heroui logo

Indirect Inline Command Execution Via Bash.EXE

Sigma Rules

View Source
Summary
This detection rule identifies potential threats associated with the execution of the Microsoft Bash launcher (bash.exe) with the '-c' command line flag. This flag enables the direct execution of commands or scripts, which can be leveraged by adversaries for command injection or to execute binary code, thereby bypassing standard security measures. By monitoring process creation events targeting bash.exe specifically within the Windows operating environment, the rule can flag anomalous command execution attempts that may signify an attempt at defense evasion or unauthorized command execution. Detected commands executed through Bash could indicate the presence of malicious activity, making it crucial in identifying threats that exploit this functionality. Organizations should correlate these detections with behavioral analytics to reduce false positives and examine the context of these executions for deeper threat assessment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2021-11-24