Rule Library

Sigma Rules

1,607 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious Redirection to Local Admin Share

Detects a suspicious output redirection to the local admins share, this technique is often found in malicious scripts or hacktool stagers

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Florian Roth (Nextron Systems)Sun Jan 16windows
Detectionmediumtest

Registry Modification of MS-settings Protocol Handler

Detects registry modifications to the 'ms-settings' protocol handler, which is frequently targeted for UAC bypass or persistence. Attackers can modify this registry to execute malicious code with elevated privileges by hijacking the command execution path.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · PersistenceT1548.002 · Bypass User Account Control+2
François Hubaut+1Mon Dec 20windows
Detectionmediumtest

Potential Remote Desktop Tunneling

Detects potential use of an SSH utility to establish RDP over a reverse SSH Tunnel. This can be used by attackers to enable routing of network packets that would otherwise not reach their intended destination.

WindowsProcess Creation
TA0008 · Lateral MovementT1021 · Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionhightest

Potential Defense Evasion Via Right-to-Left Override

Detects the presence of the "u202+E" character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence. This character is used as an obfuscation and masquerading techniques by adversaries to trick users into opening malicious files.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Micah Babinski+2Wed Feb 15windows
Detectionhightest

Script Interpreter Execution From Suspicious Folder

Detects a suspicious script execution in temporary folders or folders accessible by environment variables

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Feb 08windows
Detectionhightest

Suspicious Script Execution From Temp Folder

Detects a suspicious script executions from temporary folder

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+2Wed Jul 14windows
Detectionhighexperimental

Script Interpreter Spawning Credential Scanner - Windows

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets, as seen in the "Shai-Hulud: The Second Coming" campaign.

WindowsProcess Creation
TA0006 · Credential AccessT1552 · Unsecured CredentialsTA0009 · CollectionTA0002 · Execution+2
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 25windows
Detectionhightest

Sensitive File Access Via Volume Shadow Copy Backup

Detects a command that accesses the VolumeShadowCopy in order to extract sensitive files such as the Security or SAM registry hives or the AD database (ntds.dit)

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Max Altgelt (Nextron Systems)+1Mon Aug 09windows
Detectionhightest

Suspicious New Service Creation

Detects creation of a new service via "sc" command or the powershell "new-service" cmdlet with suspicious binary paths

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jul 14windows
Detectionhightest

Suspicious Service Binary Directory

Detects a service binary running in a suspicious directory

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)Tue Mar 09windows
Detectionhightest

Suspicious Windows Service Tampering

Detects the usage of binaries such as 'net', 'sc' or 'powershell' in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1489 · Service StopT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+2Thu Sep 01windows
Detectionmediumtest

Shadow Copies Creation Using Operating Systems Utilities

Shadow Copies creation using operating systems utilities, possible credential access

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential DumpingT1003.002 · Security Account ManagerT1003.003 · NTDS
Teymur Kheirkhabarov+2Tue Oct 22windows
Detectionhighstable

Shadow Copies Deletion Using Operating Systems Utilities

Shadow Copies deletion using operating systems utilities

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1070 · Indicator RemovalT1490 · Inhibit System Recovery
Florian Roth (Nextron Systems)+5Tue Oct 22windows
Detectionhightest

Windows Shell/Scripting Processes Spawning Suspicious Programs

Detects suspicious child processes of a Windows shell and scripting processes such as wscript, rundll32, powershell, mshta...etc.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1059.001 · PowerShell+1
Florian Roth (Nextron Systems)+1Fri Apr 06windows
Detectionmediumtest

Process Creation Using Sysnative Folder

Detects process creation events that use the Sysnative folder (common for CobaltStrike spawns)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Max Altgelt (Nextron Systems)Tue Aug 23windows
Detectionhightest

System File Execution Location Anomaly

Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+4Mon Nov 27windows
Detectionhightest

Suspicious SYSTEM User Process Creation

Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)

WindowsProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationT1134 · Access Token Manipulation+2
Florian Roth (Nextron Systems)+1Mon Dec 20windows
Detectionmediumtest

