Powershell Search Order Hijacking - Task

Detects suspicious powershell execution via a schedule task where the command ends with an suspicious flags to hide the powershell instance instead of executeing scripts or commands. This could be a sign of persistence via PowerShell "Get-Variable" technique as seen being used in Colibri Loader

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+1Fri Apr 08windows
Detectionmediumtest

Scheduled Task Executing Payload from Registry

Detects the creation of a schtasks that potentially executes a payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
X__Junior (Nextron Systems)+1Tue Jul 18windows
Detectionhightest

Scheduled Task Executing Encoded Payload from Registry

Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+3Sat Feb 12windows
Detectionhightest

Potential Data Exfiltration Activity Via CommandLine Tools

Detects the use of various CLI utilities exfiltrating data via web requests

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionmediumtest

Hidden Powershell in Link File Pattern

Detects events that appear when a user click on a link file with a powershell command in it

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Feb 06windows
Detectionhightest

Windows Shell/Scripting Processes Spawning Suspicious Programs

Detects suspicious child processes of a Windows shell and scripting processes such as wscript, rundll32, powershell, mshta...etc.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1059.001 · PowerShell+1
Florian Roth (Nextron Systems)+1Fri Apr 06windows
Detectionmediumtest

Usage Of Web Request Commands And Cmdlets

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via CommandLine

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
James Pemberton+4Thu Oct 24windows
Detectionmediumtest

Potentially Suspicious WebDAV LNK Execution

Detects possible execution via LNK file accessed on a WebDAV server.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1204 · User Execution
Micah BabinskiMon Aug 21windows
Detectionmediumtest

Remote PowerShell Session Host Process (WinRM)

Detects remote PowerShell sections by monitoring for wsmprovhost (WinRM host process) as a parent or child process (sign of an active PowerShell remote session).

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1059.001 · PowerShellT1021.006 · Windows Remote Management
Roberto Rodriguez (Cyb3rWard0g)Thu Sep 12windows
Detectionmediumstable

Potential WMI Lateral Movement WmiPrvSE Spawned PowerShell

Detects Powershell as a child of the WmiPrvSE process. Which could be a sign of lateral movement via WMI.

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management InstrumentationT1059.001 · PowerShell
Markus NeisWed Apr 03windows
Detectionhightest

Potentially Suspicious Command Executed Via Run Dialog Box - Registry

Detects execution of commands via the run dialog box on Windows by checking values of the "RunMRU" registry key. This technique was seen being abused by threat actors to deceive users into pasting and executing malicious commands, often disguised as CAPTCHA verification steps.

WindowsRegistry Set
TA0002 · ExecutionT1059.001 · PowerShell
Ahmed Farouk+1Fri Nov 01windows
Emerging Threatcriticaltest

Turla Group Commands May 2020

Detects commands used by Turla group as reported by ESET in May 2020

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionG0010 · G0010+5
Florian Roth (Nextron Systems)Tue May 262014
Emerging Threathighstable

TropicTrooper Campaign November 2018

Detects TropicTrooper activity, an actor who targeted high-profile organizations in the energy and food and beverage sectors in Asia

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
@41thexplorer+1Tue Nov 122018
Emerging Threathightest

Potential Baby Shark Malware Activity

Detects activity that could be related to Baby Shark malware

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0007 · DiscoveryT1012 · Query Registry+4
Florian Roth (Nextron Systems)Sun Feb 242019
Emerging Threathighstable

Potential Emotet Activity

Detects all Emotet like process executions that are not covered by the more generic rules

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information+1
Florian Roth (Nextron Systems)Mon Sep 302019
Emerging Threathightest

Operation Wocao Activity

Detects activity mentioned in Operation Wocao report

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0007 · DiscoveryT1012 · Query Registry+7
Florian Roth (Nextron Systems)+1Fri Dec 202019
Emerging Threathightest

Operation Wocao Activity - Security

Detects activity mentioned in Operation Wocao report

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0007 · DiscoveryT1012 · Query Registry+7
Florian Roth (Nextron Systems)+1Fri Dec 202019
Emerging Threathightest

Exploited CVE-2020-10189 Zoho ManageEngine

Detects the exploitation of Zoho ManageEngine Desktop Central Java Deserialization vulnerability reported as CVE-2020-10189

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1059.001 · PowerShell+4
Florian Roth (Nextron Systems)Wed Mar 252020
Emerging Threathightest

Suspicious PrinterPorts Creation (CVE-2020-1048)

Detects new commands that add new printer port which point to suspicious file

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionT1059.001 · PowerShellcve.2020-1048+1
EagleEye Team+1Wed May 132020
Emerging Threatcriticaltest

Greenbug Espionage Group Indicators

Detects tools and process executions used by Greenbug in their May 2020 campaign as reported by Symantec

WindowsProcess Creation
G0049 · G0049TA0002 · ExecutionT1059.001 · PowerShellTA0011 · Command and Control+4
Florian Roth (Nextron Systems)Wed May 202020
Emerging Threathightest

UNC2452 Process Creation Patterns

Detects a specific process creation patterns as seen used by UNC2452 and provided by Microsoft as Microsoft Defender ATP queries

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Florian Roth (Nextron Systems)Fri Jan 222020
Emerging Threatcriticaltest

UNC2452 PowerShell Pattern

Detects a specific PowerShell command line pattern used by the UNC2452 actors as mentioned in Microsoft and Symantec reports

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1047 · Windows Management Instrumentationdetection.emerging-threats
Florian Roth (Nextron Systems)Wed Jan 202020
Emerging Threathightest

Potential BlackByte Ransomware Activity

Detects command line patterns used by BlackByte ransomware in different operations

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0040 · ImpactT1485 · Data Destruction+4
Florian Roth (Nextron Systems)Fri Feb 252021
Emerging Threathightest

CVE-2022-24527 Microsoft Connected Cache LPE

Detects files created during the local privilege exploitation of CVE-2022-24527 Microsoft Connected Cache

WindowsFile Event
TA0002 · ExecutionTA0004 · Privilege EscalationT1059.001 · PowerShellcve.2022-24527+1
Florian Roth (Nextron Systems)Wed Apr 132022
Emerging Threathightest

Potential Bumblebee Remote Thread Creation

Detects remote thread injection events based on action seen used by bumblebee

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell+1
Nasreddine Bencherchali (Nextron Systems)Tue Sep 272022
Emerging Threathightest

ChromeLoader Malware Execution

Detects execution of ChromeLoader malware via a registered scheduled task

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+3
kostastsaleMon Jan 102022