Shai-Hulud Malware Indicators - Windows
Detects potential Shai-Hulud malware indicators based on specific command line arguments associated with its execution.
Sigma rule (View on GitHub)
1title: Shai-Hulud Malware Indicators - Windows
2id: 540703fb-a874-4385-a9d6-7cd1bfab268c
3related:
4 - id: 11bb9b26-4179-4a06-afcb-1ec31fce1627
5 type: similar
6 - id: 8f2a9c3b-7e5d-4f1a-9b8e-2c4d6a8f9e1b
7 type: similar
8status: experimental
9description: |
10 Detects potential Shai-Hulud malware indicators based on specific command line arguments associated with its execution.
11references:
12 - https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack
13 - https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains
14 - https://semgrep.dev/blog/2025/digging-for-secrets-sha1-hulud-the-second-coming-of-the-npm-worm/
15author: Swachchhanda Shrawan Poudel (Nextron Systems)
16date: 2025-11-25
17tags:
18 - attack.execution
19 - attack.t1059
20 - detection.emerging-threats
21logsource:
22 category: process_creation
23 product: windows
24detection:
25 selection:
26 CommandLine|contains:
27 - 'Shai-Hulud'
28 - 'SHA1HULUD'
29 condition: selection
30falsepositives:
31 - Legitimate software containing similar strings
32level: high
33regression_tests_path: regression_data/rules-emerging-threats/2025/Malware/Shai-Hulud/proc_creation_win_mal_shai_hulud_indicator/info.yml
References
Related rules
- Shai-Hulud Malware Indicators - Linux
- Linux Suspicious Child Process from Node.js - React2Shell
- Windows Suspicious Child Process from Node.js - React2Shell
- Atlassian Confluence CVE-2022-26134
- DarkGate - Drop DarkGate Loader In C:\Temp Directory