Rule Library

Sigma Rules

1,398 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Threat Huntlowtest

Potential File Override/Append Via SET Command

Detects the use of the "SET" internal command of Cmd.EXE with the /p flag followed directly by an "=" sign. Attackers used this technique along with an append redirection operator ">>" in order to update the content of a file indirectly. Ex: cmd /c >> example.txt set /p="test data". This will append "test data" to contents of "example.txt". The typical use case of the "set /p=" command is to prompt the user for input.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)+1Thu Aug 22windows
Threat Huntmediumtest

Headless Process Launched Via Conhost.EXE

Detects the launch of a child process via "conhost.exe" with the "--headless" flag. The "--headless" flag hides the windows from the user upon execution.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shell+1
Nasreddine Bencherchali (Nextron Systems)Tue Jul 23windows
Threat Huntmediumtest

Dynamic .NET Compilation Via Csc.EXE - Hunting

Detects execution of "csc.exe" to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Deliverydetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Aug 02windows
Threat Huntmediumtest

File Download Via Curl.EXE

Detects file download using curl.exe

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Tue Jul 05windows
Threat Huntlowtest

Curl.EXE Execution

Detects a curl process start on Windows, which could indicates a file download from a remote location or a simple web request to a remote server

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Tue Jul 05windows
Threat Huntmediumtest

Potential Data Exfiltration Via Curl.EXE

Detects the execution of the "curl" process with "upload" flags. Which might indicate potential data exfiltration

WindowsProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer+1
Florian Roth (Nextron Systems)+1Fri Jul 03windows
Threat Huntmediumtest

Curl.EXE Execution With Custom UserAgent

Detects execution of curl.exe with custom useragent options

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocolsdetection.threat-hunting
François HubautSun Jan 23windows
Threat Huntmediumtest

ClickOnce Deployment Execution - Dfsvc.EXE Child Process

Detects child processes of "dfsvc" which indicates a ClickOnce deployment execution.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Huntmediumtest

Diskshadow Child Process Spawned

Detects any child process spawning from "Diskshadow.exe". This could be due to executing Diskshadow in interpreter mode or script mode and using the "exec" flag to launch other applications.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Harjot SinghFri Sep 15windows
Threat Huntmediumtest

Diskshadow Script Mode Execution

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag. Attackers often abuse "diskshadow" to execute scripts that deleted the shadow copies on the systems. Investigate the content of the scripts and its location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Ivan Dyachkov+1Wed Oct 07windows
Threat Huntlowtest

Potential Proxy Execution Via Explorer.EXE From Shell Process

Detects the creation of a child "explorer.exe" process from a shell like process such as "cmd.exe" or "powershell.exe". Attackers can use "explorer.exe" for evading defense mechanisms by proxying the execution through the latter. While this is often a legitimate action, this rule can be use to hunt for anomalies. Muddy Waters threat actor was seeing using this technique.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Furkan CALISKAN+1Mon Oct 05windows
Threat Huntmediumtest

Potential DLL Sideloading Activity Via ExtExport.EXE

Detects the execution of "Extexport.exe".A utility that is part of the Internet Explorer browser and is used to export and import various settings and data, particularly when switching between Internet Explorer and other web browsers like Firefox. It allows users to transfer bookmarks, browsing history, and other preferences from Internet Explorer to Firefox or vice versa. It can be abused as a tool to side load any DLL. If a folder is provided in the command line it'll load any DLL with one of the following names "mozcrt19.dll", "mozsqlite3.dll", or "sqlite.dll". Arbitrary DLLs can also be loaded if a specific number of flags was provided.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
François Hubaut+1Fri Nov 26windows
Threat Huntmediumtest

Potential Password Reconnaissance Via Findstr.EXE

Detects command line usage of "findstr" to search for the "passwords" keyword in a variety of different languages

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
Josh NickelsThu May 18windows
Threat Huntmediumtest

New Self Extracting Package Created Via IExpress.EXE

Detects the "iexpress.exe" utility creating self-extracting packages. Attackers where seen leveraging "iexpress" to compile packages on the fly via ".sed" files. Investigate the command line options provided to "iexpress" and in case of a ".sed" file, check the contents and legitimacy of it.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Joseliyo SanchezMon Feb 05windows
Threat Huntmediumtest

