Rule Library

Sigma Rules

315 rules found for "command-and-control"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Suspicious TCP Tunnel Via PowerShell Script

Detects powershell scripts that creates sockets/listeners which could be indicative of tunneling activity

WindowsPowerShell Script
TA0011 · Command and ControlT1090 · Proxy
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectionlowtest

Suspicious SSL Connection

Adversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol.

WindowsPowerShell Script
TA0011 · Command and ControlT1573 · Encrypted Channel
François HubautSun Jan 23windows
Detectionmediumtest

Testing Usage of Uncommonly Used Port

Adversaries may communicate using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443.

WindowsPowerShell Script
TA0011 · Command and ControlT1571 · Non-Standard Port
François HubautSun Jan 23windows
Detectionmediumtest

File Download Via Bitsadmin

Detects usage of bitsadmin downloading a file

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Michael Haag+1Thu Mar 09windows
Detectionhightest

Suspicious Download From File-Sharing Website Via Bitsadmin

Detects usage of bitsadmin downloading a file from a suspicious domain

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Florian Roth (Nextron Systems)Tue Jun 28windows
Detectionhightest

File With Suspicious Extension Downloaded Via Bitsadmin

Detects usage of bitsadmin downloading a file with a suspicious extension

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Florian Roth (Nextron Systems)+1Tue Jun 28windows
Detectionhightest

File Download Via Bitsadmin To A Suspicious Target Folder

Detects usage of bitsadmin downloading a file to a suspicious target folder

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Florian Roth (Nextron Systems)+1Tue Jun 28windows
Detectionlowtest

Browser Execution In Headless Mode

Detects execution of Chromium based browser in headless mode

WindowsProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1564.003 · Hidden Window
Nasreddine Bencherchali (Nextron Systems)Tue Sep 12windows
Detectionhightest

File Download with Headless Browser

Detects execution of chromium based browser in headless mode using the "dump-dom" command line to download files

WindowsProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1564.003 · Hidden Window
Sreeman+1Tue Jan 04windows
Detectionmediumtest

File Download From Browser Process Via Inline URL

Detects execution of a browser process with a URL argument pointing to a file with a potentially interesting extension. This can be abused to download arbitrary files or to hide from the user for example by launching the browser in a minimized state.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionhightest

Tor Client/Browser Execution

Detects the use of Tor or Tor-Browser to connect to onion routing networks

WindowsProcess Creation
TA0011 · Command and ControlT1090.003 · Multi-hop Proxy
François HubautSun Feb 20windows
Detectionmediumtest

File Download via CertOC.EXE

Detects when a user downloads a file by using CertOC.exe

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Mon May 16windows
Detectionhightest

File Download From IP Based URL Via CertOC.EXE

Detects when a user downloads a file from an IP based URL using CertOC.exe

WindowsProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Oct 18windows
Detectionhighexperimental

Suspicious CertReq Command to Download

Detects a suspicious CertReq execution downloading a file. This behavior is often used by attackers to download additional payloads or configuration files. Certreq is a built-in Windows utility used to request and retrieve certificates from a certification authority (CA). However, it can be abused by threat actors for malicious purposes.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Christian Burkard (Nextron Systems)Wed Nov 24windows
Detectionmediumtest

Suspicious Download Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+3Wed Feb 15windows
Detectionhightest

Suspicious File Downloaded From Direct IP Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files from direct IPs.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionhightest

Suspicious File Downloaded From File-Sharing Website Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files from file-sharing websites.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionmediumtest

Cloudflared Portable Execution

Detects the execution of the "cloudflared" binary from a non standard location.

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Nasreddine Bencherchali (Nextron Systems)Wed Dec 20windows
Detectionmediumtest

Cloudflared Quick Tunnel Execution

Detects creation of an ad-hoc Cloudflare Quick Tunnel, which can be used to tunnel local services such as HTTP, RDP, SSH and SMB. The free TryCloudflare Quick Tunnel will generate a random subdomain on trycloudflare[.]com, following a call to api[.]trycloudflare[.]com. The tool has been observed in use by threat groups including Akira ransomware.

