Rule Library

Sigma Rules

412 rules found for "attack.T1059"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Potential Baby Shark Malware Activity

Detects activity that could be related to Baby Shark malware

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0007 · DiscoveryT1012 · Query Registry+4
Florian Roth (Nextron Systems)Sun Feb 242019
Emerging Threathighstable

Potential Emotet Activity

Detects all Emotet like process executions that are not covered by the more generic rules

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information+1
Florian Roth (Nextron Systems)Mon Sep 302019
Emerging Threatcriticalstable

Potential QBot Activity

Detects potential QBot activity by looking for process executions used previously by QBot

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual Basicdetection.emerging-threats
Florian Roth (Nextron Systems)Tue Oct 012019
Emerging Threathightest

Operation Wocao Activity

Detects activity mentioned in Operation Wocao report

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0007 · DiscoveryT1012 · Query Registry+7
Florian Roth (Nextron Systems)+1Fri Dec 202019
Emerging Threathightest

Operation Wocao Activity - Security

Detects activity mentioned in Operation Wocao report

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0007 · DiscoveryT1012 · Query Registry+7
Florian Roth (Nextron Systems)+1Fri Dec 202019
Emerging Threathightest

Exploited CVE-2020-10189 Zoho ManageEngine

Detects the exploitation of Zoho ManageEngine Desktop Central Java Deserialization vulnerability reported as CVE-2020-10189

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1059.001 · PowerShell+4
Florian Roth (Nextron Systems)Wed Mar 252020
Emerging Threathightest

Suspicious PrinterPorts Creation (CVE-2020-1048)

Detects new commands that add new printer port which point to suspicious file

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionT1059.001 · PowerShellcve.2020-1048+1
EagleEye Team+1Wed May 132020
Emerging Threatcriticaltest

Greenbug Espionage Group Indicators

Detects tools and process executions used by Greenbug in their May 2020 campaign as reported by Symantec

WindowsProcess Creation
G0049 · G0049TA0002 · ExecutionT1059.001 · PowerShellTA0011 · Command and Control+4
Florian Roth (Nextron Systems)Wed May 202020
Emerging Threatcriticaltest

Lazarus Group Activity

Detects different process execution behaviors as described in various threat reports on Lazarus group activity

WindowsProcess Creation
G0032 · Lazarus GroupTA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Florian Roth (Nextron Systems)+1Wed Dec 232020
Emerging Threathightest

UNC2452 Process Creation Patterns

Detects a specific process creation patterns as seen used by UNC2452 and provided by Microsoft as Microsoft Defender ATP queries

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Florian Roth (Nextron Systems)Fri Jan 222020
Emerging Threatcriticaltest

UNC2452 PowerShell Pattern

Detects a specific PowerShell command line pattern used by the UNC2452 actors as mentioned in Microsoft and Symantec reports

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1047 · Windows Management Instrumentationdetection.emerging-threats
Florian Roth (Nextron Systems)Wed Jan 202020
Emerging Threathightest

Potential Atlassian Confluence CVE-2021-26084 Exploitation Attempt

Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2021-26084

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationT1059 · Command and Scripting Interpreter+2
Bhabesh RajWed Sep 082021
Emerging Threathightest

Potential CVE-2021-40444 Exploitation Attempt

Detects potential exploitation of CVE-2021-40444 via suspicious process patterns seen in in-the-wild exploitations

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpretercve.2021-40444detection.emerging-threats
Florian Roth (Nextron Systems)Wed Sep 082021
Emerging Threathightest

Potential BlackByte Ransomware Activity

Detects command line patterns used by BlackByte ransomware in different operations

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0040 · ImpactT1485 · Data Destruction+4
Florian Roth (Nextron Systems)Fri Feb 252021
Emerging Threatcriticaltest

REvil Kaseya Incident Malware Patterns

Detects process command line patterns and locations used by REvil group in Kaseya incident (can also match on other malware)

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterG0115 · G0115detection.emerging-threats
Florian Roth (Nextron Systems)Sat Jul 032021
Emerging Threatmediumtest

Potential CVE-2022-22954 Exploitation Attempt - VMware Workspace ONE Access Remote Code Execution

Detects potential exploitation attempt of CVE-2022-22954, a remote code execution vulnerability in VMware Workspace ONE Access and Identity Manager. As reported by Morphisec, part of the attack chain, threat actors used PowerShell commands that executed as a child processes of the legitimate Tomcat "prunsrv.exe" process application.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1059.006 · PythonT1190 · Exploit Public-Facing Application+2
kostastsaleMon Apr 252022
Emerging Threathightest

CVE-2022-24527 Microsoft Connected Cache LPE

Detects files created during the local privilege exploitation of CVE-2022-24527 Microsoft Connected Cache