Suspicious SYSVOL Domain Group Policy Access

Detects Access to Domain Group Policies stored in SYSVOL

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Markus Neis+2Mon Apr 09windows
Detectionhightest

Tasks Folder Evasion

The Tasks folder in system32 and syswow64 are globally writable paths. Adversaries can take advantage of this and load or influence any script hosts or ANY .NET Application in Tasks to load and execute a custom assembly into cscript, wscript, regsvr32, mshta, eventvwr

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0002 · Execution+1
SreemanMon Jan 13windows
Detectionlowtest

Malicious Windows Script Components File Execution by TAEF Detection

Windows Test Authoring and Execution Framework (TAEF) framework allows you to run automation by executing tests files written on different languages (C, C#, Microsoft COM Scripting interfaces Adversaries may execute malicious code (such as WSC file with VBScript, dll and so on) directly by running te.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Agro oscd.communityTue Oct 13windows
Detectionmediumtest

Malicious PE Execution by Microsoft Visual Studio Debugger

There is an option for a MS VS Just-In-Time Debugger "vsjitdebugger.exe" to launch specified executable and attach a debugger. This option may be used adversaries to execute malicious code by signed verified binary. The debugger is installed alongside with Microsoft Visual Studio package.

WindowsProcess Creation
T1218 · System Binary Proxy ExecutionTA0005 · Defense Evasion
Agro+2Wed Oct 14windows
Detectionmediumtest

Suspicious Userinit Child Process

Detects a suspicious child process of userinit

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)+1Mon Jun 17windows
Detectionhighexperimental

Suspicious Velociraptor Child Process

Detects the suspicious use of the Velociraptor DFIR tool to execute other tools or download additional payloads, as seen in a campaign where it was abused for remote access and to stage further attacks.

WindowsProcess Creation
TA0011 · Command and ControlTA0003 · PersistenceTA0005 · Defense EvasionT1219 · Remote Access Software
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Aug 29windows
Detectionmediumtest

Weak or Abused Passwords In CLI

Detects weak passwords or often abused passwords (seen used by threat actors) via the CLI. An example would be a threat actor creating a new user via the net command and providing the password inline

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Sep 14windows
Detectionmediumtest

Usage Of Web Request Commands And Cmdlets

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via CommandLine

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
James Pemberton+4Thu Oct 24windows
Detectionhightest

WhoAmI as Parameter

Detects a suspicious process command line that uses whoami as first parameter (as e.g. used by EfsPotato)

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Nov 29windows
Detectionhightest

Execution via WorkFolders.exe

Detects using WorkFolders.exe to execute an arbitrary control.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Maxime ThiebautThu Oct 21windows
Detectionhightest

Suspect Svchost Activity

It is extremely abnormal for svchost.exe to spawn without any CLI arguments and is normally observed when a malicious process spawns the process and injects code into the process memory space.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
David BurkettSat Dec 28windows
Detectionhightest

Suspicious Process Masquerading As SvcHost.EXE

Detects a suspicious process that is masquerading as the legitimate "svchost.exe" by naming its binary "svchost.exe" and executing from an uncommon location. Adversaries often disguise their malicious binaries by naming them after legitimate system processes like "svchost.exe" to evade detection.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Swachchhanda Shrawan PoudelWed Aug 07windows
Detectionhightest

Terminal Service Process Spawn

Detects a process spawned by the terminal service server process (this could be an indicator for an exploitation of CVE-2019-0708)

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0008 · Lateral MovementT1210 · Exploitation of Remote Services+1
Florian Roth (Nextron Systems)Wed May 22windows
Detectionhighexperimental

Uncommon Svchost Command Line Parameter

Detects instances of svchost.exe running with an unusual or uncommon command line parameter by excluding known legitimate or common patterns. This could point at a file masquerading as svchost, a process injection, or hollowing of a legitimate svchost instance.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1036.005 · Match Legitimate Name or LocationT1055 · Process Injection+1
Liran RavichFri Nov 14windows
Detectionmediumtest

