-
AWS EC2 LOLBin Execution via SSM SendCommand
Dec 5, 2025 · Domain: Cloud Domain: Endpoint OS: Linux Use Case: Threat Detection Tactic: Execution Tactic: Command and Control Data Source: AWS Data Source: Amazon Web Services Data Source: AWS CloudTrail Data Source: AWS EC2 Data Source: AWS SSM Data Source: AWS Systems Manager Data Source: Elastic Defend Resources: Investigation Guide ·Identifies the execution of Living Off the Land Binaries (LOLBins) or GTFOBins on EC2 instances via AWS Systems Manager (SSM)
SendCommandAPI. This detection correlates AWS CloudTrailSendCommandevents with endpoint process execution by matching SSM command IDs. While AWS redacts command parameters in CloudTrail logs, this correlation technique reveals the actual commands executed on EC2 instances. Adversaries may abuse SSM to execute malicious commands remotely without requiring SSH or RDP access, using legitimate system utilities for data exfiltration, establishing reverse shells, or lateral movement.
Read More -
Identifies the first occurrence of an AWS user or role establishing a session via SSM to an EC2 instance. Adversaries may use AWS Session Manager to establish a session to an EC2 instance to execute commands on the instance. This can be used to gain access to the instance and perform actions such as privilege escalation.
Read More -
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript, RunPowerShellScript or custom documents. While legitimate users may employ these commands for management tasks, they can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells for further access to compromised instances. This is a New Terms rule that looks for the first instance of this behavior by a user or role.
Read More -
Identifies when an AWS Systems Manager (SSM) command document is created by a user or role who does not typically perform this action. Adversaries may create SSM command documents to execute commands on managed instances, potentially leading to unauthorized access, command and control, data exfiltration and more.
Read More