WindowsFile Event
TA0002 · ExecutionTA0004 · Privilege EscalationT1059.001 · PowerShellcve.2022-24527+1
Florian Roth (Nextron Systems)Wed Apr 132022
Emerging Threathightest

Atlassian Confluence CVE-2022-26134

Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2022-26134

LinuxProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationT1059 · Command and Scripting Interpreter+2
Nasreddine Bencherchali (Nextron Systems)Fri Jun 032022
Emerging Threathightest

Potential Bumblebee Remote Thread Creation

Detects remote thread injection events based on action seen used by bumblebee

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell+1
Nasreddine Bencherchali (Nextron Systems)Tue Sep 272022
Emerging Threathightest

ChromeLoader Malware Execution

Detects execution of ChromeLoader malware via a registered scheduled task

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+3
kostastsaleMon Jan 102022
Emerging Threathightest

Emotet Loader Execution Via .LNK File

Detects the Emotet Epoch4 loader as reported by @malware_traffic back in 2022. The ".lnk" file was delivered via phishing campaign.

WindowsProcess Creation
TA0002 · ExecutionT1059.006 · Pythondetection.emerging-threats
kostastsaleFri Apr 222022
Emerging Threathightest

Raspberry Robin Subsequent Execution of Commands

Detects raspberry robin subsequent execution of commands.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleFri May 062022
Emerging Threathightest

Raspberry Robin Initial Execution From External Drive

Detects the initial execution of the Raspberry Robin malware from an external drive using "Cmd.EXE".

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleFri May 062022
Emerging Threathightest

Serpent Backdoor Payload Execution Via Scheduled Task

Detects post exploitation execution technique of the Serpent backdoor. According to Proofpoint, one of the commands that the backdoor ran was via creating a temporary scheduled task using an unusual method. It creates a fictitious windows event and a trigger in which once the event is created, it executes the payload.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+2
kostastsaleMon Mar 212022
Emerging Threathightest

FakeUpdates/SocGholish Activity

Detects initial execution of FakeUpdates/SocGholish malware via wscript that later executes commands via cmd or powershell.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleThu Jun 162022
Emerging Threathightest

MERCURY APT Activity

Detects suspicious command line patterns seen being used by MERCURY APT

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellG0069 · G0069detection.emerging-threats
Florian Roth (Nextron Systems)Fri Aug 262022
Emerging Threathightest

CVE-2023-22518 Exploitation Attempt - Suspicious Confluence Child Process (Linux)

Detects exploitation attempt of CVE-2023-22518 (Confluence Data Center / Confluence Server), where an attacker can exploit vulnerable endpoints to e.g. create admin accounts and execute arbitrary commands.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Andreas Braathen (mnemonic.io)Tue Nov 142023
Emerging Threatmediumtest

CVE-2023-22518 Exploitation Attempt - Suspicious Confluence Child Process (Windows)

Detects exploitation attempt of CVE-2023-22518 (Confluence Data Center / Confluence Server), where an attacker can exploit vulnerable endpoints to e.g. create admin accounts and execute arbitrary commands.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Andreas Braathen (mnemonic.io)Tue Nov 142023
Emerging Threatmediumtest

Potential MOVEit Transfer CVE-2023-34362 Exploitation - Dynamic Compilation Via Csc.EXE

Detects the execution of "csc.exe" via "w3wp.exe" process. MOVEit affected hosts execute "csc.exe" via the "w3wp.exe" process to dynamically compile malicious DLL files. MOVEit is affected by a critical vulnerability. Exploited hosts show evidence of dynamically compiling a DLL and writing it under C:\\Windows\\Microsoft\.NET\\Framework64\\v4\.0\.30319\\Temporary ASP\.NET Files\\root\\([a-z0-9]{5,12})\\([a-z0-9]{5,12})\\App_Web_[a-z0-9]{5,12}\.dll. Hunting Opportunity Events from IIS dynamically compiling binaries via the csc.exe on behalf of the MOVEit application, especially since May 27th should be investigated.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpretercve.2023-34362detection.emerging-threats
kostastsaleThu Jun 012023
Emerging Threatmediumtest

DarkGate - Autoit3.EXE File Creation By Uncommon Process

Detects the usage of curl.exe, KeyScramblerLogon, or other non-standard/suspicious processes used to create Autoit3.exe. This activity has been associated with DarkGate malware, which uses Autoit3.exe to execute shellcode that performs process injection and connects to the DarkGate command-and-control server. Curl, KeyScramblerLogon, and these other processes consitute non-standard and suspicious ways to retrieve the Autoit3 executable.

