Rule Library

Sigma Rules

1,607 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathighexperimental

Shai-Hulud Malicious Bun Execution - Linux

Detects the execution of `bun_environment.js` via the Bun runtime, a behavior associated with the Shai-Hulud "Second Coming" NPM supply chain attack. The malware uses a `setup_bun.js` script to install the Bun runtime if not present, and then executes the malicious `bun_environment.js` payload.

LinuxProcess Creation
T1195.002 · Compromise Software Supply ChainT1203 · Exploitation for Client ExecutionTA0002 · ExecutionTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud 2.0 Malicious NPM Package Installation - Linux

Detects the command-line installation of specific malicious npm packages and versions associated with the Shai-Hulud 2.0 supply chain attack.

LinuxProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Nov 282025
Emerging Threathighexperimental

Shai-Hulud NPM Package Malicious Exfiltration via Curl

Detects potential Shai Hulud NPM package attack attempting to exfiltrate data via curl to external webhook sites.

LinuxProcess Creation
TA0010 · ExfiltrationT1041 · Exfiltration Over C2 ChannelTA0009 · CollectionT1005 · Data from Local System+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 242025
Emerging Threathighexperimental

Shai-Hulud Malware Indicators - Windows

Detects potential Shai-Hulud malware indicators based on specific command line arguments associated with its execution.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud Malicious Bun Execution

Detects the execution of `bun_environment.js` via the Bun runtime, a behavior associated with the Shai-Hulud "Second Coming" NPM supply chain attack. The malware uses a `setup_bun.js` script to install the Bun runtime if not present, and then executes the malicious `bun_environment.js` payload.

WindowsProcess Creation
T1195.002 · Compromise Software Supply ChainT1203 · Exploitation for Client ExecutionTA0002 · ExecutionTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud 2.0 Malicious NPM Package Installation

Detects the command-line installation of specific malicious npm packages and versions associated with the Shai-Hulud 2.0 supply chain attack.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Nov 282025
Emerging Threathighexperimental

Axios NPM Compromise Indicators - Linux

Detects the Linux-specific execution chain of the plain-crypto-js malicious npm dependency by Axios NPM package, including payload download via curl and detached execution using nohup and python3. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection.

LinuxProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise Indicators - macOS

Detects the macOS-specific execution chain of the plain-crypto-js malicious npm dependency in Axios NPM Package, including AppleScript execution via osascript, payload download, permission modification, execution, and cleanup.

macOSProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise Indicators - Windows

Detects the specific Windows execution chain and process tree associated with the Axios NPM supply chain compromise. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.

WindowsProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

LiteLLM / TeamPCP Supply Chain Attack Indicators

Detects process executions related to the backdoored versions of LiteLLM (v1.82.7 or v1.82.8). In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP. The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.

LinuxProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0009 · CollectionT1560.001 · Archive via Utility+4
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Mar 302026
Threat Huntmediumtest

Terminate Linux Process Via Kill

Detects usage of command line tools such as "kill", "pkill" or "killall" to terminate or signal a running process.

LinuxProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defensesdetection.threat-hunting
Tuan Le (NCSGroup)Thu Mar 16linux
Threat Huntlowstable

Process Discovery

Detects process discovery commands. Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network

LinuxProcess Creation
TA0007 · DiscoveryT1057 · Process Discoverydetection.threat-hunting
Ömer Günal+2Tue Oct 06linux
Threat Huntmediumtest

Clipboard Data Collection Via Pbpaste

Detects execution of the "pbpaste" utility, which retrieves the contents of the clipboard (a.k.a. pasteboard) and writes them to the standard output (stdout). The utility is often used for creating new files with the clipboard content or for piping clipboard contents to other commands. It can also be used in shell scripts that may require clipboard content as input. Attackers can abuse this utility in order to collect data from the user clipboard, which may contain passwords or sensitive information. Use this rule to hunt for potential abuse of the utility by looking at the parent process and any potentially suspicious command line content.

macOSProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1115 · Clipboard Datadetection.threat-hunting
Daniel CortezTue Jul 30macos
Threat Huntlowtest

Password Protected Compressed File Extraction Via 7Zip

Detects usage of 7zip utilities (7z.exe, 7za.exe and 7zr.exe) to extract password protected zip files.

