Sigma rule outputs from CloudSigma rendered into Splunk queries against the Windows Sysmon schema. Every rule is mapped to MITRE ATT&CK and validated against its dialect.
Windows Command Interpreter Spawned by Web or Scripting Runtime, generated by CloudSigma and validated against the Splunk dialect.
This rule is currently experimental. CloudSigma generated it from upstream threat intelligence; before enabling in production, tune the falsepositives section in your SIEM against your environment's known automation, service accounts and IP allowlist.
title: Windows Command Interpreter Spawned by Web or Scripting Runtime
id: e95ab3af-fd83-4438-ad41-47eaa0f90998
status: experimental
description: >
Detects a Windows command interpreter (cmd.exe, powershell.exe,
cscript.exe, wscript.exe) being spawned as a child of a web or
scripting runtime that is commonly seen in webshell and
download-cradle activity (curl.exe, wget.exe, php.exe,
perl.exe, ruby.exe, python.exe). Earlier versions of this rule
OR-ed in a broad CommandLine match (*cmd /c*, *powershell -c*)
that fired on essentially every legitimate Windows scripted
command — that branch is removed here. java.exe, node.exe and
npm.exe are also dropped from the parent list because build
tooling on developer hosts spawns cmd.exe routinely.
author: CloudSigma
date: 2026-04-24
references:
- https://attack.mitre.org/techniques/T1059/
- https://attack.mitre.org/techniques/T1505/003/
tags:
- attack.execution
- attack.t1059
logsource:
product: windows
service: sysmon
detection:
selection_cmd_spawn:
EventID: 1
Image|endswith:
- \cmd.exe
- \powershell.exe
- \cscript.exe
- \wscript.exe
selection_suspicious_parents:
ParentImage|endswith:
- \curl.exe
- \wget.exe
- \perl.exe
- \ruby.exe
- \php.exe
- \python.exe
- \w3wp.exe
- \httpd.exe
filter_legitimate_system:
User|contains:
- SYSTEM
- LOCAL SERVICE
- NETWORK SERVICE
condition: selection_cmd_spawn and selection_suspicious_parents and not filter_legitimate_system
falsepositives:
- Python or curl-based deployment automation on jump hosts that intentionally invokes PowerShell
- Legitimate ETL or backup scripts running under a service account that wraps a PowerShell pipeline
- Webserver process (w3wp, httpd) launching a child shell as part of a documented administrative workflow
fields:
- Image
- ParentImage
- CommandLine
- User
- Computer
level: high