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Sajid Nawaz KhanWed Dec 20windows
Detectionmediumtest

Cloudflared Tunnel Connections Cleanup

Detects execution of the "cloudflared" tool with the tunnel "cleanup" flag in order to cleanup tunnel connections.

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web ServiceT1090 · ProxyT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed May 17windows
Detectionmediumtest

Cloudflared Tunnel Execution

Detects execution of the "cloudflared" tool to connect back to a tunnel. This was seen used by threat actors to maintain persistence and remote access to compromised networks.

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web ServiceT1090 · ProxyT1572 · Protocol Tunneling
Janantha Marasinghe+1Wed May 17windows
Detectionhightest

Curl Download And Execute Combination

Adversaries can use curl to download payloads remotely and execute them. Curl is included by default in Windows 10 build 17063 and later.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Sreeman+1Mon Jan 13windows
Detectionmediumtest

Command Line Execution with Suspicious URL and AppData Strings

Detects a suspicious command line execution that includes an URL and AppData string in the command line parameters as used by several droppers (js/vbs > powershell)

WindowsProcess Creation
TA0002 · ExecutionTA0011 · Command and ControlT1059.003 · Windows Command ShellT1059.001 · PowerShell+1
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionmediumtest

Potential Download/Upload Activity Using Type Command

Detects usage of the "type" command to download/upload data from WebDAV server

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Dec 14windows
Detectionmediumexperimental

OpenEDR Spawning Command Shell

Detects the OpenEDR ssh-shellhost.exe spawning a command shell (cmd.exe) or PowerShell with PTY (pseudo-terminal) capabilities. This may indicate remote command execution through OpenEDR's remote management features, which could be legitimate administrative activity or potential abuse of the remote access tool. Threat actors may leverage OpenEDR's remote shell capabilities to execute commands on compromised systems, facilitating lateral movement or other command-and-control operations.

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0008 · Lateral MovementT1021.004 · SSH+2
kostastsaleThu Feb 19windows
Detectionhightest

Suspicious Curl.EXE Download

Detects a suspicious curl process start on Windows and outputs the requested document to a local file

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Fri Jul 03windows
Detectionmediumtest

Remote File Download Via Desktopimgdownldr Utility

Detects the desktopimgdownldr utility being used to download a remote file. An adversary may use desktopimgdownldr to download arbitrary files as an alternative to certutil.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Tim Rauch+1Tue Sep 27windows
Detectionhightest

Suspicious Desktopimgdownldr Command

Detects a suspicious Microsoft desktopimgdownldr execution with parameters used to download files from the Internet

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)Fri Jul 03windows
Detectionhightest

DNS Exfiltration and Tunneling Tools Execution

Well-known DNS Exfiltration tools execution

WindowsProcess Creation
TA0010 · ExfiltrationT1048.001 · Exfiltration Over Symmetric Encrypted Non-C2 ProtocolTA0011 · Command and ControlT1071.004 · DNS+1
Daniil Yugoslavskiy+1Thu Oct 24windows
Detectionmediumtest

Remote File Download Via Findstr.EXE

Detects execution of "findstr" with specific flags and a remote share path. This specific set of CLI flags would allow "findstr" to download the content of the file located on the remote share as described in the LOLBAS entry.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionlowtest

Insensitive Subfolder Search Via Findstr.EXE

Detects execution of findstr with the "s" and "i" flags for a "subfolder" and "insensitive" search respectively. Attackers sometimes leverage this built-in utility to search the system for interesting files or filter through results of commands.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionhightest

Finger.EXE Execution

Detects execution of the "finger.exe" utility. Finger.EXE or "TCPIP Finger Command" is an old utility that is still present on modern Windows installation. It Displays information about users on a specified remote computer (typically a UNIX computer) that is running the finger service or daemon. Due to the old nature of this utility and the rareness of machines having the finger service. Any execution of "finger.exe" can be considered "suspicious" and worth investigating.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+2Wed Feb 24windows
Detectionmediumtest

