title: Proxy Execution Via Explorer.exe author: Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative date: 2020/10/05 description: Attackers can use explorer.exe for evading defense mechanisms detection: SELECTION_1: EventID: 1 SELECTION_2: Image: '*\explorer.exe' SELECTION_3: ParentImage: '*\cmd.exe' SELECTION_4: CommandLine: '*explorer.exe*' condition: (SELECTION_1 and (SELECTION_2) and (SELECTION_3) and (SELECTION_4)) falsepositives: - Legitimate explorer.exe run from cmd.exe id: 9eb271b9-24ae-4cd4-9465-19cfc1047f3e level: low logsource: category: process_creation product: windows references: - https://twitter.com/CyberRaiju/status/1273597319322058752 status: experimental tags: - attack.defense_evasion - attack.t1218 yml_filename: win_susp_explorer.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation