Sponsor of the Day:
Jerkmate
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_webbrowserpassview/
PUA - WebBrowserPassView Execution | Detection.FYI
Detects the execution of WebBrowserPassView.exe. A password recovery tool that reveals the passwords stored by the following Web browsers, Internet Explorer …
execution detection fyipua
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_agentexecutor_potential_abuse/
AgentExecutor PowerShell Execution | Detection.FYI
Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy
execution detection fyipowershell
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_kd_execution/
Windows Kernel Debugger Execution | Detection.FYI
Detects execution of the Windows Kernel Debugger
execution detection fyiwindows kerneldebugger
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_hydra/
HackTool - Hydra Password Bruteforce Execution | Detection.FYI
Detects command line parameters used by Hydra password guessing hack tool
execution detection fyihacktoolhydrapasswordbruteforce
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_logmein/
Remote Access Tool - LogMeIn Execution | Detection.FYI
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an …
remote access toolexecution detection fyilogmein
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_certipy/
HackTool - Certipy Execution | Detection.FYI
Detects Certipy execution, a tool for Active Directory Certificate Services enumeration and abuse based on PE metadata characteristics and common command line …
execution detection fyihacktool
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_netsupport/
Remote Access Tool - NetSupport Execution | Detection.FYI
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an …
remote access toolexecution detection fyinetsupport
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_dctask64/
Renamed ZOHO Dctask64 Execution | Detection.FYI
execution detection fyirenamedzoho
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_createdump/
Renamed CreateDump Utility Execution | Detection.FYI
Detects uses of a renamed legitimate createdump.exe LOLOBIN utility to dump process memory
execution detection fyirenamedutility
https://detection.fyi/sigmahq/sigma/windows/builtin/application/mssqlserver/win_mssql_xp_cmdshell_audit_log/
MSSQL XPCmdshell Suspicious Execution | Detection.FYI
Detects when the MSSQL
execution detection fyimssqlsuspicious
https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_rundll32_execution/
Potential Qakbot Rundll32 Execution | Detection.FYI
Detects specific process tree behavior of a
execution detection fyipotentialqakbotrundll32
https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/lace-tempest/proc_creation_win_apt_lace_tempest_loader_execution/
Lace Tempest Malware Loader Execution | Detection.FYI
Detects execution of a specific binary based on filename and hash used by Lace Tempest to load additional malware as reported by SysAid Team
execution detection fyimalware loaderlacetempest
https://detection.fyi/tags/attack.execution/
attack.execution | Detection.FYI
execution detection fyiattack
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ruby_inline_command_execution/
Ruby Inline Command Execution | Detection.FYI
Detects execution of ruby using the
command execution detectionrubyinlinefyi
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_netsupport_rat/
Renamed NetSupport RAT Execution | Detection.FYI
Detects the execution of a renamed
execution detection fyirenamednetsupportrat
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_frp/
PUA - Fast Reverse Proxy (FRP) Execution | Detection.FYI
Detects the use of Fast Reverse Proxy. frp is a fast reverse proxy to help you expose a local server behind a NAT or firewall to the Internet.
execution detection fyireverse proxypuafastfrp
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_device_credential_deployment/
DeviceCredentialDeployment Execution | Detection.FYI
Detects the execution of DeviceCredentialDeployment to hide a process from view.
execution detection fyi
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_python_adidnsdump/
PUA - Adidnsdump Execution | Detection.FYI
This tool enables enumeration and exporting of all DNS records in the zone for recon purposes of internal networks Python 3 and python.exe must be installed, …
execution detection fyipua
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_hollowreaper/
HackTool - HollowReaper Execution | Detection.FYI
Detects usage of HollowReaper, a process hollowing shellcode launcher used for stealth payload execution through process hollowing. It replaces the memory of a...
execution detection fyihacktool
https://detection.fyi/sigmahq/sigma/windows/builtin/application/screenconnect/win_app_remote_access_tools_screenconnect_command_exec/
Remote Access Tool - ScreenConnect Command Execution | Detection.FYI
Detects command execution via ScreenConnect RMM
remote access toolcommand execution detectionscreenconnectfyi
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharp_chisel/
HackTool - SharpChisel Execution | Detection.FYI
Detects usage of the Sharp Chisel via the commandline arguments
execution detection fyihacktool
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cloudflared_portable_execution/
Cloudflared Portable Execution | Detection.FYI
Detects the execution of the
execution detection fyicloudflaredportable
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_perl_inline_command_execution/
Perl Inline Command Execution | Detection.FYI
Detects execution of perl using the
command execution detectionperlinlinefyi
https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_veeam_credential_dumping_script/
Veeam Backup Servers Credential Dumping Script Execution | Detection.FYI
Detects execution of a PowerShell script that contains calls to the
execution detection fyiveeam backupcredential dumpingserversscript
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_screenconnect/
Remote Access Tool - ScreenConnect Execution | Detection.FYI
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an …
remote access toolexecution detection fyiscreenconnect
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hostname_execution/
Suspicious Execution of Hostname | Detection.FYI
Use of hostname to get information
suspicious executiondetection fyihostname
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_addinutil_uncommon_dir_exec/
AddinUtil.EXE Execution From Uncommon Directory | Detection.FYI
Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) from a non-standard directory.
