Rule Library

Sigma Rules

1,607 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Msxsl.EXE Execution

Detects the execution of the MSXSL utility. This can be used to execute Extensible Stylesheet Language (XSL) files. These files are commonly used to describe the processing and rendering of data within XML files. Adversaries can abuse this functionality to execute arbitrary files while potentially bypassing application whitelisting defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1220 · XSL Script Processing
Timur Zinniatullin+1Mon Oct 21windows
Detectionhightest

Remote XSL Execution Via Msxsl.EXE

Detects the execution of the "msxsl" binary with an "http" keyword in the command line. This might indicate a potential remote execution of XSL files.

WindowsProcess Creation
TA0005 · Defense EvasionT1220 · XSL Script Processing
Swachchhanda Shrawan PoudelThu Nov 09windows
Detectionmediumtest

Suspicious Group And Account Reconnaissance Activity Using Net.EXE

Detects suspicious reconnaissance command line activity on Windows systems using Net.EXE Check if the user that executed the commands is suspicious (e.g. service accounts, LOCAL_SYSTEM)

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain Account
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionlowtest

Unmount Share Via Net.EXE

Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation

WindowsProcess Creation
TA0005 · Defense EvasionT1070.005 · Network Share Connection Removal
oscd.community+1Thu Oct 08windows
Detectionlowtest

Start Windows Service Via Net.EXE

Detects the usage of the "net.exe" command to start a service using the "start" flag

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service Execution
Timur Zinniatullin+2Mon Oct 21windows
Detectionlowtest

Stop Windows Service Via Net.EXE

Detects the stopping of a Windows service via the "net" utility.

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Jakob Weinzettl+2Sun Mar 05windows
Detectionmediumtest

Windows Admin Share Mount Via Net.EXE

Detects when an admin share is mounted using net.exe

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
oscd.community+3Mon Oct 05windows
Detectionhightest

Windows Internet Hosted WebDav Share Mount Via Net.EXE

Detects when an internet hosted webdav share is mounted using the "net.exe" utility

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Nasreddine Bencherchali (Nextron Systems)Tue Feb 21windows
Detectionlowtest

Windows Share Mount Via Net.EXE

Detects when a share is mounted using the "net.exe" utility

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Nasreddine Bencherchali (Nextron Systems)Thu Feb 02windows
Detectionlowtest

System Network Connections Discovery Via Net.EXE

Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.

WindowsProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections Discovery
François HubautFri Dec 10windows
Detectionmediumtest

Password Provided In Command Line Of Net.EXE

Detects a when net.exe is called with a password in the command line

WindowsProcess Creation
TA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation+3
Tim Shelton (HAWK.IO)Thu Dec 09windows
Detectionmediumtest

New User Created Via Net.EXE

Identifies the creation of local users via the net.exe command.

WindowsProcess Creation
TA0003 · PersistenceT1136.001 · Local Account
Endgame+1Tue Oct 30windows
Detectionhightest

New User Created Via Net.EXE With Never Expire Option

Detects creation of local users via the net.exe command with the option "never expire"

WindowsProcess Creation
TA0003 · PersistenceT1136.001 · Local Account
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionhightest

Suspicious Manipulation Of Default Accounts Via Net.EXE

Detects suspicious manipulations of default accounts such as 'administrator' and 'guest'. For example 'enable' or 'disable' accounts or change the password...etc

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Detectionlowstable

Share And Session Enumeration Using Net.EXE

Detects attempts to enumerate file shares, printer shares and sessions using "net.exe" with the "view" flag.

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System Discovery
Endgame+1Tue Oct 30windows
Detectionmediumtest

New Firewall Rule Added Via Netsh.EXE

Detects the addition of a new rule to the Windows firewall via netsh

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System FirewallS0246 · S0246
Markus Neis+1Tue Jan 29windows
Detectionhightest

Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE

Detects Netsh command execution that whitelists a program located in a suspicious location in the Windows Firewall

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Sander Wiebing+3Mon May 25windows
Detectionhightest

RDP Connection Allowed Via Netsh.EXE

Detects usage of the netsh command to open and allow connections to port 3389 (RDP). As seen used by Sarwent Malware

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Sander WiebingSat May 23windows
Detectionmediumtest

Firewall Rule Deleted Via Netsh.EXE

Detects the removal of a port or application rule in the Windows Firewall configuration using netsh

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSun Aug 14windows
Detectionmediumtest

Firewall Disabled via Netsh.EXE

Detects netsh commands that turns off the Windows firewall

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System FirewallS0108 · S0108
Fatih SirinFri Nov 01windows
Detectionmediumtest

Netsh Allow Group Policy on Microsoft Defender Firewall

Adversaries may modify system firewalls in order to bypass controls limiting network usage

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSun Jan 09windows
Detectionlowtest

Firewall Configuration Discovery Via Netsh.EXE

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
François Hubaut+2Tue Dec 07windows
Detectionmediumtest

Firewall Rule Update Via Netsh.EXE

Detects execution of netsh with the "advfirewall" and the "set" option in order to set new values for properties of a existing rule

WindowsProcess Creation
TA0005 · Defense Evasion
X__Junior (Nextron Systems)Tue Jul 18windows
Detectionmediumtest

Potential Persistence Via Netsh Helper DLL

Detects the execution of netsh with "add helper" flag in order to add a custom helper DLL. This technique can be abused to add a malicious helper DLL that can be used as a persistence proxy that gets called when netsh.exe is executed.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.007 · Netsh Helper DLLS0108 · S0108
Victor Sergeev+1Fri Oct 25windows
Detectionmediumtest

