Rule Library

Sigma Rules

1,607 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Allow Service Access Using Security Descriptor Tampering Via Sc.EXE

Detects suspicious DACL modifications to allow access to a service from a suspicious trustee. This can be used to override access restrictions set by previous ACLs.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Tue Feb 28windows
Detectionhightest

Deny Service Access Using Security Descriptor Tampering Via Sc.EXE

Detects suspicious DACL modifications to deny access to a service that affects critical trustees. This can be used to hide services or make them unstoppable.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.003 · Windows Service
Jonhnathan Ribeiro+1Fri Oct 16windows
Detectionhightest

Service DACL Abuse To Hide Services Via Sc.EXE

Detects usage of the "sc.exe" utility adding a new service with special permission seen used by threat actors which makes the service hidden and unremovable.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Andreas HunkelerMon Dec 20windows
Detectionmediumtest

Service Security Descriptor Tampering Via Sc.EXE

Detection of sc.exe utility adding a new service with special permission which hides that service.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Tue Feb 28windows
Detectionhightest

Suspicious Service Path Modification

Detects service path modification via the "sc" binary to a suspicious command or path

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Victor Sergeev+2Mon Oct 21windows
Detectionmediumtest

Potential Persistence Attempt Via Existing Service Tampering

Detects the modification of an existing service in order to execute an arbitrary payload when the service is started or killed as a potential method for persistence.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1543.003 · Windows Service+1
SreemanTue Sep 29windows
Detectionlowtest

Stop Windows Service Via Sc.EXE

Detects the stopping of a Windows service via the "sc.exe" utility

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Jakob Weinzettl+2Sun Mar 05windows
Detectionhightest

Suspicious Schtasks Execution AppData Folder

Detects the creation of a schtask that executes a file from C:\Users\<USER>\AppData\Local

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+1Tue Mar 15windows
Detectionhightest

Suspicious Modification Of Scheduled Tasks

Detects when an attacker tries to modify an already existing scheduled tasks to run from a suspicious location Attackers can create a simple looking task in order to avoid detection on creation as it's often the most focused on Instead they modify the task after creation to include their malicious payload

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Thu Jul 28windows
Detectionlowtest

Scheduled Task Creation Via Schtasks.EXE

Detects the creation of scheduled tasks by user accounts via the "schtasks" utility.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+3
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionhightest

Suspicious Scheduled Task Creation Involving Temp Folder

Detects the creation of scheduled tasks that involves a temporary folder and runs only once

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Thu Mar 11windows
Detectionmediumexperimental

Scheduled Task Creation with Curl and PowerShell Execution Combo

Detects the creation of a scheduled task using schtasks.exe, potentially in combination with curl for downloading payloads and PowerShell for executing them. This facilitates executing malicious payloads or connecting with C&C server persistently without dropping the malware sample on the host.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+4
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionhightest

Delete Important Scheduled Task

Detects when adversaries stop services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

Delete All Scheduled Tasks

Detects the usage of schtasks with the delete flag and the asterisk symbol to delete all tasks from the schedule of the local computer, including tasks scheduled by other users.

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

Disable Important Scheduled Task

Detects when adversaries stop services or processes by disabling their respective scheduled tasks in order to conduct data destructive activities

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
François Hubaut+2Sun Dec 26windows
Detectionmediumtest

Schedule Task Creation From Env Variable Or Potentially Suspicious Path Via Schtasks.EXE

Detects Schtask creations that point to a suspicious folder or an environment variable often used by malware

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Mon Feb 21windows
Detectionhightest

Schtasks From Suspicious Folders

Detects scheduled task creations that have suspicious action command and folder combinations

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Fri Apr 15windows
Detectionmediumtest

Suspicious Scheduled Task Name As GUID

Detects creation of a scheduled task with a GUID like name

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Oct 31windows
Detectionhightest

Uncommon One Time Only Scheduled Task At 00:00

Detects scheduled task creation events that include suspicious actions, and is run once at 00:00

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task
Martin MuellerFri Jul 15windows
Detectionhighexperimental

Potential SSH Tunnel Persistence Install Using A Scheduled Task

Detects the creation of new scheduled tasks via commandline, using Schtasks.exe. This rule detects tasks creating that call OpenSSH, which may indicate the creation of reverse SSH tunnel to the attacker's server.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task+1
Rory DuncanMon Jul 14windows
Detectionmediumtest

Potential Persistence Via Microsoft Compatibility Appraiser

Detects manual execution of the "Microsoft Compatibility Appraiser" task via schtasks. In order to trigger persistence stored in the "\AppCompatFlags\TelemetryController" registry key.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
SreemanTue Sep 29windows
Detectionhightest

Potential Persistence Via Powershell Search Order Hijacking - Task

Detects suspicious powershell execution via a schedule task where the command ends with an suspicious flags to hide the powershell instance instead of executeing scripts or commands. This could be a sign of persistence via PowerShell "Get-Variable" technique as seen being used in Colibri Loader

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+1Fri Apr 08windows
Detectionmediumtest

Scheduled Task Executing Payload from Registry

Detects the creation of a schtasks that potentially executes a payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
X__Junior (Nextron Systems)+1Tue Jul 18windows
Detectionhightest

Scheduled Task Executing Encoded Payload from Registry

Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+3Sat Feb 12windows
Detectionhightest

Suspicious Schtasks Schedule Types

Detects scheduled task creations or modification on a suspicious schedule type

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionmediumtest

Suspicious Schtasks Schedule Type With High Privileges

Detects scheduled task creations or modification to be run with high privileges on a suspicious schedule type

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Wed Aug 31windows
Detectionmediumtest