Microsoft Workflow Compiler Execution

Detects the execution of Microsoft Workflow Compiler, which may permit the execution of arbitrary unsigned code.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1218 · System Binary Proxy Execution+1
Nik Seetharaman+1Wed Jan 16windows
Threat Huntlowtest

CodePage Modification Via MODE.COM

Detects a CodePage modification using the "mode.com" utility. This behavior has been used by threat actors behind Dharma ransomware.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masqueradingdetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)+1Fri Jan 19windows
Threat Huntlowtest

Net.EXE Execution

Detects execution of "Net.EXE".

WindowsProcess Creation
TA0007 · DiscoveryT1007 · System Service DiscoveryT1049 · System Network Connections DiscoveryT1018 · Remote System Discovery+10
Michael Haag+2Wed Jan 16windows
Threat Huntmediumtest

SMB over QUIC Via Net.EXE

Detects the mounting of Windows SMB shares over QUIC, which can be an unexpected event in some enterprise environments.

WindowsProcess Creation
TA0008 · Lateral MovementT1570 · Lateral Tool Transferdetection.threat-hunting
François HubautFri Jul 21windows
Threat Huntmediumtest

Suspicious New Instance Of An Office COM Object

Detects an svchost process spawning an instance of an office application. This happens when the initial word application creates an instance of one of the Office COM objects such as 'Word.Application', 'Excel.Application', etc. This can be used by malicious actors to create malicious Office documents with macros on the fly. (See vba2clr project in the references)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Oct 13windows
Threat Huntlowtest

Unusually Long PowerShell CommandLine

Detects unusually long PowerShell command lines with a length of 1000 characters or more

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
oscd.community+1Tue Oct 06windows
Threat Huntmediumtest

Invocation Of Crypto-Classes From The "Cryptography" PowerShell Namespace

Detects the invocation of PowerShell commands with references to classes from the "System.Security.Cryptography" namespace. The PowerShell namespace "System.Security.Cryptography" provides classes for on-the-fly encryption and decryption. These can be used for example in decrypting malicious payload for defense evasion.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1027.010 · Command Obfuscation+1
Andreas Braathen (mnemonic.io)Fri Dec 01windows
Threat Huntlowtest

Import New Module Via PowerShell CommandLine

Detects usage of the "Import-Module" cmdlet in order to add new Cmdlets to the current PowerShell session

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Threat Huntlowtest

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet

Detects calls to the "New-NetFirewallRule" cmdlet from PowerShell in order to add a new firewall rule with an "Allow" action.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautFri May 03windows
Threat Huntmediumtest

Potentially Suspicious PowerShell Child Processes

Detects potentially suspicious child processes spawned by PowerShell. Use this rule to hunt for potential anomalies initiating from PowerShell scripts and commands.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Florian Roth (Nextron Systems)+1Tue Apr 26windows
Threat Huntmediumtest

Regsvr32.EXE Calling of DllRegisterServer Export Function Implicitly

Detects execution of regsvr32 with the silent flag and no other flags on a DLL located in an uncommon or potentially suspicious location. When Regsvr32 is called in such a way, it implicitly calls the DLL export function 'DllRegisterServer'.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Andreas Braathen (mnemonic.io)+1Tue Oct 17windows
Threat Huntmediumtest

Remote Access Tool - Action1 Arbitrary Code Execution and Remote Sessions

Detects the execution of Action1 in order to execute arbitrary code or establish a remote session. Action1 is a powerful Remote Monitoring and Management tool that enables users to execute commands, scripts, and binaries. Through the web interface of action1, the administrator must create a new policy or an app to establish remote execution and then points that the agent is installed. Hunting Opportunity 1- Weed Out The Noise When threat actors execute a script, a command, or a binary through these new policies and apps, the names of these become visible in the command line during the execution process. Below is an example of the command line that contains the deployment of a binary through a policy with name "test_app_1": ParentCommandLine: "C:\WINDOWS\Action1\action1_agent.exe schedule:Deploy_App__test_app_1_1681327673425 runaction:0" After establishing a baseline, we can split the command to extract the policy name and group all the policy names and inspect the results with a list of frequency occurrences. Hunting Opportunity 2 - Remote Sessions On Out Of Office Hours If you have admins within your environment using remote sessions to administer endpoints, you can create a threat-hunting query and modify the time of the initiated sessions looking for abnormal activity.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002detection.threat-hunting
kostastsaleThu Apr 13windows
Threat Huntmediumtest

