Rule Library

Sigma Rules

216 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Windows Shell/Scripting Application File Write to Suspicious Folder

Detects Windows shells and scripting applications that write files to suspicious folders

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Sat Nov 20windows
Detectionhightest

Windows Binaries Write Suspicious Extensions

Detects Windows executables that write files with suspicious extensions

WindowsFile Event
TA0005 · Defense EvasionT1036 · Masquerading
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionmediumtest

Startup Folder File Write

A General detection for files being created in the Windows startup directory. This could be an indicator of persistence.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Suspicious Creation with Colorcpl

Once executed, colorcpl.exe will copy the arbitrary file to c:\windows\system32\spool\drivers\color\

WindowsFile Event
TA0005 · Defense EvasionT1564 · Hide Artifacts
François HubautFri Jan 21windows
Detectionmediumtest

Created Files by Microsoft Sync Center

This rule detects suspicious files created by Microsoft Sync Center (mobsync)

WindowsFile Event
TA0004 · Privilege EscalationT1055 · Process InjectionT1218 · System Binary Proxy ExecutionTA0002 · Execution+1
elhoimThu Apr 28windows
Detectionmediumtest

Suspicious Files in Default GPO Folder

Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder

WindowsFile Event
T1036.005 · Match Legitimate Name or LocationTA0005 · Defense Evasion
elhoimThu Apr 28windows
Detectionhightest

Suspicious Desktopimgdownldr Target File

Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension

WindowsFile Event
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)Fri Jul 03windows
Detectionhightest

Suspicious Creation TXT File in User Desktop

Ransomware create txt file in the user Desktop

WindowsFile Event
TA0040 · ImpactT1486 · Data Encrypted for Impact
François HubautSun Dec 26windows
Detectionmediumtest

Creation of a Diagcab

Detects the creation of diagcab file, which could be caused by some legitimate installer or is a sign of exploitation (review the filename and its location)

WindowsFile Event
TA0042 · Resource Development
François HubautWed Jun 08windows
Detectionhightest

Suspicious Double Extension Files

Detects dropped files with double extensions, which is often used by malware as a method to abuse the fact that Windows hide default extensions by default.

WindowsFile Event
TA0005 · Defense EvasionT1036.007 · Double File Extension
Nasreddine Bencherchali (Nextron Systems)+1Sun Jun 19windows
Detectionhightest

DPAPI Backup Keys And Certificate Export Activity IOC

Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.

WindowsFile Event
TA0006 · Credential AccessT1555 · Credentials from Password StoresT1552.004 · Private Keys
Nounou Mbeiri+1Wed Jun 26windows
Detectionhightest

Suspicious MSExchangeMailboxReplication ASPX Write

Detects suspicious activity in which the MSExchangeMailboxReplication process writes .asp and .apsx files to disk, which could be a sign of ProxyShell exploitation

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionhightest

Suspicious Executable File Creation

Detect creation of suspicious executable file names. Some strings look for suspicious file extensions, others look for filenames that exploit unquoted service paths.

WindowsFile Event
TA0005 · Defense EvasionT1564 · Hide Artifacts
François HubautMon Sep 05windows
Detectionhighexperimental

Suspicious File Write to SharePoint Layouts Directory

Detects suspicious file writes to SharePoint layouts directory which could indicate webshell activity or post-exploitation. This behavior has been observed in the exploitation of SharePoint vulnerabilities such as CVE-2025-49704, CVE-2025-49706 or CVE-2025-53770.

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · PersistenceT1505.003 · Web Shell
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Jul 24windows
Detectionmediumexperimental

Suspicious File Write to Webapps Root Directory

Detects suspicious file writes to the root directory of web applications, particularly Apache web servers or Tomcat servers. This may indicate an attempt to deploy malicious files such as web shells or other unauthorized scripts.

