Potential Remote SquiblyTwo Technique Execution

Detects potential execution of the SquiblyTwo technique that leverages Windows Management Instrumentation (WMI) to execute malicious code remotely. This technique bypasses application whitelisting by using wmic.exe to process malicious XSL (eXtensible Stylesheet Language) scripts that can contain embedded JScript or VBScript. The attack typically works by fetching XSL content from a remote source (using HTTP/HTTPS) and executing it with full trust privileges directly in memory, avoiding disk-based detection mechanisms. This is a common LOLBin (Living Off The Land Binary) technique used for defense evasion and code execution.

Sigma rule (View on GitHub)

 1title: Potential Remote SquiblyTwo Technique Execution
 2id: 8d63dadf-b91b-4187-87b6-34a1114577ea
 3related:
 4    - id: 06ce37c2-61ab-4f05-9ff5-b1a96d18ae32
 5      type: similar
 6    - id: 05c36dd6-79d6-4a9a-97da-3db20298ab2d
 7      type: similar
 8status: test
 9description: |
10    Detects potential execution of the SquiblyTwo technique that leverages Windows Management Instrumentation (WMI)
11    to execute malicious code remotely. This technique bypasses application whitelisting by using wmic.exe to process
12    malicious XSL (eXtensible Stylesheet Language) scripts that can contain embedded JScript or VBScript.
13    The attack typically works by fetching XSL content from a remote source (using HTTP/HTTPS) and executing it
14    with full trust privileges directly in memory, avoiding disk-based detection mechanisms. This is a common
15    LOLBin (Living Off The Land Binary) technique used for defense evasion and code execution.    
16references:
17    - https://web.archive.org/web/20190209154607/https://subt0x11.blogspot.com/2018/04/wmicexe-whitelisting-bypass-hacking.html
18    - https://twitter.com/mattifestation/status/986280382042595328 # Deleted
19    - https://atomicredteam.io/defense-evasion/T1220/
20    - https://lolbas-project.github.io/lolbas/Binaries/Wmic/
21    - https://x.com/byrne_emmy12099/status/1932346420226658668
22author: Markus Neis, Florian Roth, Swachchhanda Shrawan Poudel (Nextron Systems)
23date: 2019-01-16
24modified: 2026-01-24
25tags:
26    - attack.defense-evasion
27    - attack.t1047
28    - attack.t1220
29    - attack.execution
30    - attack.t1059.005
31    - attack.t1059.007
32logsource:
33    category: process_creation
34    product: windows
35detection:
36    selection_pe:
37        - Image|endswith: '\wmic.exe'
38        - OriginalFileName: 'wmic.exe'
39        - Hashes|contains:  # Sysmon field hashes contains all types
40              - 'IMPHASH=1B1A3F43BF37B5BFE60751F2EE2F326E'
41              - 'IMPHASH=37777A96245A3C74EB217308F3546F4C'
42              - 'IMPHASH=9D87C9D67CE724033C0B40CC4CA1B206'
43              - 'IMPHASH=B12619881D79C3ACADF45E752A58554A'
44              - 'IMPHASH=16A48C3CABF98A9DC1BF02C07FE1EA00'
45    selection_cli:
46        CommandLine|contains|windash: '/format:'
47        CommandLine|contains:
48            - '://'
49            - '\\\\'
50    condition: all of selection_*
51falsepositives:
52    - Unknown
53level: high

References

Related rules

to-top