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utilitydetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Fri Mar 10windows
Threat Huntlowtest

Set Files as System Files Using Attrib.EXE

Detects the execution of "attrib" with the "+s" flag to mark files as system files

WindowsProcess Creation
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directoriesdetection.threat-hunting
François HubautFri Feb 04windows
Threat Huntinformationaltest

Potential BOINC Software Execution (UC-Berkeley Signature)

Detects the use of software that is related to the University of California, Berkeley via metadata information. This indicates it may be related to BOINC software and can be used maliciously if unauthorized.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1553 · Subvert Trust Controlsdetection.threat-hunting
Matt Anderson (Huntress)Tue Jul 23windows
Threat Huntlowtest

CMD Shell Output Redirect

Detects the use of the redirection character ">" to redirect information on the command line. This technique is sometimes used by malicious actors in order to redirect the output of reconnaissance commands such as "hostname" and "dir" to files for future exfiltration.

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discoverydetection.threat-hunting
François HubautSat Jan 22windows
Threat Huntlowtest

Potential File Override/Append Via SET Command

Detects the use of the "SET" internal command of Cmd.EXE with the /p flag followed directly by an "=" sign. Attackers used this technique along with an append redirection operator ">>" in order to update the content of a file indirectly. Ex: cmd /c >> example.txt set /p="test data". This will append "test data" to contents of "example.txt". The typical use case of the "set /p=" command is to prompt the user for input.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)+1Thu Aug 22windows
Threat Huntmediumtest

Headless Process Launched Via Conhost.EXE

Detects the launch of a child process via "conhost.exe" with the "--headless" flag. The "--headless" flag hides the windows from the user upon execution.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shell+1
Nasreddine Bencherchali (Nextron Systems)Tue Jul 23windows
Threat Huntmediumtest

Dynamic .NET Compilation Via Csc.EXE - Hunting

Detects execution of "csc.exe" to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Deliverydetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Aug 02windows
Threat Huntmediumtest

File Download Via Curl.EXE

Detects file download using curl.exe

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Tue Jul 05windows
Threat Huntlowtest

Curl.EXE Execution

Detects a curl process start on Windows, which could indicates a file download from a remote location or a simple web request to a remote server

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Tue Jul 05windows
Threat Huntmediumtest

Potential Data Exfiltration Via Curl.EXE

Detects the execution of the "curl" process with "upload" flags. Which might indicate potential data exfiltration

WindowsProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer+1
Florian Roth (Nextron Systems)+1Fri Jul 03windows
Threat Huntmediumtest

Curl.EXE Execution With Custom UserAgent

Detects execution of curl.exe with custom useragent options

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocolsdetection.threat-hunting
François HubautSun Jan 23windows
Threat Huntmediumtest

ClickOnce Deployment Execution - Dfsvc.EXE Child Process

Detects child processes of "dfsvc" which indicates a ClickOnce deployment execution.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Huntmediumtest

Diskshadow Child Process Spawned

Detects any child process spawning from "Diskshadow.exe". This could be due to executing Diskshadow in interpreter mode or script mode and using the "exec" flag to launch other applications.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Harjot SinghFri Sep 15windows
Threat Huntmediumtest

Diskshadow Script Mode Execution

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag. Attackers often abuse "diskshadow" to execute scripts that deleted the shadow copies on the systems. Investigate the content of the scripts and its location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Ivan Dyachkov+1Wed Oct 07windows
Threat Huntlowtest

Potential Proxy Execution Via Explorer.EXE From Shell Process

Detects the creation of a child "explorer.exe" process from a shell like process such as "cmd.exe" or "powershell.exe". Attackers can use "explorer.exe" for evading defense mechanisms by proxying the execution through the latter. While this is often a legitimate action, this rule can be use to hunt for anomalies. Muddy Waters threat actor was seeing using this technique.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Furkan CALISKAN+1Mon Oct 05windows
Threat Huntmediumtest

Potential DLL Sideloading Activity Via ExtExport.EXE

Detects the execution of "Extexport.exe".A utility that is part of the Internet Explorer browser and is used to export and import various settings and data, particularly when switching between Internet Explorer and other web browsers like Firefox. It allows users to transfer bookmarks, browsing history, and other preferences from Internet Explorer to Firefox or vice versa. It can be abused as a tool to side load any DLL. If a folder is provided in the command line it'll load any DLL with one of the following names "mozcrt19.dll", "mozsqlite3.dll", or "sqlite.dll". Arbitrary DLLs can also be loaded if a specific number of flags was provided.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
François Hubaut+1Fri Nov 26windows
Threat Huntmediumtest

Potential Password Reconnaissance Via Findstr.EXE

Detects command line usage of "findstr" to search for the "passwords" keyword in a variety of different languages

