Rule Library

Sigma Rules

13 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Credential Manager Access By Uncommon Applications

Detects suspicious processes based on name and location that access the windows credential manager and vault. Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::cred" function

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Tue Oct 11windows
Detectionmediumtest

Access To Windows Credential History File By Uncommon Applications

Detects file access requests to the Windows Credential History File by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::credhist" function

Windowsfile_access
TA0006 · Credential AccessT1555.004 · Windows Credential Manager
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionmediumtest

Access To Crypto Currency Wallets By Uncommon Applications

Detects file access requests to crypto currency files by uncommon processes. Could indicate potential attempt of crypto currency wallet stealing.

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Access
X__Junior (Nextron Systems)Mon Jul 29windows
Detectionmediumtest

Access To Windows DPAPI Master Keys By Uncommon Applications

Detects file access requests to the the Windows Data Protection API Master keys by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::masterkey" function

Windowsfile_access
TA0006 · Credential AccessT1555.004 · Windows Credential Manager
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionmediumtest

Access To Potentially Sensitive Sysvol Files By Uncommon Applications

Detects file access requests to potentially sensitive files hosted on the Windows Sysvol share.

Windowsfile_access
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
François HubautThu Dec 21windows
Detectionlowexperimental

Suspicious File Access to Browser Credential Storage

Detects file access to browser credential storage paths by non-browser processes, which may indicate credential access attempts. Adversaries may attempt to access browser credential storage to extract sensitive information such as usernames and passwords or cookies. This behavior is often commonly observed in credential stealing malware.

Windowsfile_access
TA0006 · Credential AccessT1555.003 · Credentials from Web BrowsersTA0007 · DiscoveryT1217 · Browser Information Discovery
François Hubaut+3Thu May 22windows
Detectionmediumtest

Microsoft Teams Sensitive File Access By Uncommon Applications

Detects file access attempts to sensitive Microsoft teams files (leveldb, cookies) by an uncommon process.

Windowsfile_access
TA0006 · Credential AccessT1528 · Steal Application Access Token
@serkinvaleryMon Jul 22windows
Threat Huntlowtest

Access To Chromium Browsers Sensitive Files By Uncommon Applications

Detects file access requests to chromium based browser sensitive files by uncommon processes. Could indicate potential attempt of stealing sensitive information.

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
X__Junior (Nextron Systems)Mon Jul 29windows
Threat Huntlowtest

Access To Browser Credential Files By Uncommon Applications

Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
François Hubaut+1Sat Apr 09windows
Threat Huntlowtest

Access To Windows Outlook Mail Files By Uncommon Applications

Detects file access requests to Windows Outlook Mail by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1070.008 · Clear Mailbox DataTA0005 · Defense Evasiondetection.threat-hunting
François HubautFri May 10windows
Threat Huntmediumtest

Access To Sysvol Policies Share By Uncommon Process

Detects file access requests to the Windows Sysvol Policies Share by uncommon processes

Windowsfile_access
TA0006 · Credential AccessT1552.006 · Group Policy Preferencesdetection.threat-hunting
François HubautThu Dec 21windows
Threat Huntlowtest

Access To .Reg/.Hive Files By Uncommon Applications

Detects file access requests to files ending with either the ".hive"/".reg" extension, usually associated with Windows Registry backups.

Windowsfile_access
T1112 · Modify RegistryTA0005 · Defense EvasionTA0003 · Persistencedetection.threat-hunting
François HubautFri Sep 15windows
Threat Huntlowtest

Unattend.XML File Access Attempt

Detects attempts to access the "unattend.xml" file, where credentials might be stored. This file is used during the unattended windows install process.

Windowsfile_access
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
François HubautMon Jul 22windows