Rule Library

Sigma Rules

412 rules found for "attack.T1059"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

HackTool - Bloodhound/Sharphound Execution

Detects command line parameters used by Bloodhound and Sharphound hack tools

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain AccountT1482 · Domain Trust Discovery+4
Florian Roth (Nextron Systems)Fri Dec 20windows
Detectionhightest

Operator Bloopers Cobalt Strike Commands

Detects use of Cobalt Strike commands accidentally entered in the CMD shell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shellstp.1u
_pete_0+1Fri May 06windows
Detectionhightest

Operator Bloopers Cobalt Strike Modules

Detects Cobalt Strike module/commands accidentally entered in CMD shell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
_pete_0+1Fri May 06windows
Detectionhightest

Potential CobaltStrike Process Patterns

Detects potential process patterns related to Cobalt Strike beacon activity

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Jul 27windows
Detectionhightest

HackTool - Covenant PowerShell Launcher

Detects suspicious command lines used in Covenant luanchers

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.001 · PowerShellT1564.003 · Hidden Window
Florian Roth (Nextron Systems)+2Thu Jun 04windows
Detectionhightest

HackTool - CrackMapExec Execution

This rule detect common flag combinations used by CrackMapExec in order to detect its use even if the binary has been replaced.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential Access+7
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionhighstable

HackTool - CrackMapExec Execution Patterns

Detects various execution patterns of the CrackMapExec pentesting framework

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1047 · Windows Management Instrumentation+4
Thomas PatzkeFri May 22windows
Detectionhightest

HackTool - CrackMapExec PowerShell Obfuscation

The CrachMapExec pentesting framework implements a PowerShell obfuscation with some static strings detected by this rule.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027.005 · Indicator Removal from Tools
Thomas PatzkeFri May 22windows
Detectionhightest

HackTool - Empire PowerShell Launch Parameters

Detects suspicious powershell command line parameters used in Empire

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sat Apr 20windows
Detectionhightest

Invoke-Obfuscation CLIP+ Launcher

Detects Obfuscated use of Clip.exe to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Tue Oct 13windows
Detectionhightest

Invoke-Obfuscation Obfuscated IEX Invocation

Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Daniel Bohannon ( / )+1Fri Nov 08windows
Detectionhightest

Invoke-Obfuscation STDIN+ Launcher

Detects Obfuscated use of stdin to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionhightest

Invoke-Obfuscation VAR+ Launcher

Detects Obfuscated use of Environment Variables to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionmediumtest

Invoke-Obfuscation COMPRESS OBFUSCATION

Detects Obfuscated Powershell via COMPRESS OBFUSCATION

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionhightest

Invoke-Obfuscation Via Stdin

Detects Obfuscated Powershell via Stdin in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Mon Oct 12windows
Detectionhightest

Invoke-Obfuscation Via Use Clip

Detects Obfuscated Powershell via use Clip.exe in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Fri Oct 09windows
Detectionhightest

Invoke-Obfuscation Via Use MSHTA

Detects Obfuscated Powershell via use MSHTA in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Thu Oct 08windows
Detectionhightest

Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION

Detects Obfuscated Powershell via VAR++ LAUNCHER

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Tue Oct 13windows
Detectionmediumtest

HackTool - Jlaive In-Memory Assembly Execution

Detects the use of Jlaive to execute assemblies in a copied PowerShell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
Jose Luis Sanchez MartinezTue May 24windows
Detectionhightest

HackTool - Koadic Execution

Detects command line parameters used by Koadic hack tool

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellT1059.005 · Visual BasicT1059.007 · JavaScript
wagga+2Sun Jan 12windows
Detectionhightest

HackTool - Default PowerSploit/Empire Scheduled Task Creation

Detects the creation of a schtask via PowerSploit or Empire Default Configuration.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationS0111 · schtasks+5
Markus NeisTue Mar 06windows
Detectionhightest

HackTool - RedMimicry Winnti Playbook Execution

Detects actions caused by the RedMimicry Winnti playbook a automated breach emulations utility

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1106 · Native APIT1059.003 · Windows Command Shell+1
Alexander RauschWed Jun 24windows
Detectioncriticaltest

HackTool - Sliver C2 Implant Activity Pattern

Detects process activity patterns as seen being used by Sliver C2 framework implants

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)+1Thu Aug 25windows
Detectionhightest

HackTool - Stracciatella Execution

Detects Stracciatella which executes a Powershell runspace from within C# (aka SharpPick technique) with AMSI, ETW and Script Block Logging disabled based on PE metadata characteristics.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059 · Command and Scripting InterpreterT1562.001 · Disable or Modify Tools
Martin MuellerMon Apr 17windows
Detectionhightest

Suspicious HWP Sub Processes

Detects suspicious Hangul Word Processor (Hanword) sub processes that could indicate an exploitation

WindowsProcess Creation
TA0001 · Initial AccessT1566.001 · Spearphishing AttachmentTA0002 · ExecutionT1203 · Exploitation for Client Execution+2
Florian Roth (Nextron Systems)Thu Oct 24windows
Detectionmediumtest

Potential Reconnaissance Activity Via GatherNetworkInfo.VBS

Detects execution of the built-in script located in "C:\Windows\System32\gatherNetworkInfo.vbs". Which can be used to gather information about the target machine

