Rule Library

Sigma Rules

1,398 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threatcriticalstable

LockerGoga Ransomware Activity

Detects LockerGoga ransomware activity via specific command line.

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impactdetection.emerging-threats
Vasiliy Burov+1Sun Oct 182019
Emerging Threatcriticalstable

Potential QBot Activity

Detects potential QBot activity by looking for process executions used previously by QBot

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual Basicdetection.emerging-threats
Florian Roth (Nextron Systems)Tue Oct 012019
Emerging Threathighstable

Potential Ryuk Ransomware Activity

Detects Ryuk ransomware activity

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Florian Roth (Nextron Systems)+2Mon Dec 162019
Emerging Threathighstable

Potential Snatch Ransomware Activity

Detects specific process characteristics of Snatch ransomware word document droppers

WindowsProcess Creation
TA0002 · ExecutionT1204 · User Executiondetection.emerging-threats
Florian Roth (Nextron Systems)Wed Aug 262019
Emerging Threatmediumtest

Potential APT-C-12 BlueMushroom DLL Load Activity Via Regsvr32

Detects potential BlueMushroom DLL loading activity via regsvr32 from AppData Local

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32detection.emerging-threats
Florian Roth (Nextron Systems)+2Wed Oct 022019
Emerging Threatcriticaltest

APT31 Judgement Panda Activity

Detects APT31 Judgement Panda activity as described in the Crowdstrike 2019 Global Threat Report

WindowsProcess Creation
TA0009 · CollectionTA0008 · Lateral MovementTA0006 · Credential AccessG0128 · GOLD SOUTHFIELD+3
Florian Roth (Nextron Systems)Thu Feb 212019
Emerging Threatcriticalstable

Potential Russian APT Credential Theft Activity

Detects Russian group activity as described in Global Threat Report 2019 by Crowdstrike

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In FilesT1003.003 · NTDSdetection.emerging-threats
Florian Roth (Nextron Systems)Thu Feb 212019
Emerging Threathightest

Potential EmpireMonkey Activity

Detects potential EmpireMonkey APT activity

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32detection.emerging-threats
Markus Neis+1Tue Apr 022019
Emerging Threatcriticalstable

Equation Group DLL_U Export Function Load

Detects a specific export function name used by one of EquationGroup tools

WindowsProcess Creation
G0020 · G0020TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Mon Mar 042019
Emerging Threathightest

Mustang Panda Dropper

Detects specific process parameters as used by Mustang Panda droppers

WindowsProcess Creation
T1587.001 · MalwareTA0042 · Resource Developmentdetection.emerging-threats
Florian Roth (Nextron Systems)+1Wed Oct 302019
Emerging Threathightest

Operation Wocao Activity

Detects activity mentioned in Operation Wocao report

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0007 · DiscoveryT1012 · Query Registry+7
Florian Roth (Nextron Systems)+1Fri Dec 202019
Emerging Threathightest

Exploited CVE-2020-10189 Zoho ManageEngine

Detects the exploitation of Zoho ManageEngine Desktop Central Java Deserialization vulnerability reported as CVE-2020-10189

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1059.001 · PowerShell+4
Florian Roth (Nextron Systems)Wed Mar 252020
Emerging Threathightest

Suspicious PrinterPorts Creation (CVE-2020-1048)

Detects new commands that add new printer port which point to suspicious file

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionT1059.001 · PowerShellcve.2020-1048+1
EagleEye Team+1Wed May 132020
Emerging Threatcriticaltest

DNS RCE CVE-2020-1350

Detects exploitation of DNS RCE bug reported in CVE-2020-1350 by the detection of suspicious sub process

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1569.002 · Service Execution+2
Florian Roth (Nextron Systems)Wed Jul 152020
Emerging Threathightest

Exploitation Attempt Of CVE-2020-1472 - Execution of ZeroLogon PoC

Detects the execution of the commonly used ZeroLogon PoC executable.

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1210 · Exploitation of Remote Servicescve.2020-1472+1
kostastsale+1Sat Feb 122020
Emerging Threathightest

Blue Mockingbird

Attempts to detect system changes made by Blue Mockingbird

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0002 · ExecutionT1112 · Modify Registry+2
Trent LiffickThu May 142020
Emerging Threatcriticaltest

Potential Emotet Rundll32 Execution

Detecting Emotet DLL loading by looking for rundll32.exe processes with command lines ending in ,RunDLL or ,Control_RunDLL

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
FPT.EagleEyeFri Dec 252020
Emerging Threathightest

Potential Ke3chang/TidePool Malware Activity

Detects registry modifications potentially related to the Ke3chang/TidePool malware as seen in campaigns running in 2019 and 2020

