Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Malicious DLL File Dropped in the Teams or OneDrive Folder

Detects creation of a malicious DLL file in the location where the OneDrive or Team applications Upon execution of the Teams or OneDrive application, the dropped malicious DLL file ("iphlpapi.dll") is sideloaded

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
François HubautFri Aug 12windows
Detectionhightest

Adwind RAT / JRAT File Artifact

Detects javaw.exe in AppData folder as used by Adwind / JRAT

WindowsFile Event
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScript
Florian Roth (Nextron Systems)+3Fri Nov 10windows
Detectionhightest

Suspicious File Creation In Uncommon AppData Folder

Detects the creation of suspicious files and folders inside the user's AppData folder but not inside any of the common and well known directories (Local, Romaing, LocalLow). This method could be used as a method to bypass detection who exclude the AppData folder in fear of FPs

WindowsFile Event
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

File With Uncommon Extension Created By An Office Application

Detects the creation of files with an executable or script extension by an Office application.

WindowsFile Event
T1204.002 · Malicious FileTA0002 · Execution
Vadim Khrykov (ThreatIntel)+2Mon Aug 23windows
Detectionhightest

PCRE.NET Package Temp Files

Detects processes creating temp files related to PCRE.NET package

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Roberto Rodriguez (Cyb3rWard0g)+1Thu Oct 29windows
Detectionmediumtest

Suspicious File Created In PerfLogs

Detects suspicious file based on their extension being created in "C:\PerfLogs\". Note that this directory mostly contains ".etl" files

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionhightest

Malicious PowerShell Scripts - FileCreation

Detects the creation of known offensive powershell scripts used for exploitation

WindowsFile Event
TA0002 · ExecutionT1059.001 · PowerShell
Markus Neis+3Sat Apr 07windows
Detectionmediumtest

RemCom Service File Creation

Detects default RemCom service filename which indicates RemCom service installation and execution

WindowsFile Event
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Nasreddine Bencherchali (Nextron Systems)Fri Aug 04windows
Detectionlowtest

Remote Access Tool - ScreenConnect Temporary File

Detects the creation of files in a specific location by ScreenConnect RMM. ScreenConnect has feature to remotely execute binaries on a target machine. These binaries will be dropped to ":\Users\<username>\Documents\ConnectWiseControl\Temp\" before execution.

WindowsFile Event
TA0002 · ExecutionT1059.003 · Windows Command Shell
Ali AlwashaliTue Oct 10windows
Detectionhightest

Windows Shell/Scripting Application File Write to Suspicious Folder

Detects Windows shells and scripting applications that write files to suspicious folders

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Sat Nov 20windows
Detectionmediumtest

Created Files by Microsoft Sync Center

This rule detects suspicious files created by Microsoft Sync Center (mobsync)

WindowsFile Event
TA0004 · Privilege EscalationT1055 · Process InjectionT1218 · System Binary Proxy ExecutionTA0002 · Execution+1
elhoimThu Apr 28windows
Detectionhightest

Suspicious Get-Variable.exe Creation

Get-Variable is a valid PowerShell cmdlet WindowsApps is by default in the path where PowerShell is executed. So when the Get-Variable command is issued on PowerShell execution, the system first looks for the Get-Variable executable in the path and executes the malicious binary instead of looking for the PowerShell cmdlet.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546 · Event Triggered ExecutionTA0005 · Defense Evasion+1
François HubautSat Apr 23windows
Detectionhighexperimental

Legitimate Application Writing Files In Uncommon Location

Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution. Adversaries may leverage legitimate applications (Living off the Land Binaries - LOLBins) to drop or download malicious files to uncommon locations on the system to evade detection by security solutions.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Dec 10windows
Detectionhighexperimental

Suspicious Binaries and Scripts in Public Folder

Detects the creation of a file with a suspicious extension in the public folder, which could indicate potential malicious activity.

WindowsFile Event
TA0002 · ExecutionT1204 · User Execution
The DFIR ReportThu Jan 23windows
Detectionhightest

Potential File Extension Spoofing Using Right-to-Left Override

Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.

WindowsFile Event
TA0002 · ExecutionTA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Jonathan Peters (Nextron Systems)+2Sun Nov 17windows
Detectionhightest

Suspicious Startup Folder Persistence

Detects the creation of potentially malicious script and executable files in Windows startup folders, which is a common persistence technique used by threat actors. These files (.ps1, .vbs, .js, .bat, etc.) are automatically executed when a user logs in, making the Startup folder an attractive target for attackers. This technique is frequently observed in malvertising campaigns and malware distribution where attackers attempt to maintain long-term access to compromised systems.

WindowsFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionT1204.002 · Malicious FileTA0003 · Persistence+1
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 10windows
Detectionhightest

Suspicious Interactive PowerShell as SYSTEM

Detects the creation of files that indicator an interactive use of PowerShell in the SYSTEM user context

WindowsFile Event
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue Dec 07windows
Detectionhightest

Suspicious Scheduled Task Write to System32 Tasks

Detects the creation of tasks from processes executed from suspicious locations

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053 · Scheduled Task/Job
Florian Roth (Nextron Systems)Tue Nov 16windows
Detectionmediumtest

WinSxS Executable File Creation By Non-System Process

Detects the creation of binaries in the WinSxS folder by non-system processes

WindowsFile Event
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu May 11windows
Detectionlowtest

PsExec Service File Creation

Detects default PsExec service filename which indicates PsExec service installation and execution

WindowsFile Event
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Thomas PatzkeMon Jun 12windows
Detectionhightest

PSEXEC Remote Execution File Artefact

Detects creation of the PSEXEC key file. Which is created anytime a PsExec command is executed. It gets written to the file system and will be recorded in the USN Journal on the target system

WindowsFile Event
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · Persistence+4
Nasreddine Bencherchali (Nextron Systems)Sat Jan 21windows
Detectionhightest

UAC Bypass Using IDiagnostic Profile - File

Detects the creation of a file by "dllhost.exe" in System32 directory part of "IDiagnosticProfileUAC" UAC bypass technique

WindowsFile Event
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Nasreddine Bencherchali (Nextron Systems)Sun Jul 03windows
Detectionhightest

Renamed VsCode Code Tunnel Execution - File Indicator

Detects the creation of a file with the name "code_tunnel.json" which indicate execution and usage of VsCode tunneling utility by an "Image" or "Process" other than VsCode.

WindowsFile Event
TA0011 · Command and Control
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25windows
Detectionmediumtest

AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl - File

Detects execution of attacker-controlled WsmPty.xsl or WsmTxt.xsl via winrm.vbs and copied cscript.exe (can be renamed)

WindowsFile Event
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
Julia Fomina+1Tue Oct 06windows
Detectioncriticaltest

Wmiexec Default Output File

Detects the creation of the default output filename used by the wmiexec tool

WindowsFile Event
TA0008 · Lateral MovementTA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Thu Jun 02windows
Detectioncriticaltest

Wmiprvse Wbemcomn DLL Hijack - File

Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory over the network and loading it for a WMI DLL Hijack scenario.

WindowsFile Event
TA0002 · ExecutionT1047 · Windows Management InstrumentationTA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Roberto Rodriguez (Cyb3rWard0g)+1Mon Oct 12windows
Detectionmediumexperimental

Clfs.SYS Loaded By Process Located In a Potential Suspicious Location

Detects Clfs.sys being loaded by a process running from a potentially suspicious location. Clfs.sys is loaded as part of many CVEs exploits that targets Common Log File.

WindowsImage Load (DLL)
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
X__JuniorMon Jan 20windows
Detectionhightest

DLL Loaded From Suspicious Location Via Cmspt.EXE

Detects cmstp loading "dll" or "ocx" files from suspicious locations

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1218.003 · CMSTP
Nasreddine Bencherchali (Nextron Systems)Tue Aug 30windows
Detectionhightest

PCRE.NET Package Image Load

Detects processes loading modules related to PCRE.NET package

WindowsImage Load (DLL)
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Roberto Rodriguez (Cyb3rWard0g)+1Thu Oct 29windows
Detectionmediumtest

PowerShell Core DLL Loaded By Non PowerShell Process

Detects loading of essential DLLs used by PowerShell by non-PowerShell process. Detects behavior similar to meterpreter's "load powershell" extension.

WindowsImage Load (DLL)
T1059.001 · PowerShellTA0002 · Execution
Tom Kern+5Thu Nov 14windows
Detectionmediumexperimental

Unsigned .node File Loaded

Detects the loading of unsigned .node files. Adversaries may abuse a lack of .node integrity checking to execute arbitrary code inside of trusted applications such as Slack. .node files are native add-ons for Electron-based applications, which are commonly used for desktop applications like Slack, Discord, and Visual Studio Code. This technique has been observed in the DripLoader malware, which uses unsigned .node files to load malicious native code into Electron applications.

