Rule Library

Sigma Rules

412 rules found for "attack.T1059"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Scheduled Task Executing Payload from Registry

Detects the creation of a schtasks that potentially executes a payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
X__Junior (Nextron Systems)+1Tue Jul 18windows
Detectionhightest

Scheduled Task Executing Encoded Payload from Registry

Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+3Sat Feb 12windows
Detectionlowexperimental

NodeJS Execution of JavaScript File

Detects execution of JavaScript or JSC files using NodeJs binary node.exe, that could be potentially suspicious. Node.js is a popular open-source JavaScript runtime that runs code outside browsers and is widely used for both frontend and backend development. Adversaries have been observed abusing Node.js to disguise malware as legitimate processes, evade security defenses, and maintain persistence within target systems. Because Node.js is commonly used, this rule may generate false positives in some environments. However, if such activity is unusual in your environment, it is highly suspicious and warrants immediate investigation.

WindowsProcess Creation
TA0002 · ExecutionT1059.007 · JavaScript
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Apr 21windows
Detectionmediumexperimental

Suspicious Usage of For Loop with Recursive Directory Search in CMD

Detects suspicious usage of the cmd.exe 'for /f' loop combined with the 'tokens=' parameter and a recursive directory listing. This pattern may indicate an attempt to discover and execute system binaries dynamically, for example powershell, a technique sometimes used by attackers to evade detection. This behavior has been observed in various malicious lnk files.

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0005 · Defense EvasionT1027.010 · Command Obfuscation
Joseliyo SanchezWed Nov 12windows
Detectionhightest

Potential Data Exfiltration Activity Via CommandLine Tools

Detects the use of various CLI utilities exfiltrating data via web requests

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionmediumtest

Elevated System Shell Spawned From Uncommon Parent Location

Detects when a shell program such as the Windows command prompt or PowerShell is launched with system privileges from a uncommon parent location.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
François Hubaut+1Mon Dec 05windows
Detectionmediumtest

Hidden Powershell in Link File Pattern

Detects events that appear when a user click on a link file with a powershell command in it

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Feb 06windows
Detectionhightest

Potentially Suspicious Execution From Parent Process In Public Folder

Detects a potentially suspicious execution of a parent process located in the "\Users\Public" folder executing a child process containing references to shell or scripting binaries and commandlines.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1564 · Hide ArtifactsT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Fri Feb 25windows
Detectionmediumtest

Suspicious File Characteristics Due to Missing Fields

Detects Executables in the Downloads folder without FileVersion,Description,Product,Company likely created with py2exe

WindowsProcess Creation
TA0002 · ExecutionT1059.006 · Python
Markus Neis+1Thu Nov 22windows
Detectionhightest

Suspicious Reconnaissance Activity Via GatherNetworkInfo.VBS

Detects execution of the built-in script located in "C:\Windows\System32\gatherNetworkInfo.vbs". Which can be used to gather information about the target machine

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1615 · Group Policy DiscoveryT1059.005 · Visual Basic
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

Writing Of Malicious Files To The Fonts Folder

Monitors for the hiding possible malicious files in the C:\Windows\Fonts\ location. This folder doesn't require admin privillege to be written and executed from.

WindowsProcess Creation
T1211 · Exploitation for Defense EvasionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionTA0003 · Persistence+1
SreemanTue Apr 21windows
Detectionmediumexperimental

Potentially Suspicious Inline JavaScript Execution via NodeJS Binary

Detects potentially suspicious inline JavaScript execution using Node.js with specific keywords in the command line.

WindowsProcess Creation
TA0002 · ExecutionT1059.007 · JavaScript
Microsoft+1Mon Apr 21windows
Detectionmediumtest

Suspicious Scan Loop Network

Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0007 · DiscoveryT1018 · Remote System Discovery
François HubautSat Mar 12windows
Detectionhightest

Suspicious Program Names

Detects suspicious patterns in program names or folders that are often found in malicious samples or hacktools

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Fri Feb 11windows
Detectionhightest

Script Interpreter Execution From Suspicious Folder

Detects a suspicious script execution in temporary folders or folders accessible by environment variables

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Feb 08windows
Detectionhightest

Suspicious Script Execution From Temp Folder

Detects a suspicious script executions from temporary folder

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+2Wed Jul 14windows
Detectionhighexperimental

Script Interpreter Spawning Credential Scanner - Windows

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets, as seen in the "Shai-Hulud: The Second Coming" campaign.