WindowsProcess Creation
G0004 · G0004TA0005 · Defense EvasionT1562.001 · Disable or Modify Toolsdetection.emerging-threats
Markus Neis+1Thu Jun 182020
Emerging Threatcriticaltest

Potential Maze Ransomware Activity

Detects specific process characteristics of Maze ransomware word document droppers

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious FileT1047 · Windows Management InstrumentationTA0040 · Impact+2
Florian Roth (Nextron Systems)Fri May 082020
Emerging Threathighstable

Trickbot Malware Activity

Detects Trickbot malware process tree pattern in which "rundll32.exe" is a parent of "wermgr.exe"

WindowsProcess Creation
TA0002 · ExecutionT1559 · Inter-Process Communicationdetection.emerging-threats
Florian Roth (Nextron Systems)Thu Nov 262020
Emerging Threatcriticaltest

EvilNum APT Golden Chickens Deployment Via OCX Files

Detects Golden Chickens deployment method as used by Evilnum and described in ESET July 2020 report

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Fri Jul 102020
Emerging Threathightest

GALLIUM IOCs

Detects artifacts associated with GALLIUM cyber espionage group as reported by Microsoft Threat Intelligence Center in the December 2019 report.

WindowsProcess Creation
TA0006 · Credential AccessTA0011 · Command and ControlT1212 · Exploitation for Credential AccessT1071 · Application Layer Protocol+2
Tim BurrellFri Feb 072020
Emerging Threatcriticaltest

Greenbug Espionage Group Indicators

Detects tools and process executions used by Greenbug in their May 2020 campaign as reported by Symantec

WindowsProcess Creation
G0049 · G0049TA0002 · ExecutionT1059.001 · PowerShellTA0011 · Command and Control+4
Florian Roth (Nextron Systems)Wed May 202020
Emerging Threatcriticaltest

Lazarus Group Activity

Detects different process execution behaviors as described in various threat reports on Lazarus group activity

WindowsProcess Creation
G0032 · Lazarus GroupTA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Florian Roth (Nextron Systems)+1Wed Dec 232020
Emerging Threathightest

UNC2452 Process Creation Patterns

Detects a specific process creation patterns as seen used by UNC2452 and provided by Microsoft as Microsoft Defender ATP queries

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Florian Roth (Nextron Systems)Fri Jan 222020
Emerging Threatcriticaltest

UNC2452 PowerShell Pattern

Detects a specific PowerShell command line pattern used by the UNC2452 actors as mentioned in Microsoft and Symantec reports

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1047 · Windows Management Instrumentationdetection.emerging-threats
Florian Roth (Nextron Systems)Wed Jan 202020
Emerging Threathightest

Suspicious VBScript UN2452 Pattern

Detects suspicious inline VBScript keywords as used by UNC2452

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Florian Roth (Nextron Systems)Fri Mar 052020
Emerging Threathightest

TAIDOOR RAT DLL Load

Detects specific process characteristics of Chinese TAIDOOR RAT malware load

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1055.001 · Dynamic-link Library Injection+1
Florian Roth (Nextron Systems)Thu Jul 302020
Emerging Threatcriticaltest

Winnti Malware HK University Campaign

Detects specific process characteristics of Winnti malware noticed in Dec/Jan 2020 in a campaign against Honk Kong universities

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+2
Florian Roth (Nextron Systems)+1Sat Feb 012020
Emerging Threatcriticalstable

Winnti Pipemon Characteristics

Detects specific process characteristics of Winnti Pipemon malware reported by ESET

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+2
Florian Roth (Nextron Systems)+1Thu Jul 302020
Emerging Threathightest

Potential Atlassian Confluence CVE-2021-26084 Exploitation Attempt

Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2021-26084

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationT1059 · Command and Scripting Interpreter+2
Bhabesh RajWed Sep 082021
Emerging Threathighstable

Potential CVE-2021-26857 Exploitation Attempt

Detects possible successful exploitation for vulnerability described in CVE-2021-26857 by looking for | abnormal subprocesses spawning by Exchange Server's Unified Messaging service

WindowsProcess Creation
T1203 · Exploitation for Client ExecutionTA0002 · Executioncve.2021-26857detection.emerging-threats
Bhabesh RajWed Mar 032021
Emerging Threatcriticaltest

Serv-U Exploitation CVE-2021-35211 by DEV-0322

Detects patterns as noticed in exploitation of Serv-U CVE-2021-35211 vulnerability by threat group DEV-0322

WindowsProcess Creation
TA0003 · PersistenceT1136.001 · Local Accountcve.2021-35211detection.emerging-threats
Florian Roth (Nextron Systems)Wed Jul 142021
Emerging Threathightest