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1615 · Group Policy DiscoveryT1059.005 · Visual Basic
blueteamer8699Mon Jan 03windows
Detectionmediumtest

Use of OpenConsole

Detects usage of OpenConsole binary as a LOLBIN to launch other binaries to bypass application Whitelisting

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Thu Jun 16windows
Detectionmediumtest

Use of Pcalua For Execution

Detects execition of commands and binaries from the context of The program compatibility assistant (Pcalua.exe). This can be used as a LOLBIN in order to bypass application whitelisting.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)+3Tue Jun 14windows
Detectionmediumtest

Execute Code with Pester.bat as Parent

Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1216 · System Script Proxy Execution
François Hubaut+1Sat Aug 20windows
Detectionmediumtest

Execute Code with Pester.bat

Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1216 · System Script Proxy Execution
Julia Fomina+1Thu Oct 08windows
Detectionmediumtest

Suspicious Runscripthelper.exe

Detects execution of powershell scripts via Runscripthelper.exe

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
Victor Sergeev+1Fri Oct 09windows
Detectionmediumtest

Wscript Shell Run In CommandLine

Detects the presence of the keywords "Wscript", "Shell" and "Run" in the command, which could indicate a suspicious activity

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Aug 31windows
Detectionhightest

MSHTA Execution with Suspicious File Extensions

Detects execution of mshta.exe with file types that looks like they do not typically represent HTA (HTML Application) content, such as .png, .jpg, .zip, .pdf, and others, which are often polyglots. MSHTA is a legitimate Windows utility for executing HTML Applications containing VBScript or JScript. Threat actors often abuse this lolbin utility to download and execute malicious scripts disguised as benign files or hosted under misleading extensions to evade detection.

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationT1218.005 · MshtaTA0002 · Execution+2
Diego Perez+3Fri Feb 22windows
Detectionmediumtest

Detection of PowerShell Execution via Sqlps.exe

This rule detects execution of a PowerShell code through the sqlps.exe utility, which is included in the standard set of utilities supplied with the MSSQL Server. Script blocks are not logged in this case, so this utility helps to bypass protection mechanisms based on the analysis of these logs.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Agro oscd.communitySat Oct 10windows
Detectionmediumtest

SQL Client Tools PowerShell Session Detection

This rule detects execution of a PowerShell code through the sqltoolsps.exe utility, which is included in the standard set of utilities supplied with the Microsoft SQL Server Management studio. Script blocks are not logged in this case, so this utility helps to bypass protection mechanisms based on the analysis of these logs.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Agro oscd.communitlyTue Oct 13windows
Detectionmediumtest

Node Process Executions

Detects the execution of other scripts using the Node executable packaged with Adobe Creative Cloud

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1059.007 · JavaScript
Max Altgelt (Nextron Systems)Wed Apr 06windows
Detectionhightest

Outlook EnableUnsafeClientMailRules Setting Enabled

Detects an attacker trying to enable the outlook security setting "EnableUnsafeClientMailRules" which allows outlook to run applications or execute macros

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059 · Command and Scripting InterpreterT1202 · Indirect Command Execution
Markus Neis+1Thu Dec 27windows
Detectionhightest

Suspicious Remote Child Process From Outlook

Detects a suspicious child process spawning from Outlook where the image is located in a remote location (SMB/WebDav shares).

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059 · Command and Scripting InterpreterT1202 · Indirect Command Execution
Markus Neis+1Thu Dec 27windows
Detectionmediumtest

Perl Inline Command Execution

Detects execution of perl using the "-e"/"-E" flags. This is could be used as a way to launch a reverse shell or execute live perl code.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionmediumtest

Php Inline Command Execution

Detects execution of php using the "-r" flag. This is could be used as a way to launch a reverse shell or execute live php code.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionhightest

Suspicious Encoded PowerShell Command Line

Detects suspicious powershell process starts with base64 encoded commands (e.g. Emotet)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+5Mon Sep 03windows
Detectionhightest

Suspicious PowerShell Encoded Command Patterns

Detects PowerShell command line patterns in combincation with encoded commands that often appear in malware infection chains

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue May 24windows
Detectionhightest

PowerShell Base64 Encoded FromBase64String Cmdlet

Detects usage of a base64 encoded "FromBase64String" cmdlet in a process command line

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sat Aug 24windows
Detectionhightest

Malicious Base64 Encoded PowerShell Keywords in Command Lines

Detects base64 encoded strings used in hidden malicious PowerShell command lines

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
John LambertWed Jan 16windows
Detectionhightest

PowerShell Base64 Encoded IEX Cmdlet

Detects usage of a base64 encoded "IEX" cmdlet in a process command line

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Fri Aug 23windows
Detectionhightest

PowerShell Base64 Encoded Invoke Keyword

Detects UTF-8 and UTF-16 Base64 encoded powershell 'Invoke-' calls

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Martin Mueller+1Fri May 20windows
Detectionhightest

PowerShell Base64 Encoded Reflective Assembly Load

Detects base64 encoded .NET reflective loading of Assembly

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information+1
Christian Burkard (Nextron Systems)+1Tue Mar 01windows
Detectionhightest

Suspicious Encoded And Obfuscated Reflection Assembly Load Function Call

Detects suspicious base64 encoded and obfuscated "LOAD" keyword used in .NET "reflection.assembly"

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.001 · PowerShellT1027 · Obfuscated Files or Information
Martin MuellerTue Mar 01windows