Rule Library

Sigma Rules

1,398 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Security Service Disabled Via Reg.EXE

Detects execution of "reg.exe" to disable security services such as Windows Defender.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)+2Wed Jul 14windows
Detectionhightest

Dumping of Sensitive Hives Via Reg.EXE

Detects the usage of "reg.exe" in order to dump sensitive registry hives. This includes SAM, SYSTEM and SECURITY hives.

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account ManagerT1003.004 · LSA SecretsT1003.005 · Cached Domain Credentials+1
Teymur Kheirkhabarov+5Tue Oct 22windows
Detectionmediumtest

Windows Recall Feature Enabled Via Reg.EXE

Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by deleting the existing "DisableAIDataAnalysis" value, or setting it to 0. Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.

WindowsProcess Creation
TA0009 · CollectionT1113 · Screen Capture
Sajid Nawaz KhanSun Jun 02windows
Detectionmediumtest

Enumeration for Credentials in Registry

Adversaries may search the Registry on compromised systems for insecurely stored credentials. The Windows Registry stores configuration information that can be used by the system or other programs. Adversaries may query the Registry looking for credentials and passwords that have been stored for use by other programs or services

WindowsProcess Creation
TA0006 · Credential AccessT1552.002 · Credentials in Registry
François HubautMon Dec 20windows
Detectionmediumtest

Potential Suspicious Registry File Imported Via Reg.EXE

Detects the import of '.reg' files from suspicious paths using the 'reg.exe' utility

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
François Hubaut+1Mon Aug 01windows
Detectionhightest

RestrictedAdminMode Registry Value Tampering - ProcCreation

Detects changes to the "DisableRestrictedAdmin" registry value in order to disable or enable RestrictedAdmin mode. RestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop. This prevents your credentials from being harvested during the initial connection process if the remote server has been compromise

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Jan 13windows
Detectionhightest

LSA PPL Protection Disabled Via Reg.EXE

Detects the usage of the "reg.exe" utility to disable PPL protection on the LSA process

WindowsProcess Creation
TA0005 · Defense EvasionT1562.010 · Downgrade Attack
Florian Roth (Nextron Systems)Tue Mar 22windows
Detectionlowtest

Suspicious Query of MachineGUID

Use of reg to get MachineGuid information

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
François HubautSat Jan 01windows
Detectionmediumtest

Modify Group Policy Settings

Detect malicious GPO modifications can be used to implement many other malicious behaviors.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
François HubautFri Aug 19windows
Detectionhightest

Enable LM Hash Storage - ProcCreation

Detects changes to the "NoLMHash" registry value in order to allow Windows to store LM Hashes. By setting this registry value to "0" (DWORD), Windows will be allowed to store a LAN manager hash of your password in Active Directory and local SAM databases.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Fri Dec 15windows
Detectionmediumtest

Potential Configuration And Service Reconnaissance Via Reg.EXE

Detects the usage of "reg.exe" in order to query reconnaissance information from the registry. Adversaries may interact with the Windows registry to gather information about credentials, the system, configuration, and installed software.

WindowsProcess Creation
TA0007 · DiscoveryT1012 · Query RegistryT1007 · System Service Discovery
Timur Zinniatullin+1Mon Oct 21windows
Detectionhightest

Potential Tampering With RDP Related Registry Keys Via Reg.EXE

Detects the execution of "reg.exe" for enabling/disabling the RDP service on the host by tampering with the 'CurrentControlSet\Control\Terminal Server' values

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol+1
Martin Mueller+1Sat Feb 12windows
Detectionmediumtest

Suspicious ScreenSave Change by Reg.exe

Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.002 · Screensaver
François HubautThu Aug 19windows
Detectionmediumtest

Changing Existing Service ImagePath Value Via Reg.EXE

Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Adversaries may use flaws in the permissions for registry to redirect from the originally specified executable to one that they control, in order to launch their own code at Service start. Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.011 · Services Registry Permissions Weakness
François HubautThu Dec 30windows
Detectionmediumtest

Detected Windows Software Discovery

Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable.

