Rule Library

Sigma Rules

239 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

HackTool - Potential Remote Credential Dumping Activity Via CrackMapExec Or Impacket-Secretsdump

Detects default filenames output from the execution of CrackMapExec and Impacket-secretsdump against an endpoint.

WindowsFile Event
TA0006 · Credential AccessT1003 · OS Credential Dumping
SecurityAuraWed Nov 16windows
Detectionhightest

HackTool - SafetyKatz Dump Indicator

Detects default lsass dump filename generated by SafetyKatz.

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Markus NeisTue Jul 24windows
Detectionhighexperimental

HackTool - Impacket File Indicators

Detects file creation events with filename patterns used by Impacket.

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
The DFIR Report+1Mon May 19windows
Detectionmediumtest

Potential Initial Access via DLL Search Order Hijacking

Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious module via DLL search order hijacking.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1566 · PhishingT1566.001 · Spearphishing Attachment+4
Tim Rauch+1Fri Oct 21windows
Detectionmediumtest

Installation of TeamViewer Desktop

TeamViewer_Desktop.exe is create during install

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautFri Jan 28windows
Detectionhightest

Malicious DLL File Dropped in the Teams or OneDrive Folder

Detects creation of a malicious DLL file in the location where the OneDrive or Team applications Upon execution of the Teams or OneDrive application, the dropped malicious DLL file ("iphlpapi.dll") is sideloaded

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
François HubautFri Aug 12windows
Detectionhightest

ISO File Created Within Temp Folders

Detects the creation of a ISO file in the Outlook temp folder or in the Appdata temp folder. Typical of Qakbot TTP from end-July 2022.

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
@sam0x90Sat Jul 30windows
Detectionmediumtest

ISO or Image Mount Indicator in Recent Files

Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks. This can be a false positive on server systems but on workstations users should rarely mount .iso or .img files.

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)Fri Feb 11windows
Detectionmediumtest

GatherNetworkInfo.VBS Reconnaissance Script Output

Detects creation of files which are the results of executing the built-in reconnaissance script "C:\Windows\System32\gatherNetworkInfo.vbs".

WindowsFile Event
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionhightest

LSASS Process Memory Dump Files

Detects creation of files with names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials.

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Mon Nov 15windows
Detectionhightest

LSASS Process Dump Artefact In CrashDumps Folder

Detects the presence of an LSASS dump file in the "CrashDumps" folder. This could be a sign of LSASS credential dumping. Techniques such as the LSASS Shtinkering have been seen abusing the Windows Error Reporting to dump said process.

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
@pbssubhashThu Dec 08windows
Detectionhightest

WerFault LSASS Process Memory Dump

Detects WerFault creating a dump file with a name that indicates that the dump file could be an LSASS process memory, which contains user credentials

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Mon Jun 27windows
Detectionhightest

Adwind RAT / JRAT File Artifact

Detects javaw.exe in AppData folder as used by Adwind / JRAT

WindowsFile Event
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScript
Florian Roth (Nextron Systems)+3Fri Nov 10windows
Detectionhightest

Octopus Scanner Malware

Detects Octopus Scanner Malware.

WindowsFile Event
TA0001 · Initial AccessT1195 · Supply Chain CompromiseT1195.001 · Compromise Software Dependencies and Development Tools
NVISOTue Jun 09windows
Detectionhightest

File Creation In Suspicious Directory By Msdt.EXE

Detects msdt.exe creating files in suspicious directories which could be a sign of exploitation of either Follina or Dogwalk vulnerabilities

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Foldercve.2022-30190
Vadim Varganov+1Wed Aug 24windows
Detectionhightest

Uncommon File Creation By Mysql Daemon Process

Detects the creation of files with scripting or executable extensions by Mysql daemon. Which could be an indicator of "User Defined Functions" abuse to download malware.

WindowsFile Event
TA0005 · Defense Evasion
Joseph KamauMon May 27windows
Detectionhightest

Suspicious DotNET CLR Usage Log Artifact

Detects the creation of Usage Log files by the CLR (clr.dll). These files are named after the executing process once the assembly is finished executing for the first time in the (user) session context.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+3Fri Nov 18windows
Detectionhightest

Suspicious File Creation In Uncommon AppData Folder

Detects the creation of suspicious files and folders inside the user's AppData folder but not inside any of the common and well known directories (Local, Romaing, LocalLow). This method could be used as a method to bypass detection who exclude the AppData folder in fear of FPs

WindowsFile Event
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionmediumtest

SCR File Write Event

Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an ".SCR" file using "rundll32.exe desk.cpl,InstallScreenSaver" for example.

WindowsFile Event
TA0005 · Defense EvasionT1218.011 · Rundll32
Christopher Peacock+1Wed Apr 27windows
Detectionmediumtest

Potential Persistence Via Notepad++ Plugins

Detects creation of new ".dll" files inside the plugins directory of a notepad++ installation by a process other than "gup.exe". Which could indicates possible persistence

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Fri Jun 10windows
Detectionlowtest

NTDS.DIT Created

Detects creation of a file named "ntds.dit" (Active Directory Database)

WindowsFile Event
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionhightest

NTDS.DIT Creation By Uncommon Parent Process

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon parent process or directory

WindowsFile Event
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Fri Mar 11windows
Detectionhightest

NTDS.DIT Creation By Uncommon Process

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon process or a process located in a suspicious directory

WindowsFile Event
TA0006 · Credential AccessT1003.002 · Security Account ManagerT1003.003 · NTDS
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionhightest

NTDS Exfiltration Filename Patterns

Detects creation of files with specific name patterns seen used in various tools that export the NTDS.DIT for exfiltration.

