Rule Library

Sigma Rules

1,398 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Renamed Office Binary Execution

Detects the execution of a renamed office binary

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Nasreddine Bencherchali (Nextron Systems)Tue Dec 20windows
Detectionhightest

Renamed PAExec Execution

Detects execution of renamed version of PAExec. Often used by attackers

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)+1Sat May 22windows
Detectionhightest

Renamed PingCastle Binary Execution

Detects the execution of a renamed "PingCastle" binary based on the PE metadata fields.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)+1Thu Jan 11windows
Detectionhightest

Renamed Plink Execution

Detects the execution of a renamed version of the Plink binary

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Nasreddine Bencherchali (Nextron Systems)Mon Jun 06windows
Detectionmediumtest

Visual Studio NodejsTools PressAnyKey Renamed Execution

Detects renamed execution of "Microsoft.NodejsTools.PressAnyKey.exe", which can be abused as a LOLBIN to execute arbitrary binaries

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Apr 11windows
Detectionhightest

Potential Renamed Rundll32 Execution

Detects when 'DllRegisterServer' is called in the commandline and the image is not rundll32. This could mean that the 'rundll32' utility has been renamed in order to avoid detection

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Aug 22windows
Detectionmediumtest

Renamed Remote Utilities RAT (RURAT) Execution

Detects execution of renamed Remote Utilities (RURAT) via Product PE header field

WindowsProcess Creation
TA0005 · Defense EvasionTA0009 · CollectionTA0011 · Command and ControlTA0007 · Discovery+1
Nasreddine Bencherchali (Nextron Systems)Mon Sep 19windows
Detectionhighexperimental

Renamed Schtasks Execution

Detects the execution of renamed schtasks.exe binary, which is a legitimate Windows utility used for scheduling tasks. One of the very common persistence techniques is schedule malicious tasks using schtasks.exe. Since, it is heavily abused, it is also heavily monitored by security products. To evade detection, threat actors may rename the schtasks.exe binary to schedule their malicious tasks.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionhightest

Renamed SysInternals DebugView Execution

Detects suspicious renamed SysInternals DebugView execution

WindowsProcess Creation
TA0042 · Resource DevelopmentT1588.002 · Tool
Florian Roth (Nextron Systems)Thu May 28windows
Detectionhightest

Renamed ProcDump Execution

Detects the execution of a renamed ProcDump executable. This often done by attackers or malware in order to evade defensive mechanisms.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Florian Roth (Nextron Systems)+1Mon Nov 18windows
Detectionhightest

Renamed PsExec Service Execution

Detects suspicious launch of a renamed version of the PSEXESVC service with, which is not often used by legitimate administrators

WindowsProcess Creation
TA0002 · Execution
Florian Roth (Nextron Systems)Thu Jul 21windows
Detectionhightest

Renamed Sysinternals Sdelete Execution

Detects the use of a renamed SysInternals Sdelete, which is something an administrator shouldn't do (the renaming)

WindowsProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Florian Roth (Nextron Systems)Tue Sep 06windows
Detectionhightest

Renamed Vmnat.exe Execution

Detects renamed vmnat.exe or portable version that can be used for DLL side-loading

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
elhoimFri Sep 09windows
Detectioncriticaltest

Renamed Whoami Execution

Detects the execution of whoami that has been renamed to a different name to avoid detection

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Thu Aug 12windows
Detectionmediumtest

Capture Credentials with Rpcping.exe

Detects using Rpcping.exe to send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Julia Fomina+1Fri Oct 09windows
Detectionmediumtest

Ruby Inline Command Execution

Detects execution of ruby using the "-e" flag. This is could be used as a way to launch a reverse shell or execute live ruby code.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionhightest

Potential Rundll32 Execution With DLL Stored In ADS

Detects execution of rundll32 where the DLL being called is stored in an Alternate Data Stream (ADS).