Arbitrary File Download Via GfxDownloadWrapper.EXE

Detects execution of GfxDownloadWrapper.exe with a URL as an argument to download file.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Victor Sergeev+1Fri Oct 09windows
Detectionmediumtest

Github Self-Hosted Runner Execution

Detects GitHub self-hosted runners executing workflows on local infrastructure that could be abused for persistence and code execution. Shai-Hulud is an npm supply chain worm targeting CI/CD environments. It installs runners on compromised systems to maintain access after credential theft, leveraging their access to secrets and internal networks.

WindowsProcess Creation
TA0011 · Command and ControlT1102.002 · Bidirectional CommunicationT1071 · Application Layer Protocol
Daniel Koifman (KoifSec)Sat Nov 29windows
Detectionhightest

File Download Using Notepad++ GUP Utility

Detects execution of the Notepad++ updater (gup) from a process other than Notepad++ to download files.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Fri Jun 10windows
Detectionhightest

HackTool - Htran/NATBypass Execution

Detects executable names or flags used by Htran or Htran-like tools (e.g. NATBypass)

WindowsProcess Creation
TA0011 · Command and ControlT1090 · ProxyS0040 · S0040
Florian Roth (Nextron Systems)Tue Dec 27windows
Detectionhightest

HackTool - SharpChisel Execution

Detects usage of the Sharp Chisel via the commandline arguments

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Nasreddine Bencherchali (Nextron Systems)Mon Sep 05windows
Detectionhightest

HackTool - SILENTTRINITY Stager Execution

Detects SILENTTRINITY stager use via PE metadata

WindowsProcess Creation
TA0011 · Command and ControlT1071 · Application Layer Protocol
Aleksey Potapov+1Tue Oct 22windows
Detectioncriticaltest

HackTool - Sliver C2 Implant Activity Pattern

Detects process activity patterns as seen being used by Sliver C2 framework implants

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)+1Thu Aug 25windows
Detectionhightest

File Download And Execution Via IEExec.EXE

Detects execution of the IEExec utility to download and execute files

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Mon May 16windows
Detectionhightest

Suspicious Child Process Of Manage Engine ServiceDesk

Detects suspicious child processes of the "Manage Engine ServiceDesk Plus" Java web service

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web Service
Florian Roth (Nextron Systems)Wed Jan 18windows
Detectionmediumtest

Import LDAP Data Interchange Format File Via Ldifde.EXE

Detects the execution of "Ldifde.exe" with the import flag "-i". The can be abused to include HTTP-based arguments which will allow the arbitrary download of files from a remote server.

WindowsProcess Creation
TA0011 · Command and ControlTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1105 · Ingress Tool Transfer
@gott_cyberFri Sep 02windows
Detectionmediumtest

Suspicious Diantz Download and Compress Into a CAB File

Download and compress a remote file and store it in a cab file on local machine.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautFri Nov 26windows
Detectionmediumtest

Suspicious Extrac32 Execution

Download or Copy file with Extrac32

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautFri Nov 26windows
Detectionhightest

PrintBrm ZIP Creation of Extraction

Detects the execution of the LOLBIN PrintBrm.exe, which can be used to create or extract ZIP files. PrintBrm.exe should not be run on a normal workstation.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool TransferTA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautMon May 02windows
Detectionmediumtest

Replace.exe Usage

Detects the use of Replace.exe which can be used to replace file with another file

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSun Mar 06windows
Detectionhightest

File Download Via Windows Defender MpCmpRun.EXE

Detects the use of Windows Defender MpCmdRun.EXE to download files

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Matthew MatchenFri Sep 04windows
Detectionmediumtest

MsiExec Web Install

Detects suspicious msiexec process starts with web addresses as parameter

WindowsProcess Creation
TA0005 · Defense EvasionT1218.007 · MsiexecTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)Fri Feb 09windows