Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE
Detects the execution of concatenated commands via "cmd.exe". Pikabot often executes a combination of multiple commands via the command handler "cmd /c" in order to download and execute additional payloads. Commands such as "curl", "wget" in order to download extra payloads. "ping" and "timeout" are abused to introduce delays in the command execution and "Rundll32" is also used to execute malicious DLL files. In the observed Pikabot infections, a combination of the commands described above are used to orchestrate the download and execution of malicious DLL files.
Sigma rule (View on GitHub)
1title: Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE
2id: e5144106-8198-4f6e-bfc2-0a551cc8dd94
3status: test
4description: |
5 Detects the execution of concatenated commands via "cmd.exe". Pikabot often executes a combination of multiple commands via the command handler "cmd /c" in order to download and execute additional payloads.
6 Commands such as "curl", "wget" in order to download extra payloads. "ping" and "timeout" are abused to introduce delays in the command execution and "Rundll32" is also used to execute malicious DLL files.
7 In the observed Pikabot infections, a combination of the commands described above are used to orchestrate the download and execution of malicious DLL files.
8references:
9 - https://github.com/pr0xylife/Pikabot/blob/7f7723a74ca325ec54c6e61e076acce9a4b20538/Pikabot_30.10.2023.txt
10 - https://github.com/pr0xylife/Pikabot/blob/7f7723a74ca325ec54c6e61e076acce9a4b20538/Pikabot_22.12.2023.txt
11author: Alejandro Houspanossian ('@lekz86')
12date: 2024-01-02
13tags:
14 - attack.defense-evasion
15 - attack.command-and-control
16 - attack.execution
17 - attack.t1059.003
18 - attack.t1105
19 - attack.t1218
20 - detection.emerging-threats
21logsource:
22 product: windows
23 category: process_creation
24detection:
25 selection_cmd:
26 CommandLine|contains|all:
27 - 'cmd'
28 - '/c'
29 selection_pipes:
30 CommandLine|contains:
31 - ' & '
32 - ' || '
33 selection_commands_1:
34 CommandLine|contains:
35 - ' curl'
36 - ' wget'
37 - ' timeout '
38 - ' ping '
39 selection_commands_2:
40 CommandLine|contains:
41 - ' rundll32'
42 - ' mkdir '
43 condition: all of selection_*
44falsepositives:
45 - Unknown
46level: medium
References
Related rules
- Potential Exploitation of RCE Vulnerability CVE-2025-33053
- Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Image Load
- Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Process Access
- Potential Suspicious Child Process Of 3CXDesktopApp
- Scheduled Task Creation with Curl and PowerShell Execution Combo