Uncommon Svchost Parent Process

Detects an uncommon svchost parent process

WindowsProcess Creation
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Florian Roth (Nextron Systems)Tue Aug 15windows
Detectionmediumtest

Permission Check Via Accesschk.EXE

Detects the usage of the "Accesschk" utility, an access and privilege audit tool developed by SysInternal and often being abused by attacker to verify process privileges

WindowsProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
Teymur Kheirkhabarov+3Tue Oct 13windows
Detectionmediumtest

Active Directory Database Snapshot Via ADExplorer

Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionhightest

Suspicious Active Directory Database Snapshot Via ADExplorer

Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database to a suspicious directory. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionlowtest

Potential Execution of Sysinternals Tools

Detects command lines that contain the 'accepteula' flag which could be a sign of execution of one of the Sysinternals tools

WindowsProcess Creation
TA0042 · Resource DevelopmentT1588.002 · Tool
Markus NeisMon Aug 28windows
Detectionmediumtest

Potential Memory Dumping Activity Via LiveKD

Detects execution of LiveKD based on PE metadata or image name

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionhightest

Kernel Memory Dump Via LiveKD

Detects execution of LiveKD with the "-m" flag to potentially dump the kernel memory

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue May 16windows
Detectionmediumtest

Procdump Execution

Detects usage of the SysInternals Procdump utility

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)Mon Aug 16windows
Detectionhightest

Potential SysInternals ProcDump Evasion

Detects uses of the SysInternals ProcDump utility in which ProcDump or its output get renamed, or a dump file is moved or copied to a different name

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)Tue Jan 11windows
Detectionhighstable

Potential LSASS Process Dump Via Procdump

Detects potential credential harvesting attempts through LSASS memory dumps using ProcDump. This rule identifies suspicious command-line patterns that combine memory dump flags (-ma, -mm, -mp) with LSASS-related process markers. LSASS (Local Security Authority Subsystem Service) contains sensitive authentication data including plaintext passwords, NTLM hashes, and Kerberos tickets in memory. Attackers commonly dump LSASS memory to extract credentials for lateral movement and privilege escalation.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingTA0006 · Credential AccessT1003.001 · LSASS Memory+1
Florian Roth (Nextron Systems)Tue Oct 30windows
Detectionmediumtest

Psexec Execution

Detects user accept agreement execution in psexec commandline

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1569 · System ServicesT1021 · Remote Services
omkar72Fri Oct 30windows
Detectionhightest

PsExec/PAExec Escalation to LOCAL SYSTEM

Detects suspicious commandline flags used by PsExec and PAExec to escalate a command line to LOCAL_SYSTEM rights

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Tue Nov 23windows
Detectionhightest

Potential PsExec Remote Execution

Detects potential psexec command that initiate execution on a remote systems via common commandline flags used by the utility

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Tue Feb 28windows
Detectionmediumtest

PsExec Service Execution

Detects launch of the PSEXESVC service, which means that this system was the target of a psexec remote execution

WindowsProcess Creation
TA0002 · Execution
Thomas Patzke+2Mon Jun 12windows
Detectionhightest

PsExec Service Child Process Execution as LOCAL SYSTEM

Detects suspicious launch of the PSEXESVC service on this system and a sub process run as LOCAL_SYSTEM (-s), which means that someone remotely started a command on this system running it with highest privileges and not only the privileges of the login user account (e.g. the administrator account)

WindowsProcess Creation
TA0002 · Execution
Florian Roth (Nextron Systems)Thu Jul 21windows
Detectionmediumtest

Suspicious Use of PsLogList

Detects usage of the PsLogList utility to dump event log in order to extract admin accounts and perform account discovery or delete events logs

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account DiscoveryT1087.001 · Local AccountT1087.002 · Domain Account
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionmediumtest

Sysinternals PsService Execution

Detects usage of Sysinternals PsService which can be abused for service reconnaissance and tampering

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jun 16windows