Potential CVE-2021-40444 Exploitation Attempt

Detects potential exploitation of CVE-2021-40444 via suspicious process patterns seen in in-the-wild exploitations

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpretercve.2021-40444detection.emerging-threats
Florian Roth (Nextron Systems)Wed Sep 082021
Emerging Threathightest

Potential Exploitation Attempt From Office Application

Detects Office applications executing a child process that includes directory traversal patterns. This could be an attempt to exploit CVE-2022-30190 (MSDT RCE) or CVE-2021-40444 (MSHTML RCE)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasioncve.2021-40444detection.emerging-threats
Christian Burkard (Nextron Systems)+1Thu Jun 022021
Emerging Threatcriticaltest

Potential CVE-2021-41379 Exploitation Attempt

Detects potential exploitation attempts of CVE-2021-41379 (InstallerFileTakeOver), a local privilege escalation (LPE) vulnerability where the attacker spawns a "cmd.exe" process as a child of Microsoft Edge elevation service "elevation_service" with "LOCAL_SYSTEM" rights

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationcve.2021-41379detection.emerging-threats
Florian Roth (Nextron Systems)Mon Nov 222021
Emerging Threathightest

Potential CVE-2021-44228 Exploitation Attempt - VMware Horizon

Detects potential initial exploitation attempts against VMware Horizon deployments running a vulnerable versions of Log4j.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-44228detection.emerging-threats
kostastsaleFri Jan 142021
Emerging Threathightest

Suspicious RazerInstaller Explorer Subprocess

Detects a explorer.exe sub process of the RazerInstaller software which can be invoked from the installer to select a different installation folder but can also be exploited to escalate privileges to LOCAL SYSTEM

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1553 · Subvert Trust Controlsdetection.emerging-threats
Florian Roth (Nextron Systems)+1Mon Aug 232021
Emerging Threatcriticaltest

Potential SystemNightmare Exploitation Attempt

Detects an exploitation attempt of SystemNightmare in order to obtain a shell as LOCAL_SYSTEM

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationdetection.emerging-threats
Florian Roth (Nextron Systems)Wed Aug 112021
Emerging Threathightest

Potential BlackByte Ransomware Activity

Detects command line patterns used by BlackByte ransomware in different operations

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0040 · ImpactT1485 · Data Destruction+4
Florian Roth (Nextron Systems)Fri Feb 252021
Emerging Threathightest

Conti Volume Shadow Listing

Detects a command used by conti to find volume shadow backups

WindowsProcess Creation
T1587.001 · MalwareTA0042 · Resource Developmentdetection.emerging-threats
Max Altgelt (Nextron Systems)+1Mon Aug 092021
Emerging Threathightest

Conti NTDS Exfiltration Command

Detects a command used by conti to exfiltrate NTDS

WindowsProcess Creation
TA0009 · CollectionT1560 · Archive Collected Datadetection.emerging-threats
Max Altgelt (Nextron Systems)+1Mon Aug 092021
Emerging Threatcriticaltest

Potential Conti Ransomware Activity

Detects a specific command used by the Conti ransomware group

WindowsProcess Creation
TA0040 · ImpactS0575 · S0575T1486 · Data Encrypted for Impactdetection.emerging-threats
François HubautTue Oct 122021
Emerging Threathightest

Potential Conti Ransomware Database Dumping Activity Via SQLCmd

Detects a command used by conti to dump database

WindowsProcess Creation
TA0009 · CollectionT1005 · Data from Local Systemdetection.emerging-threats
François HubautMon Aug 162021
Emerging Threatcriticaltest

DarkSide Ransomware Pattern

Detects DarkSide Ransomware and helpers

WindowsProcess Creation
TA0002 · ExecutionT1204 · User Executiondetection.emerging-threats
Florian Roth (Nextron Systems)Fri May 142021
Emerging Threathightest

Potential Devil Bait Malware Reconnaissance

Detects specific process behavior observed with Devil Bait samples

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Mon May 152021
Emerging Threathightest

Potential Goofy Guineapig Backdoor Activity

Detects a specific broken command that was used by Goofy-Guineapig as described by the NCSC report.

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
X__Junior (Nextron Systems)Sun May 142021
Emerging Threathightest

Potential Goofy Guineapig GoolgeUpdate Process Anomaly

Detects "GoogleUpdate.exe" spawning a new instance of itself in an uncommon location as seen used by the Goofy Guineapig backdoor

WindowsProcess Creation
TA0005 · Defense Evasiondetection.emerging-threats
X__Junior (Nextron Systems)+1Mon May 152021