WindowsFile Event
TA0003 · PersistenceT1505.003 · Web ShellTA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Oct 20windows
Detectionhightest

Suspicious Get-Variable.exe Creation

Get-Variable is a valid PowerShell cmdlet WindowsApps is by default in the path where PowerShell is executed. So when the Get-Variable command is issued on PowerShell execution, the system first looks for the Get-Variable executable in the path and executes the malicious binary instead of looking for the PowerShell cmdlet.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546 · Event Triggered ExecutionTA0005 · Defense Evasion+1
François HubautSat Apr 23windows
Detectionmediumtest

Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream

Detects the creation of hidden file/folder with the "::$index_allocation" stream. Which can be used as a technique to prevent access to folder and files from tooling such as "explorer.exe" and "powershell.exe"

WindowsFile Event
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
ScoubiMon Oct 09windows
Detectionmediumtest

Potential Homoglyph Attack Using Lookalike Characters in Filename

Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters. This is used as an obfuscation and masquerading techniques. Only "perfect" homoglyphs are included; these are characters that are indistinguishable from ASCII characters and thus may make excellent candidates for homoglyph attack characters.

WindowsFile Event
TA0005 · Defense EvasionT1036 · MasqueradingT1036.003 · Rename System Utilities
Micah BabinskiMon May 08windows
Detectionhightest

Legitimate Application Dropped Archive

Detects programs on a Windows system that should not write an archive to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionhightest

Legitimate Application Dropped Executable

Detects programs on a Windows system that should not write executables to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionhighexperimental

Legitimate Application Writing Files In Uncommon Location

Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution. Adversaries may leverage legitimate applications (Living off the Land Binaries - LOLBins) to drop or download malicious files to uncommon locations on the system to evade detection by security solutions.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Dec 10windows
Detectionhightest

Legitimate Application Dropped Script

Detects programs on a Windows system that should not write scripts to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionmediumtest

Suspicious LNK Double Extension File Created

Detects the creation of files with an "LNK" as a second extension. This is sometimes used by malware as a method to abuse the fact that Windows hides the "LNK" extension by default.

WindowsFile Event
TA0005 · Defense EvasionT1036.007 · Double File Extension
Nasreddine Bencherchali (Nextron Systems)+1Mon Nov 07windows
Detectionmediumtest

PowerShell Profile Modification

Detects the creation or modification of a powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
HieuTT35+1Thu Oct 24windows
Detectionmediumtest

Suspicious PROCEXP152.sys File Created In TMP

Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder. This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) or Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU.

WindowsFile Event
T1562.001 · Disable or Modify ToolsTA0005 · Defense Evasion
xknow+1Mon Apr 08windows
Detectionhighexperimental

Suspicious Binaries and Scripts in Public Folder

Detects the creation of a file with a suspicious extension in the public folder, which could indicate potential malicious activity.

WindowsFile Event
TA0002 · ExecutionT1204 · User Execution
The DFIR ReportThu Jan 23windows
Detectionhightest

Suspicious File Creation Activity From Fake Recycle.Bin Folder

Detects file write event from/to a fake recycle bin folder that is often used as a staging directory for malware

WindowsFile Event
TA0003 · PersistenceTA0005 · Defense Evasion
X__Junior (Nextron Systems)Wed Jul 12windows
Detectionhightest

Potential File Extension Spoofing Using Right-to-Left Override

Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.

WindowsFile Event
TA0002 · ExecutionTA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Jonathan Peters (Nextron Systems)+2Sun Nov 17windows
Detectionmediumtest

Drop Binaries Into Spool Drivers Color Folder

Detects the creation of suspcious binary files inside the "\windows\system32\spool\drivers\color\" as seen in the blog referenced below

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 28windows
Detectionhightest

Suspicious Startup Folder Persistence

Detects the creation of potentially malicious script and executable files in Windows startup folders, which is a common persistence technique used by threat actors. These files (.ps1, .vbs, .js, .bat, etc.) are automatically executed when a user logs in, making the Startup folder an attractive target for attackers. This technique is frequently observed in malvertising campaigns and malware distribution where attackers attempt to maintain long-term access to compromised systems.

WindowsFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionT1204.002 · Malicious FileTA0003 · Persistence+1
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 10windows
Detectionhightest

Suspicious Interactive PowerShell as SYSTEM

Detects the creation of files that indicator an interactive use of PowerShell in the SYSTEM user context

WindowsFile Event
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue Dec 07windows
Detectionhightest

Suspicious Scheduled Task Write to System32 Tasks

Detects the creation of tasks from processes executed from suspicious locations

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053 · Scheduled Task/Job
Florian Roth (Nextron Systems)Tue Nov 16windows
Detectionmediumtest

TeamViewer Remote Session

Detects the creation of log files during a TeamViewer remote session

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sun Jan 30windows
Detectionmediumtest

VsCode Powershell Profile Modification

Detects the creation or modification of a vscode related powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
Nasreddine Bencherchali (Nextron Systems)Wed Aug 24windows
Detectionmediumexperimental

Potentially Suspicious WDAC Policy File Creation

Detects suspicious Windows Defender Application Control (WDAC) policy file creation from abnormal processes that could be abused by attacker to block EDR/AV components while allowing their own malicious code to run on the system.

WindowsFile Event
TA0005 · Defense Evasion
X__JuniorFri Feb 07windows
Detectionmediumtest

Windows Terminal Profile Settings Modification By Uncommon Process

Detects the creation or modification of the Windows Terminal Profile settings file "settings.json" by an uncommon process.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.015 · Login Items
François Hubaut+1Sat Jul 22windows
Detectionmediumtest

WinSxS Executable File Creation By Non-System Process

Detects the creation of binaries in the WinSxS folder by non-system processes

WindowsFile Event
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu May 11windows
Detectionmediumexperimental

ADExplorer Writing Complete AD Snapshot Into .dat File

Detects the dual use tool ADExplorer writing a complete AD snapshot into a .dat file. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsFile Event
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Arnim Rupp (Nextron Systems)+1Wed Jul 09windows
Detectionhightest

LiveKD Kernel Memory Dump File Created

Detects the creation of a file that has the same name as the default LiveKD kernel memory dump.

WindowsFile Event
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue May 16windows
Detectionmediumtest

LiveKD Driver Creation

Detects the creation of the LiveKD driver, which is used for live kernel debugging

WindowsFile Event
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue May 16windows
Detectionhightest

LiveKD Driver Creation By Uncommon Process

Detects the creation of the LiveKD driver by a process image other than "livekd.exe".

WindowsFile Event
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue May 16windows
Detectionhightest

Process Explorer Driver Creation By Non-Sysinternals Binary

Detects creation of the Process Explorer drivers by processes other than Process Explorer (procexp) itself. Hack tools or malware may use the Process Explorer driver to elevate privileges, drops it to disk for a few moments, runs a service using that driver and removes it afterwards.

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Florian Roth (Nextron Systems)Fri May 05windows
Detectionmediumtest

Process Monitor Driver Creation By Non-Sysinternals Binary

Detects creation of the Process Monitor driver by processes other than Process Monitor (procmon) itself.

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionlowtest

PsExec Service File Creation

Detects default PsExec service filename which indicates PsExec service installation and execution

WindowsFile Event
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Thomas PatzkeMon Jun 12windows
Detectionhightest

PSEXEC Remote Execution File Artefact

Detects creation of the PSEXEC key file. Which is created anytime a PsExec command is executed. It gets written to the file system and will be recorded in the USN Journal on the target system

WindowsFile Event
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · Persistence+4
Nasreddine Bencherchali (Nextron Systems)Sat Jan 21windows
Detectionhightest

Potential Privilege Escalation Attempt Via .Exe.Local Technique

Detects potential privilege escalation attempt via the creation of the "*.Exe.Local" folder inside the "System32" directory in order to sideload "comctl32.dll"

WindowsFile Event
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)+1Fri Dec 16windows
Detectionhightest

LSASS Process Memory Dump Creation Via Taskmgr.EXE

Detects the creation of an "lsass.dmp" file by the taskmgr process. This indicates a manual dumping of the LSASS.exe process memory using Windows Task Manager.

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan PoudelThu Oct 19windows
Detectionhightest

Hijack Legit RDP Session to Move Laterally

Detects the usage of tsclient share to place a backdoor on the RDP source machine's startup folder

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
Samir BousseadenThu Feb 21windows