WindowsFile Event
TA0011 · Command and ControlTA0002 · ExecutionT1105 · Ingress Tool TransferT1059 · Command and Scripting Interpreter+1
Micah BabinskiSun Oct 152023
Emerging Threathightest

DarkGate - Autoit3.EXE Execution Parameters

Detects execution of the legitimate Autoit3 utility from a suspicious parent process. AutoIt3.exe is used within the DarkGate infection chain to execute shellcode that performs process injection and connects to the DarkGate command-and-control server.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Micah BabinskiSun Oct 152023
Emerging Threatmediumtest

Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE

Detects the execution of concatenated commands via "cmd.exe". Pikabot often executes a combination of multiple commands via the command handler "cmd /c" in order to download and execute additional payloads. Commands such as "curl", "wget" in order to download extra payloads. "ping" and "timeout" are abused to introduce delays in the command execution and "Rundll32" is also used to execute malicious DLL files. In the observed Pikabot infections, a combination of the commands described above are used to orchestrate the download and execution of malicious DLL files.

WindowsProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlTA0002 · ExecutionT1059.003 · Windows Command Shell+3
Alejandro HouspanossianTue Jan 022023
Emerging Threatcriticaltest

Rorschach Ransomware Execution Activity

Detects Rorschach ransomware execution activity

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellT1059.001 · PowerShellTA0005 · Defense Evasion+1
X__Junior (Nextron Systems)Tue Apr 042023
Emerging Threathightest

Ursnif Redirection Of Discovery Commands

Detects the redirection of Ursnif discovery commands as part of the initial execution of the malware.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
kostastsaleSun Jul 162023
Emerging Threathightest

Potential APT FIN7 POWERHOLD Execution

Detects execution of the POWERHOLD script seen used by FIN7 as reported by WithSecureLabs

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential POWERTRASH Script Execution

Detects potential execution of the PowerShell script POWERTRASH

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Lace Tempest PowerShell Evidence Eraser

Detects a PowerShell script used by Lace Tempest APT to erase evidence from victim servers by exploiting CVE-2023-47246 as reported by SysAid Team

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest PowerShell Launcher

Detects a PowerShell script used by Lace Tempest APT to launch their malware loader by exploiting CVE-2023-47246 as reported by SysAid Team

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threatmediumtest

DarkGate - Drop DarkGate Loader In C:\Temp Directory

Detects attackers attempting to save, decrypt and execute the DarkGate Loader in C:\temp folder.

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Tomasz Dyduch+1Fri May 312024
Emerging Threatmediumtest

Potential KamiKakaBot Activity - Lure Document Execution

Detects the execution of a Word document via the WinWord Start Menu shortcut. This behavior was observed being used by KamiKakaBot samples in order to initiate the 2nd stage of the infection.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Mar 222024
Emerging Threatmediumtest

Potential APT FIN7 Exploitation Activity

Detects potential APT FIN7 exploitation activity as reported by Google. In order to obtain initial access, FIN7 used compromised Remote Desktop Protocol (RDP) credentials to login to a target server and initiate specific Windows process chains.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shelldetection.emerging-threats
Alex WalstonMon Jul 292024
Emerging Threathighexperimental

Potential Exploitation of GoAnywhere MFT Vulnerability

Detects suspicious command execution by child processes of the GoAnywhere Managed File Transfer (MFT) application, which may indicate exploitation such as CVE-2025-10035. This behavior is indicative of post-exploitation activity related to CVE-2025-10035, as observed in campaigns by the threat actor Storm-1175.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1059.001 · PowerShell+4
MSFT+1Tue Oct 072025
Emerging Threathighexperimental

Suspicious Process Spawned by CentreStack Portal AppPool

Detects unexpected command shell execution (cmd.exe) from w3wp.exe when tied to CentreStack's portal.config, indicating potential exploitation (e.g., CVE-2025-30406)

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionT1059.003 · Windows Command ShellT1505.003 · Web Shell+2
Jason Rathbun (Blackpoint Cyber)Thu Apr 172025
Emerging Threatmediumexperimental

Suspicious CrushFTP Child Process

Detects suspicious child processes spawned by the CrushFTP service that may indicate exploitation of remote code execution vulnerabilities such as CVE-2025-31161, where attackers can achieve RCE through crafted HTTP requests. The detection focuses on commonly abused Windows executables (like powershell.exe, cmd.exe etc.) that attackers typically use post-exploitation to execute malicious commands.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shell+3
Craig Sweeney+6Thu Apr 102025
Emerging Threatmediumexperimental

Potential SAP NetWeaver Webshell Creation - Linux

Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as CVE-2025-31324.

LinuxFile Event
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Potential SAP NetWeaver Webshell Creation

Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as CVE-2025-31324.

WindowsFile Event
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver - Linux

Detects suspicious child processes spawned by SAP NetWeaver on Linux systems that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

LinuxProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver

Detects suspicious child processes spawned by SAP NetWeaver that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025