Remote Access Tool - Ammy Admin Agent Execution

Detects the execution of the Ammy Admin RMM agent for remote management.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistencedetection.threat-hunting
kostastsaleMon Aug 05windows
Threat Huntmediumtest

Remote Access Tool - Cmd.EXE Execution via AnyViewer

Detects execution of "cmd.exe" via the AnyViewer RMM agent on a remote management sessions.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistencedetection.threat-hunting
kostastsaleSat Aug 03windows
Threat Huntmediumtest

Remote Access Tool - ScreenConnect Remote Command Execution - Hunting

Detects remote binary or command execution via the ScreenConnect Service. Use this rule in order to hunt for potentially anomalous executions originating from ScreenConnect

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Fri Feb 23windows
Threat Huntmediumstable

DLL Call by Ordinal Via Rundll32.EXE

Detects calls of DLLs exports by ordinal numbers via rundll32.dll.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.threat-hunting
Florian Roth (Nextron Systems)Tue Oct 22windows
Threat Huntmediumtest

Rundll32.EXE Calling DllRegisterServer Export Function Explicitly

Detects when the DLL export function 'DllRegisterServer' is called in the commandline by Rundll32 explicitly where the DLL is located in a non-standard path.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Andreas Braathen (mnemonic.io)Tue Oct 17windows
Threat Huntmediumtest

Scheduled Task Creation From Potential Suspicious Parent Location

Detects the execution of "schtasks.exe" from a parent that is located in a potentially suspicious location. Multiple malware strains were seen exhibiting a similar behavior in order to achieve persistence.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+1
Florian Roth (Nextron Systems)Wed Feb 23windows
Threat Huntlowtest

SC.EXE Query Execution

Detects execution of "sc.exe" to query information about registered services on the system

WindowsProcess Creation
TA0007 · DiscoveryT1007 · System Service Discoverydetection.threat-hunting
François HubautMon Dec 06windows
Threat Huntmediumtest

Potential CommandLine Obfuscation Using Unicode Characters

Detects potential CommandLine obfuscation using unicode characters. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Informationdetection.threat-hunting
François Hubaut+1Sat Jan 15windows
Threat Huntmediumtest

Potentially Suspicious Compression Tool Parameters

Detects potentially suspicious command line arguments of common data compression tools

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utilitydetection.threat-hunting
Florian Roth (Nextron Systems)+1Tue Oct 15windows
Threat Huntmediumtest

Elevated System Shell Spawned

Detects when a shell program such as the Windows command prompt or PowerShell is launched with system privileges. Use this rule to hunt for potential suspicious processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter+1
Nasreddine Bencherchali (Nextron Systems)+1Thu Nov 23windows
Threat Huntmediumtest

EventLog Query Requests By Builtin Utilities

Detect attempts to query the contents of the event log using command line utilities. Attackers use this technique in order to look for sensitive information in the logs such as passwords, usernames, IPs, etc.

WindowsProcess Creation
T1552 · Unsecured CredentialsTA0006 · Credential Accessdetection.threat-hunting
Ali Alwashali+1Mon Nov 20windows
Threat Huntlowtest

Potential Suspicious Execution From GUID Like Folder Names

Detects potential suspicious execution of a GUID like folder name located in a suspicious location such as %TEMP% as seen being used in IcedID attacks. Use this rule to hunt for potentially suspicious activity stemming from uncommon folders.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Informationdetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Threat Huntmediumtest

Execution From Webserver Root Folder

Detects a program executing from a web server root folder. Use this rule to hunt for potential interesting activity such as webshell or backdoors

WindowsProcess Creation
TA0003 · PersistenceT1505.003 · Web Shelldetection.threat-hunting
Florian Roth (Nextron Systems)Wed Jan 16windows
Threat Huntmediumtest

Tunneling Tool Execution

Detects the execution of well known tools that can be abused for data exfiltration and tunneling.

WindowsProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1041 · Exfiltration Over C2 ChannelT1572 · Protocol Tunneling+2
Daniil Yugoslavskiy+1Thu Oct 24windows
Threat Huntmediumtest

File or Folder Permissions Modifications

Detects a file or folder's permissions being modified or tampered with.

WindowsProcess Creation
TA0005 · Defense Evasionattack.t1222.001detection.threat-hunting
Jakob Weinzettl+2Wed Oct 23windows
Threat Huntmediumtest

Use Short Name Path in Command Line

Detects the use of short name paths (8.3 format) in command lines, which can be used to obfuscate paths or access restricted locations. Windows creates short 8.3 filenames (like PROGRA~1) for compatibility with MS-DOS-based or 16-bit Windows programs. When investigating, examine: - Commands using short paths to access sensitive directories or files - Web servers on Windows (especially Apache) where short filenames could bypass security controls - Correlation with other suspicious behaviors - baseline of short name usage in your environment and look for deviations

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributesdetection.threat-hunting
François Hubaut+1Sun Aug 07windows
Threat Huntlowexperimental

HTML File Opened From Download Folder

Detects web browser process opening an HTML file from a user's Downloads folder. This behavior is could be associated with phishing attacks where threat actors send HTML attachments to users. When a user opens such an attachment, it can lead to the execution of malicious scripts or the download of malware. During investigation, analyze the HTML file for embedded scripts or links, check for any subsequent downloads or process executions, and investigate the source of the email or message containing the attachment.

WindowsProcess Creation
T1598.002 · Spearphishing AttachmentT1566.001 · Spearphishing AttachmentTA0001 · Initial AccessTA0043 · Reconnaissance+1
Joseph KamauFri Dec 05windows
Threat Huntlowexperimental

Potential Executable Run Itself As Sacrificial Process

Detects when an executable launches an identical instance of itself, a behavior often used to create a suspended “sacrificial” process for code injection or evasion. Investigate for indicators such as the process being started in suspended mode, rapid parent termination, memory manipulation (e.g., WriteProcessMemory, CreateRemoteThread), or unsigned binaries. Review command-line arguments, process ancestry, and network activity to confirm if this is legitimate behavior or process injection activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
François HubautFri Oct 17windows
Threat Huntmediumtest

Manual Execution of Script Inside of a Compressed File

This is a threat-hunting query to collect information related to the interactive execution of a script from inside a compressed file (zip/rar). Windows will automatically run the script using scripting interpreters such as wscript and cscript binaries. From the query below, the child process is the script interpreter that will execute the script. The script extension is also a set of standard extensions that Windows OS recognizes. Selections 1-3 contain three different execution scenarios. 1. Compressed file opened using 7zip. 2. Compressed file opened using WinRar. 3. Compressed file opened using native windows File Explorer capabilities. When the malicious script is double-clicked, it will be extracted to the respected directories as signified by the CommandLine on each of the three Selections. It will then be executed using the relevant script interpreter."

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.threat-hunting
kostastsaleWed Feb 15windows
Threat Huntlowtest

Process Terminated Via Taskkill

Detects execution of "taskkill.exe" in order to stop a service or a process. Look for suspicious parents executing this command in order to hunt for potential malicious activity. Attackers might leverage this in order to conduct data destruction or data encrypted for impact on the data stores of services like Exchange and SQL Server.

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stopdetection.threat-hunting
François Hubaut+2Sun Dec 26windows
Threat Huntinformationaltest

Suspicious Tasklist Discovery Command

Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discoverydetection.threat-hunting
François HubautSat Dec 11windows
Threat Huntlowexperimental

Process Execution From WebDAV Share

Detects execution of processes with image paths starting with WebDAV shares (\\), which might indicate malicious file execution from remote web shares. Execution of processes from WebDAV shares can be a sign of lateral movement or exploitation attempts, especially if the process is not a known legitimate application. Exploitation Attempt of vulnerabilities like CVE-2025-33053 also involves executing processes from WebDAV paths.

WindowsProcess Creation
TA0002 · ExecutionTA0011 · Command and ControlTA0008 · Lateral MovementT1105 · Ingress Tool Transfer+1
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 13windows