New Network Trace Capture Started Via Netsh.EXE

Detects the execution of netsh with the "trace" flag in order to start a network capture

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Kutepov Anton+1Thu Oct 24windows
Detectionmediumtest

New Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+3Tue Jan 29windows
Detectionhightest

RDP Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh to configure a port forwarding of port 3389 (RDP) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+1Tue Jan 29windows
Detectionmediumtest

Harvesting Of Wifi Credentials Via Netsh.EXE

Detect the harvesting of wifi credentials using netsh.exe

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Andreas Hunkeler+1Mon Apr 20windows
Detectionlowtest

Nltest.EXE Execution

Detects nltest commands that can be used for information discovery

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration DiscoveryT1018 · Remote System DiscoveryT1482 · Domain Trust Discovery
Arun ChauhanFri Feb 03windows
Detectionmediumtest

Potential Recon Activity Via Nltest.EXE

Detects nltest commands that can be used for information discovery

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration DiscoveryT1482 · Domain Trust Discovery
Craig Young+2Sat Jul 24windows
Detectionhightest

Potential Arbitrary Code Execution Via Node.EXE

Detects the execution node.exe which is shipped with multiple software such as VMware, Adobe...etc. In order to execute arbitrary code. For example to establish reverse shell as seen in Log4j attacks...etc

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionmediumtest

Node Process Executions

Detects the execution of other scripts using the Node executable packaged with Adobe Creative Cloud

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1059.007 · JavaScript
Max Altgelt (Nextron Systems)Wed Apr 06windows
Detectionlowexperimental

Notepad Password Files Discovery

Detects the execution of Notepad to open a file that has the string "password" which may indicate unauthorized access to credentials or suspicious activity.

WindowsProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
The DFIR ReportFri Feb 21windows
Detectionhightest

Network Reconnaissance Activity

Detects a set of suspicious network related commands often used in recon stages

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account DiscoveryT1082 · System Information Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Feb 07windows
Detectionmediumtest

Nslookup PowerShell Download Cradle - ProcessCreation

Detects suspicious powershell download cradle using nslookup. This cradle uses nslookup to extract payloads from DNS records

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Sep 05windows
Detectionmediumtest

Suspicious Usage Of Active Directory Diagnostic Tool (ntdsutil.exe)

Detects execution of ntdsutil.exe to perform different actions such as restoring snapshots...etc.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)Wed Sep 14windows
Detectionmediumtest

Invocation of Active Directory Diagnostic Tool (ntdsutil.exe)

Detects execution of ntdsutil.exe, which can be used for various attacks against the NTDS database (NTDS.DIT)

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Thomas PatzkeWed Jan 16windows
Detectionmediumtest

Driver/DLL Installation Via Odbcconf.EXE

Detects execution of "odbcconf" with "INSTALLDRIVER" which installs a new ODBC driver. Attackers abuse this to install and run malicious DLLs.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Mon May 22windows
Detectionhightest

Suspicious Driver/DLL Installation Via Odbcconf.EXE

Detects execution of "odbcconf" with the "INSTALLDRIVER" action where the driver doesn't contain a ".dll" extension. This is often used as a defense evasion method.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Tue May 23windows
Detectionhightest

Odbcconf.EXE Suspicious DLL Location

Detects execution of "odbcconf" where the path of the DLL being registered is located in a potentially suspicious location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Mon May 22windows
Detectionmediumtest

New DLL Registered Via Odbcconf.EXE

Detects execution of "odbcconf" with "REGSVR" in order to register a new DLL (equivalent to running regsvr32). Attackers abuse this to install and run malicious DLLs.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Kirill Kiryanov+4Mon May 22windows
Detectionhightest

Potentially Suspicious DLL Registered Via Odbcconf.EXE

Detects execution of "odbcconf" with the "REGSVR" action where the DLL in question doesn't contain a ".dll" extension. Which is often used as a method to evade defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Mon May 22windows
Detectionmediumtest

Response File Execution Via Odbcconf.EXE

Detects execution of "odbcconf" with the "-f" flag in order to load a response file which might contain a malicious action.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Kirill Kiryanov+4Mon May 22windows
Detectionhightest

Suspicious Response File Execution Via Odbcconf.EXE

Detects execution of "odbcconf" with the "-f" flag in order to load a response file with a non-".rsp" extension.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Mon May 22windows
Detectionmediumtest

Uncommon Child Process Spawned By Odbcconf.EXE

Detects an uncommon child process of "odbcconf.exe" binary which normally shouldn't have any child processes.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Harjot SinghMon May 22windows
Detectionhightest

Potential Arbitrary File Download Using Office Application

Detects potential arbitrary file download using a Microsoft Office application

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)+2Tue May 17windows
Detectionhightest

Potential Excel.EXE DCOM Lateral Movement Via ActivateMicrosoftApp

Detects suspicious child processes of Excel which could be an indicator of lateral movement leveraging the "ActivateMicrosoftApp" Excel DCOM object.

WindowsProcess Creation
T1021.003 · Distributed Component Object ModelTA0008 · Lateral Movement
Aaron StrattonMon Nov 13windows
Detectionhightest

Potentially Suspicious Office Document Executed From Trusted Location

Detects the execution of an Office application that points to a document that is located in a trusted location. Attackers often used this to avoid macro security and execute their malicious code.

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Wed Jun 21windows