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Harjot SinghSat Jan 21windows
Detectionhightest

Suspicious Advpack Call Via Rundll32.EXE

Detects execution of "rundll32" calling "advpack.dll" with potential obfuscated ordinal calls in order to leverage the "RegisterOCX" function

WindowsProcess Creation
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)+1Wed May 17windows
Detectionhightest

Suspicious Rundll32 Invoking Inline VBScript

Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)Fri Mar 05windows
Detectionmediumtest

Rundll32 InstallScreenSaver Execution

An attacker may execute an application as a SCR File using rundll32.exe desk.cpl,InstallScreenSaver

WindowsProcess Creation
T1218.011 · Rundll32TA0005 · Defense Evasion
Christopher Peacock+2Thu Apr 28windows
Detectionhightest

Suspicious Key Manager Access

Detects the invocation of the Stored User Names and Passwords dialogue (Key Manager)

WindowsProcess Creation
TA0006 · Credential AccessT1555.004 · Windows Credential Manager
Florian Roth (Nextron Systems)Thu Apr 21windows
Detectionhightest

Mshtml.DLL RunHTMLApplication Suspicious Usage

Detects execution of commands that leverage the "mshtml.dll" RunHTMLApplication export to run arbitrary code via different protocol handlers (vbscript, javascript, file, http...)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)+4Sun Aug 14windows
Detectionhightest

Rundll32 Execution Without CommandLine Parameters

Detects suspicious start of rundll32.exe without any parameters as found in CobaltStrike beacon activity

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)Thu May 27windows
Detectionhightest

Suspicious NTLM Authentication on the Printer Spooler Service

Detects a privilege elevation attempt by coercing NTLM authentication on the Printer Spooler service

WindowsProcess Creation
TA0004 · Privilege EscalationTA0006 · Credential AccessT1212 · Exploitation for Credential Access
Elastic Security+1Wed May 04windows
Detectionmediumtest

Potential Obfuscated Ordinal Call Via Rundll32

Detects execution of "rundll32" with potential obfuscated ordinal calls

WindowsProcess Creation
TA0005 · Defense EvasionT1027.010 · Command Obfuscation
Nasreddine Bencherchali (Nextron Systems)+1Wed May 17windows
Detectionmediumtest

Rundll32 Spawned Via Explorer.EXE

Detects execution of "rundll32.exe" with a parent process of Explorer.exe. This has been observed by variants of Raspberry Robin, as first reported by Red Canary.

WindowsProcess Creation
TA0005 · Defense Evasion
CD_ROM_Sat May 21windows
Detectionhightest

Process Memory Dump Via Comsvcs.DLL

Detects a process memory dump via "comsvcs.dll" using rundll32, covering multiple different techniques (ordinal, minidump function, etc.)

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1036 · MasqueradingT1003.001 · LSASS Memory+1
Florian Roth (Nextron Systems)+3Tue Feb 18windows
Detectionhightest

Rundll32 Registered COM Objects

load malicious registered COM objects

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
François HubautSun Feb 13windows
Detectionmediumtest

Suspicious Process Start Locations

Detects suspicious process run from unusual locations

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading2013-05-002 · CAR 2013-05-002
juju4+2Wed Jan 16windows
Detectionmediumtest

Suspicious Rundll32 Setupapi.dll Activity

setupapi.dll library provide InstallHinfSection function for processing INF files. INF file may contain instructions allowing to create values in the registry, modify files and install drivers. This technique could be used to obtain persistence via modifying one of Run or RunOnce registry keys, run process or use other DLLs chain calls (see references) InstallHinfSection function in setupapi.dll calls runonce.exe executable regardless of actual content of INF file.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Konstantin Grishchenko+1Wed Oct 07windows
Detectionhightest

Shell32 DLL Execution in Suspicious Directory

Detects shell32.dll executing a DLL in a suspicious directory

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32
Christian Burkard (Nextron Systems)Wed Nov 24windows
Detectionmediumtest

Potential ShellDispatch.DLL Functionality Abuse

Detects potential "ShellDispatch.dll" functionality abuse to execute arbitrary binaries via "ShellExecute"

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
X__Junior (Nextron Systems)Tue Jun 20windows
Detectionhightest

RunDLL32 Spawning Explorer

Detects RunDLL32.exe spawning explorer.exe as child, which is very uncommon, often observes Gamarue spawning the explorer.exe process in an unusual way

