heroui logo

Indirect Command Execution From Script File Via Bash.EXE

Sigma Rules

View Source
Summary
This detection rule pertains to the execution of the Microsoft Bash launcher (bash.exe) without any command line flags that would typically be required to execute a script, such as '-c' or other parameters. The absence of these flags suggests that the attacker may be attempting to execute a script indirectly through Bash, possibly as a means to evade traditional security measures. The rule captures instances where processes end with either 'bash.exe' located in the System32 or SysWOW64 directories, and specifically checks if the command line does not contain any flags or is entirely empty. The primary concern is that this method could enable attackers to execute malicious scripts or binaries on either Windows or Linux environments by bypassing default restrictions.
Categories
  • Windows
  • Cloud
  • Linux
  • Endpoint
Data Sources
  • Process
  • Script
Created: 2023-08-15