Windows Explorer Spawning Command Shell with Start and Exit Commands

This detection analytic looks for instances of explorer.exe spawning cmd.exe along with corresponding start and exit commands that we commonly observe in conjunction with a wide variety of malicious activity. Part of the RedCanary 2024 Threat Detection Report.

Sigma rule (View on GitHub)

 1title: Windows Explorer Spawning Command Shell with Start and Exit Commands
 2id: ebb4eaad-9909-4785-a038-97bdee8aa5ae
 3status: experimental
 4description: |
 5    This detection analytic looks for instances of explorer.exe spawning cmd.exe along 
 6    with corresponding start and exit commands that we commonly observe in conjunction 
 7    with a wide variety of malicious activity. Part of the RedCanary 2024 Threat 
 8    Detection Report.    
 9references:
10    - https://redcanary.com/threat-detection-report/techniques/windows-command-shell/
11author: RedCanary, Sigma formatting by Micah Babinski
12date: 2024/03/21
13tags:
14    - attack.execution
15    - attack.t1059
16    - attack.t1059.003
17    - attack.t1053
18logsource:
19    category: process_creation
20    product: windows
21detection:
22    selection:
23        ParentImage|endswith: '\explorer.exe'
24        Image|endswith: '\cmd.exe'
25        CommandLine|contains|all:
26            - 'start'
27            - 'exit'
28    condition: selection
29falsepositives:
30    - Unknown
31level: low```

References

Related rules

to-top