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
elhoim+1Wed Apr 27windows
Detectionmediumtest

Potentially Suspicious Rundll32 Activity

Detects suspicious execution of rundll32, with specific calls to some DLLs with known LOLBIN functionalities

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
juju4+3Wed Jan 16windows
Detectionhightest

Suspicious Control Panel DLL Load

Detects suspicious Rundll32 execution from control.exe as used by Equation Group and Exploit Kits

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Florian Roth (Nextron Systems)Sat Apr 15windows
Detectionhightest

Suspicious Rundll32 Execution With Image Extension

Detects the execution of Rundll32.exe with DLL files masquerading as image files

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Hieu TranMon Mar 13windows
Detectionhightest

Suspicious Usage Of ShellExec_RunDLL

Detects suspicious usage of the ShellExec_RunDLL function to launch other commands as seen in the the raspberry-robin attack

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Detectionhightest

Suspicious ShellExec_RunDLL Call Via Ordinal

Detects suspicious call to the "ShellExec_RunDLL" exported function of SHELL32.DLL through the ordinal number to launch other commands. Adversary might only use the ordinal number in order to bypass existing detection that alert on usage of ShellExec_RunDLL on CommandLine.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Swachchhanda Shrawan PoudelSun Dec 01windows
Detectionhighstable

ShimCache Flush

Detects actions that clear the local ShimCache and remove forensic evidence

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Florian Roth (Nextron Systems)Mon Feb 01windows
Detectionhightest

Suspicious Rundll32 Activity Invoking Sys File

Detects suspicious process related to rundll32 based on command line that includes a *.sys file as seen being used by UNC2452

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Florian Roth (Nextron Systems)Fri Mar 05windows
Detectionmediumtest

Potentially Suspicious Rundll32.EXE Execution of UDL File

Detects the execution of rundll32.exe with the oledb32.dll library to open a UDL file. Threat actors can abuse this technique as a phishing vector to capture authentication credentials or other sensitive data.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0011 · Command and ControlT1218.011 · Rundll32+1
kostastsaleFri Aug 16windows
Detectionhightest

Rundll32 UNC Path Execution

Detects rundll32 execution where the DLL is located on a remote location (share)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares+1
Nasreddine Bencherchali (Nextron Systems)Wed Aug 10windows
Detectionmediumtest

Rundll32 Execution With Uncommon DLL Extension

Detects the execution of rundll32 with a command line that doesn't contain a common extension

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Tim Shelton+2Thu Jan 13windows
Detectionmediumtest

Suspicious Workstation Locking via Rundll32

Detects a suspicious call to the user32.dll function that locks the user workstation

WindowsProcess Creation
TA0005 · Defense Evasion
François HubautSat Jun 04windows
Detectionmediumtest

WebDav Client Execution Via Rundll32.EXE

Detects "svchost.exe" spawning "rundll32.exe" with command arguments like "C:\windows\system32\davclnt.dll,DavSetCookie". This could be an indicator of exfiltration or use of WebDav to launch code (hosted on a WebDav server).

WindowsProcess Creation
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Suspicious WebDav Client Execution Via Rundll32.EXE

Detects "svchost.exe" spawning "rundll32.exe" with command arguments like C:\windows\system32\davclnt.dll,DavSetCookie. This could be an indicator of exfiltration or use of WebDav to launch code (hosted on WebDav Server) or potentially a sign of exploitation of CVE-2023-23397

WindowsProcess Creation
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocolcve.2023-23397
Nasreddine Bencherchali (Nextron Systems)+1Thu Mar 16windows
Detectionhightest

Rundll32 Execution Without Parameters

Detects rundll32 execution without parameters as observed when running Metasploit windows/smb/psexec exploit module

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesT1570 · Lateral Tool TransferTA0002 · Execution+1
Bartlomiej Czyz+1Sun Jan 31windows
Detectionlowtest

Run Once Task Execution as Configured in Registry

This rule detects the execution of Run Once task as configured in the registry

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Avneet Singh+2Sun Oct 18windows