-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Add detection rule for Chaos/Darkside Ransomware style hidden Cmd launching suspicious targets #5767
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Add a rule that detects instances of 'cmd.exe' executing commands with the 'start' utility using hidden or minimized flags, focusing on suspicious targets to reduce false positives.
78ca9cc to
d4db7a7
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR introduces a new Sigma detection rule to identify malicious use of cmd.exe with the internal start command using hidden execution flags (/b or /min). The rule focuses on high-fidelity detections by restricting triggers to suspicious targets including scripting interpreters and risky directories like temp folders, public user folders, and ProgramData. This technique has been observed in Chaos, DarkSide, and Emotet malware campaigns.
Key Changes:
- New detection rule for hidden cmd.exe execution patterns targeting suspicious files/locations
- Regression test data including JSON test case and info.yml metadata
- Known false positive entry for xampp in the workflow configuration
Reviewed changes
Copilot reviewed 4 out of 5 changed files in this pull request and generated no comments.
| File | Description |
|---|---|
rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag.yml |
Core detection rule defining the logic for identifying hidden cmd.exe execution with suspicious targets |
regression_data/rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/info.yml |
Regression test metadata linking the test case to the detection rule |
regression_data/rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d.json |
JSON test event demonstrating a positive detection scenario |
.github/workflows/known-FPs.csv |
Known false positive exclusion for xampp to reduce noise |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| selection_cmd_hidden_start_1: | ||
| CommandLine|contains: | ||
| - 'start ' | ||
| - 'start/b' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Windows love redteams, I have try some patern of the windash modifier and it's work 😫
https://sigmahq.io/docs/basics/modifiers.html#windash
Summary of the Pull Request
Adds a new detection rule that identifies usage of
cmd.exewith the internalstartcommand using/b(hidden) or/min(minimized) flags.While
start /bis occasionally used by legitimate software, this rule increases fidelity by restricting detection to "risky targets" only. Specifically, it triggers when the hidden command targets scripting interpreters like PowerShell, pwsh, cscript/wscript extensions (.vbs, .js) or suspicious directories such as temp folders, public user folders, and ProgramData.Also a heavy nod to pH-T's rule in
rules/windows/process_creation/proc_creation_win_cmd_net_use_and_exec_combo.yml!Examples/Inspiration from fortinet threat research:
From the Chaos Ransomware Research:
The downloader falls back to this command if the API call fails. Note the use of the Temp folder variable.
From the DarkSide Ransomware Research:
Uses a double-hidden method (start /min + powershell -w hidden) to launch a Cobalt Strike beacon.
From the Emotet Trojan Research:
The VBScript executes this command to launch the dropped DLL payload from ProgramData silently.
Changelog
Cmd Launched with Hidden Start Flags to Suspicious Targets
Example Log Event
Fixed Issues
N/A
SigmaHQ Rule Creation Conventions