WindowsImage Load (DLL)
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense Evasion+3
Jonathan BeierleSat Nov 22windows
Detectionmediumtest

DotNET Assembly DLL Loaded Via Office Application

Detects any assembly DLL being loaded by an Office Product

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
AntonlovesdnbWed Feb 19windows
Detectionmediumtest

CLR DLL Loaded Via Office Applications

Detects CLR DLL being loaded by an Office Product

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
AntonlovesdnbWed Feb 19windows
Detectionhightest

GAC DLL Loaded Via Office Applications

Detects any GAC DLL being loaded by an Office Product

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
AntonlovesdnbWed Feb 19windows
Detectionmediumtest

Microsoft Excel Add-In Loaded From Uncommon Location

Detects Microsoft Excel loading an Add-In (.xll) file from an uncommon location

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
Nasreddine Bencherchali (Nextron Systems)Fri May 12windows
Detectionmediumtest

Microsoft VBA For Outlook Addin Loaded Via Outlook

Detects outlvba (Microsoft VBA for Outlook Addin) DLL being loaded by the outlook process

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionhightest

VBA DLL Loaded Via Office Application

Detects VB DLL's loaded by an office application. Which could indicate the presence of VBA Macros.

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
AntonlovesdnbWed Feb 19windows
Detectionmediumtest

Remote DLL Load Via Rundll32.EXE

Detects a remote DLL load event via "rundll32.exe".

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
Nasreddine Bencherchali (Nextron Systems)Mon Sep 18windows
Detectionhightest

Abusable DLL Potential Sideloading From Suspicious Location

Detects potential DLL sideloading of DLLs that are known to be abused from suspicious locations

WindowsImage Load (DLL)
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
X__Junior (Nextron Systems)Tue Jul 11windows
Detectionmediumtest

Potential Mfdetours.DLL Sideloading

Detects potential DLL sideloading of "mfdetours.dll". While using "mftrace.exe" it can be abused to attach to an arbitrary process and force load any DLL named "mfdetours.dll" from the current directory of execution.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Thu Aug 03windows
Detectionhightest

Unsigned Mfdetours.DLL Sideloading

Detects DLL sideloading of unsigned "mfdetours.dll". Executing "mftrace.exe" can be abused to attach to an arbitrary process and force load any DLL named "mfdetours.dll" from the current directory of execution.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Fri Aug 11windows
Detectionhightest

Potential DLL Sideloading Of Non-Existent DLLs From System Folders

Detects loading of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes, potentially indicating phantom DLL hijacking attempts. Phantom DLL hijacking involves placing malicious DLLs with names of non-existent system binaries in locations where legitimate applications may search for them, leading to execution of the malicious DLLs.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Fri Dec 09windows
Detectionmediumtest

Unsigned Module Loaded by ClickOnce Application

Detects unsigned module load by ClickOnce application.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.001 · DLL Search Order Hijacking
@serkinvaleryThu Jun 08windows
Detectionlowtest

Python Image Load By Non-Python Process

Detects the image load of "Python Core" by a non-Python process. This might be indicative of a execution of executable that has been bundled from Python code. Various tools like Py2Exe, PyInstaller, and cx_Freeze are used to bundle Python code into standalone executables. Threat actors often use these tools to bundle malicious Python scripts into executables, sometimes to obfuscate the code or to bypass security measures.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1027.002 · Software Packing
Patrick St. John+1Sun May 03windows
Detectionhightest

DotNet CLR DLL Loaded By Scripting Applications

Detects .NET CLR DLLs being loaded by scripting applications such as wscript or cscript. This could be an indication of potential suspicious execution.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0002 · ExecutionTA0004 · Privilege EscalationT1055 · Process Injection
omkar72+1Wed Oct 14windows
Detectionmediumtest

Unsigned DLL Loaded by Windows Utility

Detects windows utilities loading an unsigned or untrusted DLL. Adversaries often abuse those programs to proxy execution of malicious code.

WindowsImage Load (DLL)
T1218.011 · Rundll32T1218.010 · Regsvr32TA0005 · Defense Evasion
Swachchhanda Shrawan PoudelWed Feb 28windows
Detectionhighstable

Suspicious Unsigned Thor Scanner Execution

Detects loading and execution of an unsigned thor scanner binary.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Sun Oct 29windows
Detectionmediumexperimental

MMC Loading Script Engines DLLs

Detects when the Microsoft Management Console (MMC) loads the DLL libraries like vbscript, jscript etc which might indicate an attempt to execute malicious scripts within a trusted system process for bypassing application whitelisting or defense evasion.

WindowsImage Load (DLL)
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1218.014 · MMC
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows