Rule Library

Sigma Rules

1,607 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Cscript/Wscript Potentially Suspicious Child Process

Detects potentially suspicious child processes of Wscript/Cscript. These include processes such as rundll32 with uncommon exports or PowerShell spawning rundll32 or regsvr32. Malware such as Pikabot and Qakbot were seen using similar techniques as well as many others.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)+1Mon May 15windows
Detectionhightest

Cscript/Wscript Uncommon Script Extension Execution

Detects Wscript/Cscript executing a file with an uncommon (i.e. non-script) extension

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScript
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionmediumtest

WSL Child Process Anomaly

Detects uncommon or suspicious child processes spawning from a WSL process. This could indicate an attempt to evade parent/child relationship detections or persistence attempts via cron using WSL

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jan 23windows
Detectionhighexperimental

Installation of WSL Kali-Linux

Detects installation of Kali Linux distribution through Windows Subsystem for Linux (WSL). Attackers may use Kali Linux WSL to leverage its penetration testing tools and capabilities for malicious purposes.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Oct 10windows
Detectionhighexperimental

WSL Kali-Linux Usage

Detects the use of Kali Linux through Windows Subsystem for Linux

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Oct 10windows
Detectionmediumtest

Windows Binary Executed From WSL

Detects the execution of Windows binaries from within a WSL instance. This could be used to masquerade parent-child relationships

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Tue Feb 14windows
Detectionhightest

Proxy Execution Via Wuauclt.EXE

Detects the use of the Windows Update Client binary (wuauclt.exe) for proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Execution
Roberto Rodriguez (Cyb3rWard0g)+4Mon Oct 12windows
Detectionhightest

Suspicious Windows Update Agent Empty Cmdline

Detects suspicious Windows Update Agent activity in which a wuauclt.exe process command line doesn't contain any command line flags

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)Sat Feb 26windows
Detectionhightest

Cab File Extraction Via Wusa.EXE From Potentially Suspicious Paths

Detects the execution of the "wusa.exe" (Windows Update Standalone Installer) utility to extract ".cab" files using the "/extract" argument from potentially suspicious paths.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Wusa.EXE Executed By Parent Process Located In Suspicious Location

Detects execution of the "wusa.exe" (Windows Update Standalone Installer) utility by a parent process that is located in a suspicious location. Attackers could instantiate an instance of "wusa.exe" in order to bypass User Account Control (UAC). They can duplicate the access token from "wusa.exe" to gain elevated privileges.

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)Sun Nov 26windows
Detectionhightest

Xwizard.EXE Execution From Non-Default Location

Detects the execution of Xwizard tool from a non-default directory. When executed from a non-default directory, this utility can be abused in order to side load a custom version of "xwizards.dll".

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Christian Burkard (Nextron Systems)Mon Sep 20windows
Detectionmediumtest

COM Object Execution via Xwizard.EXE

Detects the execution of Xwizard tool with the "RunWizard" flag and a GUID like argument. This utility can be abused in order to run custom COM object created in the registry.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+2Wed Oct 07windows
Emerging Threatcriticaltest

ZxShell Malware

Detects a ZxShell start by the called and well-known function name

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0005 · Defense EvasionT1218.011 · Rundll32+3
Florian Roth (Nextron Systems)+2Thu Jul 202014
Emerging Threatcriticaltest

Turla Group Lateral Movement

Detects automated lateral movement by Turla group

WindowsProcess Creation
G0010 · G0010TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0008 · Lateral Movement+5
Markus NeisTue Nov 072014
Emerging Threatcriticaltest

Turla Group Commands May 2020

Detects commands used by Turla group as reported by ESET in May 2020

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionG0010 · G0010+5
Florian Roth (Nextron Systems)Tue May 262014
Emerging Threatcriticalstable

Exploit for CVE-2015-1641

Detects Winword starting uncommon sub process MicroScMgmt.exe as used in exploits for CVE-2015-1641

WindowsProcess Creation
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Locationcve.2015-1641detection.emerging-threats
Florian Roth (Nextron Systems)Thu Feb 222015
Emerging Threatmediumtest

Exploit for CVE-2017-0261

Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Thu Feb 222017
Emerging Threatcriticalstable

Droppers Exploiting CVE-2017-11882

Detects exploits that use CVE-2017-11882 to start EQNEDT32.EXE and other sub processes like mshta.exe

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Thu Nov 232017
Emerging Threatcriticaltest

Exploit for CVE-2017-8759

Detects Winword starting uncommon sub process csc.exe as used in exploits for CVE-2017-8759

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Fri Sep 152017
Emerging Threathightest

Adwind RAT / JRAT

Detects javaw.exe in AppData folder as used by Adwind / JRAT

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScriptdetection.emerging-threats
Florian Roth (Nextron Systems)+3Fri Nov 102017
Emerging Threathightest

Fireball Archer Install

Detects Archer malware invocation via rundll32

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Sat Jun 032017
Emerging Threatcriticaltest

NotPetya Ransomware Activity

Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and Windows eventlogs are cleared using wevtutil

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32T1070.001 · Clear Windows Event LogsTA0006 · Credential Access+3
Florian Roth (Nextron Systems)+1Wed Jan 162017
Emerging Threathightest

Potential PlugX Activity

Detects the execution of an executable that is typically used by PlugX for DLL side loading starting from an uncommon location

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceS0013 · S0013TA0005 · Defense Evasion+2
Florian Roth (Nextron Systems)Mon Jun 122017
Emerging Threatcriticaltest

WannaCry Ransomware Activity

Detects WannaCry ransomware activity

WindowsProcess Creation
TA0008 · Lateral MovementT1210 · Exploitation of Remote ServicesTA0007 · DiscoveryT1083 · File and Directory Discovery+6
Florian Roth (Nextron Systems)+3Wed Jan 162017
Emerging Threathightest

Potential APT10 Cloud Hopper Activity

Detects potential process and execution activity related to APT10 Cloud Hopper operation

WindowsProcess Creation
TA0002 · ExecutionG0045 · G0045T1059.005 · Visual Basicdetection.emerging-threats
Florian Roth (Nextron Systems)Fri Apr 072017
Emerging Threathightest

Ps.exe Renamed SysInternals Tool

Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report

WindowsProcess Creation
TA0005 · Defense EvasionG0035 · DragonflyT1036.003 · Rename System Utilities2013-05-009 · CAR 2013-05-009+1
Florian Roth (Nextron Systems)Sun Oct 222017
Emerging Threathightest

Lazarus System Binary Masquerading

Detects binaries used by the Lazarus group which use system names but are executed and launched from non-default location

WindowsProcess Creation
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Locationdetection.emerging-threats
Trent Liffick+1Wed Jun 032017
Emerging Threatcriticaltest

Elise Backdoor Activity

Detects Elise backdoor activity used by APT32

WindowsProcess Creation
G0030 · G0030G0050 · APT32S0081 · S0081TA0002 · Execution+2
Florian Roth (Nextron Systems)+1Wed Jan 312018
Emerging Threatcriticaltest

APT27 - Emissary Panda Activity

Detects the execution of DLL side-loading malware used by threat group Emissary Panda aka APT27

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+2
Florian Roth (Nextron Systems)Mon Sep 032018
Emerging Threathightest

Sofacy Trojan Loader Activity

Detects Trojan loader activity as used by APT28

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionG0007 · APT28T1059.003 · Windows Command Shell+3
Florian Roth (Nextron Systems)+2Thu Mar 012018
Emerging Threatcriticalstable

APT29 2018 Phishing Campaign CommandLine Indicators

Detects indicators of APT 29 (Cozy Bear) phishing-campaign as reported by mandiant

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Tue Nov 202018
Emerging Threathightest

Potential MuddyWater APT Activity

Detects potential Muddywater APT activity

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionG0069 · G0069detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Mar 102018
Emerging Threatcriticaltest

OilRig APT Activity

Detects OilRig activity as reported by Nyotron in their March 2018 report

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceG0049 · G0049+8
Florian Roth (Nextron Systems)+4Fri Mar 232018
Emerging Threatmediumtest

Defrag Deactivation

Detects the deactivation and disabling of the Scheduled defragmentation task as seen by Slingshot APT group

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+2
Florian Roth (Nextron Systems)+1Mon Mar 042018
Emerging Threathighstable

TropicTrooper Campaign November 2018

Detects TropicTrooper activity, an actor who targeted high-profile organizations in the energy and food and beverage sectors in Asia

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
@41thexplorer+1Tue Nov 122018
Emerging Threathightest

Potential BearLPE Exploitation

Detects potential exploitation of the BearLPE exploit using Task Scheduler ".job" import arbitrary DACL write\par

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1053.005 · Scheduled Task+2
Olaf HartongWed May 222019
Emerging Threathightest

Exploiting SetupComplete.cmd CVE-2019-1378

Detects exploitation attempt of privilege escalation vulnerability via SetupComplete.cmd and PartnerSetupComplete.cmd described in CVE-2019-1378

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation+5
Florian Roth (Nextron Systems)+2Fri Nov 152019
Emerging Threatcriticalstable

Exploiting CVE-2019-1388

Detects an exploitation attempt in which the UAC consent dialogue is used to invoke an Internet Explorer process running as LOCAL_SYSTEM

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationcve.2019-1388detection.emerging-threats
Florian Roth (Nextron Systems)Wed Nov 202019
Emerging Threathightest

Sudo Privilege Escalation CVE-2019-14287

Detects users trying to exploit sudo vulnerability reported in CVE-2019-14287

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege EscalationT1548.003 · Sudo and Sudo Caching+2
Florian Roth (Nextron Systems)Tue Oct 152019
Emerging Threathightest

Potential Baby Shark Malware Activity

Detects activity that could be related to Baby Shark malware

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0007 · DiscoveryT1012 · Query Registry+4
Florian Roth (Nextron Systems)Sun Feb 242019
Emerging Threatcriticalstable

Potential Dridex Activity

Detects potential Dridex acitvity via specific process patterns

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process InjectionTA0007 · Discovery+3
Florian Roth (Nextron Systems)+2Thu Jan 102019
Emerging Threatcriticalstable

Potential Dtrack RAT Activity

Detects potential Dtrack RAT activity via specific process patterns

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recoverydetection.emerging-threats
Florian Roth (Nextron Systems)+1Wed Oct 302019
Emerging Threathighstable

Potential Emotet Activity

Detects all Emotet like process executions that are not covered by the more generic rules

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information+1
Florian Roth (Nextron Systems)Mon Sep 302019
Emerging Threathightest

Formbook Process Creation

Detects Formbook like process executions that inject code into a set of files in the System32 folder, which executes a special command command line to delete the dropper from the AppData Temp folder. We avoid false positives by excluding all parent process with command line parameters.

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malwaredetection.emerging-threats
Florian Roth (Nextron Systems)+2Mon Sep 302019
Emerging Threatcriticalstable

LockerGoga Ransomware Activity

Detects LockerGoga ransomware activity via specific command line.

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impactdetection.emerging-threats
Vasiliy Burov+1Sun Oct 182019
Emerging Threatcriticalstable

Potential QBot Activity

Detects potential QBot activity by looking for process executions used previously by QBot

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual Basicdetection.emerging-threats
Florian Roth (Nextron Systems)Tue Oct 012019
Emerging Threathighstable

Potential Ryuk Ransomware Activity

Detects Ryuk ransomware activity

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Florian Roth (Nextron Systems)+2Mon Dec 162019
Emerging Threathighstable

Potential Snatch Ransomware Activity

Detects specific process characteristics of Snatch ransomware word document droppers

WindowsProcess Creation
TA0002 · ExecutionT1204 · User Executiondetection.emerging-threats
Florian Roth (Nextron Systems)Wed Aug 262019