WindowsFile Event
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Fri Mar 11windows
Detectionhightest

Potential Persistence Via Microsoft Office Add-In

Detects potential persistence activity via startup add-ins that load when Microsoft Office starts (.wll/.xll are simply .dll fit for Word or Excel).

WindowsFile Event
TA0003 · PersistenceT1137.006 · Add-ins
NVISOMon May 11windows
Detectionlowtest

Office Macro File Creation

Detects the creation of a new office macro files on the systems

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Nasreddine Bencherchali (Nextron Systems)Sun Jan 23windows
Detectionlowtest

Office Macro File Download

Detects the creation of a new office macro files on the system via an application (browser, mail client). This can help identify potential malicious activity, such as the download of macro-enabled documents that could be used for exploitation.

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Nasreddine Bencherchali (Nextron Systems)Sun Jan 23windows
Detectionhightest

Office Macro File Creation From Suspicious Process

Detects the creation of a office macro file from a a suspicious process

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
François Hubaut+1Sun Jan 23windows
Detectionmediumtest

OneNote Attachment File Dropped In Suspicious Location

Detects creation of files with the ".one"/".onepkg" extension in suspicious or uncommon locations. This could be a sign of attackers abusing OneNote attachments

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Sun Jan 22windows
Detectionhightest

Suspicious File Created Via OneNote Application

Detects suspicious files created via the OneNote application. This could indicate a potential malicious ".one"/".onepkg" file was executed as seen being used in malware activity in the wild

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Feb 09windows
Detectionmediumtest

New Outlook Macro Created

Detects the creation of a macro file for Outlook.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
@scoubimtlMon Apr 05windows
Detectionhightest

Potential Persistence Via Outlook Form

Detects the creation of a new Outlook form which can contain malicious code

WindowsFile Event
TA0003 · PersistenceT1137.003 · Outlook Forms
Tobias MichalskiThu Jun 10windows
Detectionhighexperimental

Suspicious File Created in Outlook Temporary Directory

Detects the creation of files with suspicious file extensions in the temporary directory that Outlook uses when opening attachments. This can be used to detect spear-phishing campaigns that use suspicious files as attachments, which may contain malicious code.

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)+1Tue Jul 22windows
Detectionhightest

Suspicious Outlook Macro Created

Detects the creation of a macro file for Outlook.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

Publisher Attachment File Dropped In Suspicious Location

Detects creation of files with the ".pub" extension in suspicious or uncommon locations. This could be a sign of attackers abusing Publisher documents

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionhightest

Potential Persistence Via Microsoft Office Startup Folder

Detects creation of Microsoft Office files inside of one of the default startup folders in order to achieve persistence.

WindowsFile Event
TA0003 · PersistenceT1137 · Office Application Startup
Max Altgelt (Nextron Systems)+1Thu Jun 02windows
Detectionhightest

File With Uncommon Extension Created By An Office Application

Detects the creation of files with an executable or script extension by an Office application.

WindowsFile Event
T1204.002 · Malicious FileTA0002 · Execution
Vadim Khrykov (ThreatIntel)+2Mon Aug 23windows
Detectionhightest

Uncommon File Created In Office Startup Folder

Detects the creation of a file with an uncommon extension in an Office application startup folder

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malware
François Hubaut+1Sun Jun 05windows
Detectionhightest

PCRE.NET Package Temp Files

Detects processes creating temp files related to PCRE.NET package

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Roberto Rodriguez (Cyb3rWard0g)+1Thu Oct 29windows
Detectionmediumtest

Suspicious File Created In PerfLogs

Detects suspicious file based on their extension being created in "C:\PerfLogs\". Note that this directory mostly contains ".etl" files

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionmediumtest

Potential Binary Or Script Dropper Via PowerShell

Detects PowerShell creating a binary executable or a script file.

WindowsFile Event
TA0003 · Persistence
François Hubaut+1Fri Mar 17windows
Detectionlowtest

PowerShell Script Dropped Via PowerShell.EXE

Detects PowerShell creating a PowerShell file (.ps1). While often times this behavior is benign, sometimes it can be a sign of a dropper script trying to achieve persistence.

WindowsFile Event
TA0003 · Persistence
François HubautTue May 09windows
Detectionhightest

Malicious PowerShell Scripts - FileCreation

Detects the creation of known offensive powershell scripts used for exploitation

WindowsFile Event
TA0002 · ExecutionT1059.001 · PowerShell
Markus Neis+3Sat Apr 07windows
Detectionlowtest

PowerShell Module File Created

Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc.

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

Potential Suspicious PowerShell Module File Created

Detects the creation of a new PowerShell module in the first folder of the module directory structure "\WindowsPowerShell\Modules\malware\malware.psm1". This is somewhat an uncommon practice as legitimate modules often includes a version folder.

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

PowerShell Module File Created By Non-PowerShell Process

Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc. by a non-PowerShell process

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionhightest

Potential Startup Shortcut Persistence Via PowerShell.EXE

Detects PowerShell writing startup shortcuts. This procedure was highlighted in Red Canary Intel Insights Oct. 2021, "We frequently observe adversaries using PowerShell to write malicious .lnk files into the startup directory to establish persistence. Accordingly, this detection opportunity is likely to identify persistence mechanisms in multiple threats. In the context of Yellow Cockatoo, this persistence mechanism eventually launches the command-line script that leads to the installation of a malicious DLL"

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Christopher Peacock+1Sun Oct 24windows
Detectionmediumtest

PSScriptPolicyTest Creation By Uncommon Process

Detects the creation of the "PSScriptPolicyTest" PowerShell script by an uncommon process. This file is usually generated by Microsoft Powershell to test against Applocker.

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jun 01windows