detection fyiexeuncommondirectory
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wab_execution_from_non_default_location/
Wab Execution From Non Default Location | Detection.FYI
Detects execution of wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) from non default locations as seen with bumblebee activity
location detection fyinon defaultwabexecution
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mstsc_run_local_rpd_file_susp_parent/
Mstsc.EXE Execution From Uncommon Parent | Detection.FYI
Detects potential RDP connection via Mstsc using a local
detection fyiexeuncommonparent
https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_pua_trufflehog/
PUA - TruffleHog Execution - Linux | Detection.FYI
Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used …
linux detection fyipuatrufflehogexecution
https://detection.fyi/tsale/sigma_rules/malware/proc_creation_windows_raspberry_robin_mal-exec/
Raspberry Robin subsequent execution of commands | Detection.FYI
Detects raspberry robin subsequent execution of commands from
commands detection fyiraspberry robinsubsequentexecution
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_browsers_chromium_mockbin_abuse/
Chromium Browser Headless Execution To Mockbin Like Site | Detection.FYI
Detects the execution of a Chromium based browser process with the
chromium browserlike sitedetection fyiheadlessexecution
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_filefix_execution_pattern/
Suspicious FileFix Execution Pattern | Detection.FYI
Detects suspicious FileFix execution patterns where users are tricked into running malicious commands through browser file upload dialog manipulation. This …
pattern detection fyisuspiciousfilefixexecution
https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_python_http_server_execution/
Python WebServer Execution - Linux | Detection.FYI
Detects the execution of Python web servers via command line interface (CLI). After gaining access to target systems, adversaries may use Python's built-in...
linux detection fyipythonwebserverexecution
https://detection.fyi/sigmahq/sigma/emerging-threats/2022/malware/raspberry-robin/proc_creation_win_malware_raspberry_robin_external_drive_exec/
Raspberry Robin Initial Execution From External Drive | Detection.FYI
Detects the initial execution of the Raspberry Robin malware from an external drive using
raspberry robinexternal drivedetection fyiinitialexecution
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_curl_and_powershell_combo/
Scheduled Task Creation with Curl and PowerShell Execution Combo | Detection.FYI
Detects the creation of a scheduled task using schtasks.exe, potentially in combination with curl for downloading payloads and PowerShell for executing them. …
scheduled taskdetection fyicreationcurlpowershell
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wscript_cscript_dropper/
Potential Dropper Script Execution Via WScript/CScript | Detection.FYI
Detects wscript/cscript executions of scripts located in user directories
script executiondetection fyipotentialdroppervia
https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/icedid/proc_creation_win_malware_icedid_rundll32_dllregisterserver/
IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32 | Detection.FYI
Detects RunDLL32.exe executing a single digit DLL named
single digitexecution viadetection fyimalwaresuspicious
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_net_use_and_exec_combo/
Suspicious File Execution From Internet Hosted WebDav Share | Detection.FYI
Detects the execution of the
suspicious filedetection fyiexecutioninternethosted
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_instalutil_no_log_execution/
Suspicious Execution of InstallUtil Without Log | Detection.FYI
Uses the .NET InstallUtil.exe application in order to execute image without log
suspicious executionwithout logdetection fyi
https://detection.fyi/mbabinski/sigma-rules/2023_redcanary_threatdetectionreport/technique_smb_win_admin_shares_process_execution/
Process Execution from Admin Share (RedCanary Threat Detection Report) | Detection.FYI
Detects processes executing from an Admin Share. Part of the RedCanary 2023 Threat Detection Report.
redcanary threat detectionprocess executionadminsharereport
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_extensions/
Regsvr32 DLL Execution With Suspicious File Extension | Detection.FYI
Detects the execution of REGSVR32.exe with DLL files masquerading as other files
suspicious fileextension detectionregsvr32dllexecution
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_response_file/
Response File Execution Via Odbcconf.EXE | Detection.FYI
Detects execution of
exe detection fyiexecution viaresponsefile