← Back to SOC feed Coverage →

Interactive Bash Suspicious Children

sigma MEDIUM SigmaHQ
T1059.004T1036
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may use suspicious interactive Bash processes to execute uncommon child processes as part of command and control or persistence activities. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential compromise through unusual process chain interactions.

Detection Rule

Sigma (Original)

title: Interactive Bash Suspicious Children
id: ea3ecad2-db86-4a89-ad0b-132a10d2db55
status: test
description: Detects suspicious interactive bash as a parent to rather uncommon child processes
references:
    - Internal Research
author: Florian Roth (Nextron Systems)
date: 2022-03-14
tags:
    - attack.execution
    - attack.defense-evasion
    - attack.t1059.004
    - attack.t1036
logsource:
    product: linux
    category: process_creation
detection:
    selection:
        ParentCommandLine: 'bash -i'
    anomaly1:
        CommandLine|contains:
            - '-c import '
            - 'base64'
            - 'pty.spawn'
    anomaly2:
        Image|endswith:
            - 'whoami'
            - 'iptables'
            - '/ncat'
            - '/nc'
            - '/netcat'
    condition: selection and 1 of anomaly*
falsepositives:
    - Legitimate software that uses these patterns
level: medium

KQL (Azure Sentinel)

imProcessCreate
| where ActingProcessCommandLine =~ "bash -i" and ((TargetProcessCommandLine contains "-c import " or TargetProcessCommandLine contains "base64" or TargetProcessCommandLine contains "pty.spawn") or (TargetProcessName endswith "whoami" or TargetProcessName endswith "iptables" or TargetProcessName endswith "/ncat" or TargetProcessName endswith "/nc" or TargetProcessName endswith "/netcat"))

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_susp_interactive_bash.yml