WindowsProcess Creation
TA0006 · Credential AccessT1552 · Unsecured CredentialsTA0009 · CollectionTA0002 · Execution+2
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 25windows
Detectionhightest

Windows Shell/Scripting Processes Spawning Suspicious Programs

Detects suspicious child processes of a Windows shell and scripting processes such as wscript, rundll32, powershell, mshta...etc.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1059.001 · PowerShell+1
Florian Roth (Nextron Systems)+1Fri Apr 06windows
Detectionmediumtest

Usage Of Web Request Commands And Cmdlets

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via CommandLine

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
James Pemberton+4Thu Oct 24windows
Detectionmediumtest

Sysprep on AppData Folder

Detects suspicious sysprep process start with AppData folder as target (as used by Trojan Syndicasec in Thrip report by Symantec)

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Fri Jun 22windows
Detectionmediumexperimental

Registry Modification Attempt Via VBScript

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods via common LOLBINs. It could be an attempt to modify the registry for persistence without using straightforward methods like regedit.exe, reg.exe, or PowerShell. Threat Actors may use this technique to evade detection by security solutions that monitor for direct registry modifications through traditional tools.

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionmediumtest

Potential Persistence Via VMwareToolBoxCmd.EXE VM State Change Script

Detects execution of the "VMwareToolBoxCmd.exe" with the "script" and "set" flag to setup a specific script to run for a specific VM state

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Jun 14windows
Detectionhightest

Suspicious Persistence Via VMwareToolBoxCmd.EXE VM State Change Script

Detects execution of the "VMwareToolBoxCmd.exe" with the "script" and "set" flag to setup a specific script that's located in a potentially suspicious location to run for a specific VM state

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Jun 14windows
Detectionhightest

VMToolsd Suspicious Child Process

Detects suspicious child process creations of VMware Tools process which may indicate persistence setup

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
bohops+1Fri Oct 08windows
Detectionmediumtest

Potentially Suspicious WebDAV LNK Execution

Detects possible execution via LNK file accessed on a WebDAV server.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1204 · User Execution
Micah BabinskiMon Aug 21windows
Detectionmediumtest

Add New Download Source To Winget

Detects usage of winget to add new additional download sources

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Apr 17windows
Detectionhightest

Add Insecure Download Source To Winget

Detects usage of winget to add a new insecure (http) download source. Winget will not allow the addition of insecure sources, hence this could indicate potential suspicious activity (or typos)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Apr 17windows
Detectionmediumtest

Add Potential Suspicious New Download Source To Winget

Detects usage of winget to add new potentially suspicious download sources

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Apr 17windows
Detectionmediumtest

Install New Package Via Winget Local Manifest

Detects usage of winget to install applications via manifest file. Adversaries can abuse winget to download payloads remotely and execute them. The manifest option enables you to install an application by passing in a YAML file directly to the client. Winget can be used to download and install exe, msi or msix files later.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Sreeman+2Tue Apr 21windows
Detectionmediumtest

Remote PowerShell Session Host Process (WinRM)

Detects remote PowerShell sections by monitoring for wsmprovhost (WinRM host process) as a parent or child process (sign of an active PowerShell remote session).

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1059.001 · PowerShellT1021.006 · Windows Remote Management
Roberto Rodriguez (Cyb3rWard0g)Thu Sep 12windows
Detectionhightest

Potential Remote SquiblyTwo Technique Execution

Detects potential execution of the SquiblyTwo technique that leverages Windows Management Instrumentation (WMI) to execute malicious code remotely. This technique bypasses application whitelisting by using wmic.exe to process malicious XSL (eXtensible Stylesheet Language) scripts that can contain embedded JScript or VBScript. The attack typically works by fetching XSL content from a remote source (using HTTP/HTTPS) and executing it with full trust privileges directly in memory, avoiding disk-based detection mechanisms. This is a common LOLBin (Living Off The Land Binary) technique used for defense evasion and code execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1047 · Windows Management InstrumentationT1220 · XSL Script ProcessingTA0002 · Execution+2
Markus Neis+2Wed Jan 16windows
Detectionmediumtest

XSL Script Execution Via WMIC.EXE

Detects the execution of WMIC with the "format" flag to potentially load local XSL files. Adversaries abuse this functionality to execute arbitrary files while potentially bypassing application whitelisting defenses. Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML files.

WindowsProcess Creation
TA0005 · Defense EvasionT1047 · Windows Management InstrumentationT1220 · XSL Script ProcessingTA0002 · Execution+2
Timur Zinniatullin+2Mon Oct 21windows
Detectionmediumstable

Potential WMI Lateral Movement WmiPrvSE Spawned PowerShell

Detects Powershell as a child of the WmiPrvSE process. Which could be a sign of lateral movement via WMI.

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management InstrumentationT1059.001 · PowerShell
Markus NeisWed Apr 03windows
Detectionmediumtest

Potential Dropper Script Execution Via WScript/CScript

Detects wscript/cscript executions of scripts located in user directories

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScript
Margaritis Dimitrios+3Wed Jan 16windows
Detectionhightest

Cscript/Wscript Uncommon Script Extension Execution

Detects Wscript/Cscript executing a file with an uncommon (i.e. non-script) extension

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScript
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionhighexperimental

Installation of WSL Kali-Linux

Detects installation of Kali Linux distribution through Windows Subsystem for Linux (WSL). Attackers may use Kali Linux WSL to leverage its penetration testing tools and capabilities for malicious purposes.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Oct 10windows
Detectionmediumexperimental

Registry Tampering by Potentially Suspicious Processes

Detects suspicious registry modifications made by suspicious processes such as script engine processes such as WScript, or CScript etc. These processes are rarely used for legitimate registry modifications, and their activity may indicate an attempt to modify the registry without using standard tools like regedit.exe or reg.exe, potentially for evasion and persistence.

WindowsRegistry Event
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionhightest

Potentially Suspicious Command Executed Via Run Dialog Box - Registry

Detects execution of commands via the run dialog box on Windows by checking values of the "RunMRU" registry key. This technique was seen being abused by threat actors to deceive users into pasting and executing malicious commands, often disguised as CAPTCHA verification steps.

WindowsRegistry Set
TA0002 · ExecutionT1059.001 · PowerShell
Ahmed Farouk+1Fri Nov 01windows
Detectionhightest

Suspicious Scripting in a WMI Consumer

Detects suspicious commands that are related to scripting/powershell in WMI Event Consumers

WindowsWMI Event
TA0002 · ExecutionT1059.005 · Visual Basic
Florian Roth (Nextron Systems)+1Mon Apr 15windows
Emerging Threatcriticaltest

ZxShell Malware

Detects a ZxShell start by the called and well-known function name

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0005 · Defense EvasionT1218.011 · Rundll32+3
Florian Roth (Nextron Systems)+2Thu Jul 202014
Emerging Threatcriticaltest

Turla Group Lateral Movement

Detects automated lateral movement by Turla group

WindowsProcess Creation
G0010 · G0010TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0008 · Lateral Movement+5
Markus NeisTue Nov 072014
Emerging Threatcriticaltest

Turla Group Commands May 2020

Detects commands used by Turla group as reported by ESET in May 2020

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionG0010 · G0010+5
Florian Roth (Nextron Systems)Tue May 262014
Emerging Threathightest

Adwind RAT / JRAT

Detects javaw.exe in AppData folder as used by Adwind / JRAT

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScriptdetection.emerging-threats
Florian Roth (Nextron Systems)+3Fri Nov 102017
Emerging Threathightest

Potential APT10 Cloud Hopper Activity

Detects potential process and execution activity related to APT10 Cloud Hopper operation

WindowsProcess Creation
TA0002 · ExecutionG0045 · G0045T1059.005 · Visual Basicdetection.emerging-threats
Florian Roth (Nextron Systems)Fri Apr 072017
Emerging Threatcriticaltest

Elise Backdoor Activity

Detects Elise backdoor activity used by APT32

WindowsProcess Creation
G0030 · G0030G0050 · APT32S0081 · S0081TA0002 · Execution+2
Florian Roth (Nextron Systems)+1Wed Jan 312018
Emerging Threathightest

Sofacy Trojan Loader Activity

Detects Trojan loader activity as used by APT28

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionG0007 · APT28T1059.003 · Windows Command Shell+3
Florian Roth (Nextron Systems)+2Thu Mar 012018
Emerging Threathighstable

TropicTrooper Campaign November 2018

Detects TropicTrooper activity, an actor who targeted high-profile organizations in the energy and food and beverage sectors in Asia

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
@41thexplorer+1Tue Nov 122018
Emerging Threathightest

Exploiting SetupComplete.cmd CVE-2019-1378

Detects exploitation attempt of privilege escalation vulnerability via SetupComplete.cmd and PartnerSetupComplete.cmd described in CVE-2019-1378

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation+5
Florian Roth (Nextron Systems)+2Fri Nov 152019