WindowsProcess Creation
TA0007 · DiscoveryT1518 · Software Discovery
Nikita Nazarov+1Fri Oct 16windows
Detectionhightest

Reg Add Suspicious Paths

Detects when an adversary uses the reg.exe utility to add or modify new keys or subkeys

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify RegistryT1562.001 · Disable or Modify Tools
François Hubaut+1Fri Aug 19windows
Detectionmediumexperimental

System Language Discovery via Reg.Exe

Detects the usage of Reg.Exe to query system language settings. Attackers may discover the system language to determine the geographic location of victims, customize payloads for specific regions, or avoid targeting certain locales to evade detection.

WindowsProcess Creation
TA0007 · DiscoveryT1614.001 · System Language Discovery
Marco Pedrinazzi (InTheCyber)Fri Jan 09windows
Detectionhightest

Disabled Volume Snapshots

Detects commands that temporarily turn off Volume Snapshots

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Thu Jan 28windows
Detectionhightest

Suspicious Windows Defender Registry Key Tampering Via Reg.EXE

Detects the usage of "reg.exe" to tamper with different Windows Defender registry keys in order to disable some important features related to protection and detection

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)+2Tue Mar 22windows
Detectionmediumtest

Write Protect For Storage Disabled

Detects applications trying to modify the registry in order to disable any write-protect property for storage devices. This could be a precursor to a ransomware attack and has been an observed technique used by cypherpunk group.

WindowsProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defenses
SreemanFri Jun 11windows
Detectionlowexperimental

RegAsm.EXE Execution Without CommandLine Flags or Files

Detects the execution of "RegAsm.exe" without a commandline flag or file, which might indicate potential process injection activity. Usually "RegAsm.exe" should point to a dedicated DLL file or call the help with the "/?" flag.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.009 · Regsvcs/Regasm
François HubautWed Jun 04windows
Detectionmediumtest

Potentially Suspicious Execution Of Regasm/Regsvcs With Uncommon Extension

Detects potentially suspicious execution of the Regasm/Regsvcs utilities with an uncommon extension.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.009 · Regsvcs/Regasm
Nasreddine Bencherchali (Nextron Systems)Mon Feb 13windows
Detectionmediumtest

Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location

Detects potentially suspicious execution of the Regasm/Regsvcs utilities from a potentially suspicious location

WindowsProcess Creation
TA0005 · Defense EvasionT1218.009 · Regsvcs/Regasm
Nasreddine Bencherchali (Nextron Systems)Thu Aug 25windows
Detectionhightest

Exports Critical Registry Keys To a File

Detects the export of a crital Registry key to a file.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1012 · Query Registry
Oddvar Moe+2Mon Oct 12windows
Detectionlowtest

Exports Registry Key To a File

Detects the export of the target Registry key to a file.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1012 · Query Registry
Oddvar Moe+2Wed Oct 07windows
Detectionmediumtest

Imports Registry Key From a File

Detects the import of the specified file to the registry with regedit.exe.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Oddvar Moe+2Wed Oct 07windows
Detectionhightest

Imports Registry Key From an ADS

Detects the import of a alternate datastream to the registry with regedit.exe.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Oddvar Moe+2Mon Oct 12windows
Detectionhightest

Regedit as Trusted Installer

Detects a regedit started with TrustedInstaller privileges or by ProcessHacker.exe

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Florian Roth (Nextron Systems)Thu May 27windows
Detectionhightest

Suspicious Registry Modification From ADS Via Regini.EXE

Detects the import of an alternate data stream with regini.exe, regini.exe can be used to modify registry keys.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Eli Salem+2Mon Oct 12windows
Detectionlowtest

Registry Modification Via Regini.EXE

Detects the execution of regini.exe which can be used to modify registry keys, the changes are imported from one or more text files.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Eli Salem+2Thu Oct 08windows
Detectionmediumtest

DLL Execution Via Register-cimprovider.exe

Detects using register-cimprovider.exe to execute arbitrary dll file.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574 · Hijack Execution Flow
Ivan Dyachkov+2Wed Oct 07windows
Detectionmediumtest

Enumeration for 3rd Party Creds From CLI

Detects processes that query known 3rd party registry keys that holds credentials via commandline

WindowsProcess Creation
TA0006 · Credential AccessT1552.002 · Credentials in Registry
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhighexperimental

Registry Export of Third-Party Credentials

Detects the use of reg.exe to export registry paths associated with third-party credentials. Credential stealers have been known to use this technique to extract sensitive information from the registry.

