title: Proxy Execution Via Explorer.exe author: Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative date: 2020/10/05 description: Attackers can use explorer.exe for evading defense mechanisms detection: SELECTION_1: EventID: 1 SELECTION_2: Image: - '*\explorer.exe' SELECTION_3: ParentImage: - '*\cmd.exe' SELECTION_4: CommandLine: - '*explorer.exe*' condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4) falsepositives: - Legitimate explorer.exe run from cmd.exe id: 9eb271b9-24ae-4cd4-9465-19cfc1047f3e level: low logsource: category: process_creation product: windows references: - https://twitter.com/CyberRaiju/status/1273597319322058752 status: experimental tags: - attack.defense_evasion - attack.t1218 ruletype: SIGMA