Suspicious Scheduled Task Creation via Masqueraded XML File

Detects the creation of a scheduled task using the "-XML" flag with a file without the '.xml' extension. This behavior could be indicative of potential defense evasion attempt during persistence

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0005 · Defense EvasionTA0003 · Persistence+2
Swachchhanda Shrawan Poudel+1Thu Apr 20windows
Detectionhightest

Suspicious Command Patterns In Scheduled Task Creation

Detects scheduled task creation using "schtasks" that contain potentially suspicious or uncommon commands

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Wed Feb 23windows
Detectionhightest

Schtasks Creation Or Modification With SYSTEM Privileges

Detects the creation or update of a scheduled task to run with "NT AUTHORITY\SYSTEM" privileges

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Thu Jul 28windows
Detectionhighexperimental

Scheduled Task Creation Masquerading as System Processes

Detects the creation of scheduled tasks that involve system processes, which may indicate malicious actors masquerading as or abusing these processes to execute payloads or maintain persistence.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+3
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionhightest

Script Event Consumer Spawning Process

Detects a suspicious child process of Script Event Consumer (scrcons.exe).

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Sittikorn SMon Jun 21windows
Detectionmediumtest

Potential Shim Database Persistence via Sdbinst.EXE

Detects installation of a new shim using sdbinst.exe. Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.011 · Application Shimming
Markus NeisWed Jan 16windows
Detectionmediumtest

Uncommon Extension Shim Database Installation Via Sdbinst.EXE

Detects installation of a potentially suspicious new shim with an uncommon extension using sdbinst.exe. Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.011 · Application Shimming
Nasreddine Bencherchali (Nextron Systems)Tue Aug 01windows
Detectionmediumtest

Sdclt Child Processes

A General detection for sdclt spawning new processes. This could be an indicator of sdclt being used for bypass UAC techniques.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Sdiagnhost Calling Suspicious Child Process

Detects sdiagnhost.exe calling a suspicious child process (e.g. used in exploits for Follina / CVE-2022-30190)

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1218 · System Binary Proxy Execution
kostastsaleWed Jun 01windows
Detectionmediumtest

Potential Suspicious Activity Using SeCEdit

Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy

WindowsProcess Creation
TA0009 · CollectionTA0007 · DiscoveryTA0003 · PersistenceTA0005 · Defense Evasion+16
Janantha MarasingheFri Nov 18windows
Detectionlowexperimental

NodeJS Execution of JavaScript File

Detects execution of JavaScript or JSC files using NodeJs binary node.exe, that could be potentially suspicious. Node.js is a popular open-source JavaScript runtime that runs code outside browsers and is widely used for both frontend and backend development. Adversaries have been observed abusing Node.js to disguise malware as legitimate processes, evade security defenses, and maintain persistence within target systems. Because Node.js is commonly used, this rule may generate false positives in some environments. However, if such activity is unusual in your environment, it is highly suspicious and warrants immediate investigation.

WindowsProcess Creation
TA0002 · ExecutionT1059.007 · JavaScript
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Apr 21windows
Detectionhightest

Suspicious Serv-U Process Pattern

Detects a suspicious process pattern which could be a sign of an exploited Serv-U service

WindowsProcess Creation
TA0006 · Credential AccessT1555 · Credentials from Password Storescve.2021-35211
Florian Roth (Nextron Systems)Wed Jul 14windows
Detectionhightest

Uncommon Child Process Of Setres.EXE

Detects uncommon child process of Setres.EXE. Setres.EXE is a Windows server only process and tool that can be used to set the screen resolution. It can potentially be abused in order to launch any arbitrary file with a name containing the word "choice" from the current execution path.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
@gott_cyber+1Sun Dec 11windows
Detectionmediumtest

Potential SPN Enumeration Via Setspn.EXE

Detects service principal name (SPN) enumeration used for Kerberoasting

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Markus Neis+1Wed Nov 14windows
Detectionmediumtest

Setup16.EXE Execution With Custom .Lst File

Detects the execution of "Setup16.EXE" and old installation utility with a custom ".lst" file. These ".lst" file can contain references to external program that "Setup16.EXE" will execute. Attackers and adversaries might leverage this as a living of the land utility.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.005 · Executable Installer File Permissions Weakness
François HubautSun Dec 01windows
Detectionmediumtest

Suspicious Execution of Shutdown

Use of the commandline to shutdown or reboot windows

WindowsProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
François HubautSat Jan 01windows
Detectionmediumtest

Suspicious Execution of Shutdown to Log Out

Detects the rare use of the command line tool shutdown to logoff a user

WindowsProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
François HubautSat Oct 01windows
Detectionmediumtest

Uncommon Sigverif.EXE Child Process

Detects uncommon child processes spawning from "sigverif.exe", which could indicate potential abuse of the latter as a living of the land binary in order to proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

Uncommon Child Processes Of SndVol.exe

Detects potentially uncommon child processes of SndVol.exe (the Windows volume mixer)

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionmediumtest

Audio Capture via SoundRecorder

Detect attacker collecting audio via SoundRecorder application.

WindowsProcess Creation
TA0009 · CollectionT1123 · Audio Capture
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhighexperimental

Suspicious Speech Runtime Binary Child Process

Detects suspicious Speech Runtime Binary Execution by monitoring its child processes. Child processes spawned by SpeechRuntime.exe could indicate an attempt for lateral movement via COM & DCOM hijacking.

WindowsProcess Creation
TA0005 · Defense EvasionTA0008 · Lateral MovementT1021.003 · Distributed Component Object ModelT1218 · System Binary Proxy Execution
andrewdanisThu Oct 23windows
Detectionhightest

Suspicious Splwow64 Without Params

Detects suspicious Splwow64.exe process without any command line parameters

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)Mon Aug 23windows