WindowsProcess Creation
TA0006 · Credential AccessT1552.002 · Credentials in Registry
Swachchhanda Shrawan Poudel (Nextron Systems)Thu May 22windows
Detectionhightest

IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols Via CLI

Detects changes to Internet Explorer's (IE / Windows Internet properties) ZoneMap configuration of the "HTTP" and "HTTPS" protocols to point to the "My Computer" zone. This allows downloaded files from the Internet to be granted the same level of trust as files stored locally.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Sep 05windows
Detectionhightest

Suspicious Debugger Registration Cmdline

Detects the registration of a debugger for a program that is available in the logon screen (sticky key backdoor).

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.008 · Accessibility Features
Florian Roth (Nextron Systems)+2Fri Sep 06windows
Detectionhightest

Potential Persistence Via Logon Scripts - CommandLine

Detects the addition of a new LogonScript to the registry value "UserInitMprLogonScript" for potential persistence

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1037.001 · Logon Script (Windows)
Tom UeltschiSat Jan 12windows
Detectionhightest

Potential Credential Dumping Attempt Using New NetworkProvider - CLI

Detects when an attacker tries to add a new network provider in order to dump clear text credentials, similar to how the NPPSpy tool does it

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Nasreddine Bencherchali (Nextron Systems)Tue Aug 23windows
Detectionhightest

Python Function Execution Security Warning Disabled In Excel

Detects changes to the registry value "PythonFunctionWarnings" that would prevent any warnings or alerts from showing when Python functions are about to be executed. Threat actors could run malicious code through the new Microsoft Excel feature that allows Python to run within the spreadsheet.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
kostastsaleTue Aug 22windows
Detectionhightest

Potential Privilege Escalation via Service Permissions Weakness

Detect modification of services configuration (ImagePath, FailureCommand and ServiceDLL) in registry by processes with Medium integrity level

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Teymur KheirkhabarovSat Oct 26windows
Detectionhightest

Potential Provisioning Registry Key Abuse For Binary Proxy Execution

Detects potential abuse of the provisioning registry key for indirect command execution through "Provlaunch.exe".

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Aug 08windows
Detectionhightest

Potential PowerShell Execution Policy Tampering - ProcCreation

Detects changes to the PowerShell execution policy registry key in order to bypass signing requirements for script execution from the CommandLine

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumtest

Hiding User Account Via SpecialAccounts Registry Key - CommandLine

Detects changes to the registry key "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" where the value is set to "0" in order to hide user account from being listed on the logon screen.

WindowsProcess Creation
TA0005 · Defense EvasionT1564.002 · Hidden Users
kostastsale+1Sat May 14windows
Detectionmediumtest

Persistence Via TypedPaths - CommandLine

Detects modification addition to the 'TypedPaths' key in the user or admin registry via the commandline. Which might indicate persistence attempt

WindowsProcess Creation
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Mon Aug 22windows
Detectionmediumtest

Potential Regsvr32 Commandline Flag Anomaly

Detects a potential command line flag anomaly related to "regsvr32" in which the "/i" flag is used without the "/n" which should be uncommon.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)Sat Jul 13windows
Detectionhightest

Potentially Suspicious Regsvr32 HTTP IP Pattern

Detects regsvr32 execution to download and install DLLs located remotely where the address is an IP address.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)Tue Jan 11windows
Detectionmediumtest

Potentially Suspicious Regsvr32 HTTP/FTP Pattern

Detects regsvr32 execution to download/install/register new DLLs that are hosted on Web or FTP servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)Wed May 24windows
Detectionhightest

Suspicious Regsvr32 Execution From Remote Share

Detects REGSVR32.exe to execute DLL hosted on remote shares

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Nasreddine Bencherchali (Nextron Systems)Mon Oct 31windows
Detectionhightest

Potentially Suspicious Child Process Of Regsvr32

Detects potentially suspicious child processes of "regsvr32.exe".

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
elhoim+2Thu May 05windows