Rule Library

Sigma Rules

27 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

DNS Query for Anonfiles.com Domain - Sysmon

Detects DNS queries for "anonfiles.com", which is an anonymous file upload platform often used for malicious purposes

WindowsDNS Query
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Martin MuellerFri Jul 15windows
Detectionmediumtest

AppX Package Installation Attempts Via AppInstaller.EXE

Detects DNS queries made by "AppInstaller.EXE". The AppInstaller is the default handler for the "ms-appinstaller" URI. It attempts to load/install a package from the referenced URL

WindowsDNS Query
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautWed Nov 24windows
Detectionmediumtest

Cloudflared Tunnels Related DNS Requests

Detects DNS requests to Cloudflared tunnels domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed Dec 20windows
Detectionmediumexperimental

DNS Query To Common Malware Hosting and Shortener Services

Detects DNS queries to domains commonly used by threat actors to host malware payloads or redirect through URL shorteners. These include platforms like Cloudflare Workers, TryCloudflare, InfinityFree, and URL shorteners such as tinyurl and lihi.cc. Such DNS activity can indicate potential delivery or command-and-control communication attempts.

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNS
Ahmed NosirMon Jun 02windows
Detectionmediumtest

DNS Query To Devtunnels Domain

Detects DNS query requests to Devtunnels domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1572 · Protocol Tunneling
citron_ninjaWed Oct 25windows
Detectionlowtest

DNS Server Discovery Via LDAP Query

Detects DNS server discovery via LDAP query requests from uncommon applications

WindowsDNS Query
TA0007 · DiscoveryT1482 · Domain Trust Discovery
François HubautSat Aug 20windows
Detectionmediumtest

DNS Query To AzureWebsites.NET By Non-Browser Process

Detects a DNS query by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionhighexperimental

DNS Query by Finger Utility

Detects DNS queries made by the finger utility, which can be abused by threat actors to retrieve remote commands for execution on Windows devices. In one ClickFix malware campaign, adversaries leveraged the finger protocol to fetch commands from a remote server. Since the finger utility is not commonly used in modern Windows environments, its presence already raises suspicion. Investigating such DNS queries can also help identify potential malicious infrastructure used by threat actors for command and control (C2) communication.

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNSTA0002 · ExecutionT1059.003 · Windows Command Shell
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Nov 19windows
Detectionmediumexperimental

Notepad++ Updater DNS Query to Uncommon Domains

Detects when the Notepad++ updater (gup.exe) makes DNS queries to domains that are not part of the known legitimate update infrastructure. This could indicate potential exploitation of the updater mechanism or suspicious network activity that warrants further investigation.

WindowsDNS Query
TA0009 · CollectionTA0006 · Credential AccessT1195.002 · Compromise Software Supply ChainTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Feb 02windows
Detectionhightest

DNS HybridConnectionManager Service Bus

Detects Azure Hybrid Connection Manager services querying the Azure service bus service

WindowsDNS Query
TA0003 · PersistenceT1554 · Compromise Host Software Binary
Roberto Rodriguez (Cyb3rWard0g)+1Mon Apr 12windows
Detectionhighexperimental

Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing

Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.

WindowsDNS Query
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20windows
Detectioncriticaltest

Suspicious Cobalt Strike DNS Beaconing - Sysmon

Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Tue Nov 09windows
Detectionmediumtest

DNS Query To MEGA Hosting Website

Detects DNS queries for subdomains related to MEGA sharing website

WindowsDNS Query
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Aaron Greetham - NCC GroupWed May 26windows
Detectionlowtest

DNS Query Request To OneLaunch Update Service

Detects DNS query requests to "update.onelaunch.com". This domain is associated with the OneLaunch adware application. When the OneLaunch application is installed it will attempt to get updates from this domain.

WindowsDNS Query
TA0006 · Credential AccessTA0009 · CollectionT1056 · Input Capture
Josh NickelsMon Feb 26windows
Detectionlowexperimental

DNS Query Request By QuickAssist.EXE

Detects DNS queries initiated by "QuickAssist.exe" to Microsoft Quick Assist primary endpoint that is used to establish a session.

WindowsDNS Query
TA0011 · Command and ControlTA0001 · Initial AccessTA0008 · Lateral MovementT1071.001 · Web Protocols+1
Muhammad FaisalThu Dec 19windows
Detectionmediumtest

DNS Query Request By Regsvr32.EXE

Detects DNS queries initiated by "Regsvr32.exe"

WindowsDNS Query
TA0002 · ExecutionT1559.001 · Component Object ModelTA0005 · Defense EvasionT1218.010 · Regsvr32
Dmitriy Lifanov+1Fri Oct 25windows
Detectionmediumtest

DNS Query To Remote Access Software Domain From Non-Browser App

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
François Hubaut+1Mon Jul 11windows
Detectionmediumtest

Suspicious DNS Query for IP Lookup Service APIs

Detects DNS queries for IP lookup services such as "api.ipify.org" originating from a non browser process.

WindowsDNS Query
TA0043 · ReconnaissanceT1590 · Gather Victim Network Information
Brandon George (blog post)+1Thu Jul 08windows
Detectionmediumtest

TeamViewer Domain Query By Non-TeamViewer Application

Detects DNS queries to a TeamViewer domain only resolved by a TeamViewer client by an image that isn't named TeamViewer (sometimes used by threat actors for obfuscation)

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sun Jan 30windows
Detectionhightest

DNS Query Tor .Onion Address - Sysmon

Detects DNS queries to an ".onion" address related to Tor routing networks

WindowsDNS Query
TA0011 · Command and ControlT1090.003 · Multi-hop Proxy
François HubautSun Feb 20windows
Detectionlowtest

DNS Query To Ufile.io

Detects DNS queries to "ufile.io", which was seen abused by malware and threat actors as a method for data exfiltration

WindowsDNS Query
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
yatinwad+1Thu Jun 23windows
Detectionmediumtest

DNS Query To Visual Studio Code Tunnels Domain

Detects DNS query requests to Visual Studio Code tunnel domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web Protocols
citron_ninjaWed Oct 25windows
Emerging Threathightest

Potential SocGholish Second Stage C2 DNS Query

Detects a DNS query initiated from a "wscript" process for domains matching a specific pattern that was seen being used by SocGholish for its Command and Control traffic

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002detection.emerging-threats
Dusty MillerThu Feb 232023
Emerging Threathightest

Potential Compromised 3CXDesktopApp Beaconing Activity - DNS

Detects potential beaconing activity to domains related to 3CX 3CXDesktopApp compromise

WindowsDNS Query
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 292023
Emerging Threathightest

Diamond Sleet APT DNS Communication Indicators

Detects DNS queries related to Diamond Sleet APT activity

WindowsDNS Query
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

DPRK Threat Actor - C2 Communication DNS Indicators

Detects DNS queries for C2 domains used by DPRK Threat actors.

WindowsDNS Query
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Feb 202024
Emerging Threathighexperimental

DNS Query To Katz Stealer Domains

Detects DNS queries to domains associated with Katz Stealer malware. Katz Stealer is a malware variant that is known to be used for stealing sensitive information from compromised systems. In Enterprise environments, DNS queries to these domains may indicate potential malicious activity or compromise.

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNSdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Thu May 222025