heroui logo

Cmd Launched with Hidden Start Flags to Suspicious Targets

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious use of the command line in Windows, specifically targeting the execution of cmd.exe with hidden start flags. It looks for instances where the 'start' utility is invoked with either '/b' (to execute in the background without a window) or '/min' (to run minimized), which are techniques often employed by malware to obscure their actions. To minimize false positives, this rule only triggers in scenarios where the target is a script file (recognized by its extension) or located in suspicious directories, such as temporary or public folders known for misuse in malware campaigns. This technique has been associated with malware families such as Chaos, DarkSide, and Emotet, emphasizing the need for vigilance in monitoring command execution patterns in Windows environments. The rule considers various command line patterns to capture a broad range of potential attacks, while also listing known legitimate cases of false positives.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2026-01-24