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
Josh NickelsThu May 18windows
Threat Huntmediumtest

New Self Extracting Package Created Via IExpress.EXE

Detects the "iexpress.exe" utility creating self-extracting packages. Attackers where seen leveraging "iexpress" to compile packages on the fly via ".sed" files. Investigate the command line options provided to "iexpress" and in case of a ".sed" file, check the contents and legitimacy of it.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Joseliyo SanchezMon Feb 05windows
Threat Huntmediumtest

Microsoft Workflow Compiler Execution

Detects the execution of Microsoft Workflow Compiler, which may permit the execution of arbitrary unsigned code.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1218 · System Binary Proxy Execution+1
Nik Seetharaman+1Wed Jan 16windows
Threat Huntlowtest

CodePage Modification Via MODE.COM

Detects a CodePage modification using the "mode.com" utility. This behavior has been used by threat actors behind Dharma ransomware.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masqueradingdetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)+1Fri Jan 19windows
Threat Huntlowtest

Net.EXE Execution

Detects execution of "Net.EXE".

WindowsProcess Creation
TA0007 · DiscoveryT1007 · System Service DiscoveryT1049 · System Network Connections DiscoveryT1018 · Remote System Discovery+10
Michael Haag+2Wed Jan 16windows
Threat Huntmediumtest

SMB over QUIC Via Net.EXE

Detects the mounting of Windows SMB shares over QUIC, which can be an unexpected event in some enterprise environments.

WindowsProcess Creation
TA0008 · Lateral MovementT1570 · Lateral Tool Transferdetection.threat-hunting
François HubautFri Jul 21windows
Threat Huntmediumtest

Suspicious New Instance Of An Office COM Object

Detects an svchost process spawning an instance of an office application. This happens when the initial word application creates an instance of one of the Office COM objects such as 'Word.Application', 'Excel.Application', etc. This can be used by malicious actors to create malicious Office documents with macros on the fly. (See vba2clr project in the references)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Oct 13windows
Threat Huntlowtest

Unusually Long PowerShell CommandLine

Detects unusually long PowerShell command lines with a length of 1000 characters or more

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
oscd.community+1Tue Oct 06windows
Threat Huntmediumtest

Invocation Of Crypto-Classes From The "Cryptography" PowerShell Namespace

Detects the invocation of PowerShell commands with references to classes from the "System.Security.Cryptography" namespace. The PowerShell namespace "System.Security.Cryptography" provides classes for on-the-fly encryption and decryption. These can be used for example in decrypting malicious payload for defense evasion.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1027.010 · Command Obfuscation+1
Andreas Braathen (mnemonic.io)Fri Dec 01windows
Threat Huntlowtest

Import New Module Via PowerShell CommandLine

Detects usage of the "Import-Module" cmdlet in order to add new Cmdlets to the current PowerShell session

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Threat Huntlowtest

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet

Detects calls to the "New-NetFirewallRule" cmdlet from PowerShell in order to add a new firewall rule with an "Allow" action.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautFri May 03windows
Threat Huntmediumtest

Potentially Suspicious PowerShell Child Processes

Detects potentially suspicious child processes spawned by PowerShell. Use this rule to hunt for potential anomalies initiating from PowerShell scripts and commands.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Florian Roth (Nextron Systems)+1Tue Apr 26windows
Threat Huntmediumtest

Regsvr32.EXE Calling of DllRegisterServer Export Function Implicitly

Detects execution of regsvr32 with the silent flag and no other flags on a DLL located in an uncommon or potentially suspicious location. When Regsvr32 is called in such a way, it implicitly calls the DLL export function 'DllRegisterServer'.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Andreas Braathen (mnemonic.io)+1Tue Oct 17windows
Threat Huntmediumtest

Remote Access Tool - Action1 Arbitrary Code Execution and Remote Sessions

Detects the execution of Action1 in order to execute arbitrary code or establish a remote session. Action1 is a powerful Remote Monitoring and Management tool that enables users to execute commands, scripts, and binaries. Through the web interface of action1, the administrator must create a new policy or an app to establish remote execution and then points that the agent is installed. Hunting Opportunity 1- Weed Out The Noise When threat actors execute a script, a command, or a binary through these new policies and apps, the names of these become visible in the command line during the execution process. Below is an example of the command line that contains the deployment of a binary through a policy with name "test_app_1": ParentCommandLine: "C:\WINDOWS\Action1\action1_agent.exe schedule:Deploy_App__test_app_1_1681327673425 runaction:0" After establishing a baseline, we can split the command to extract the policy name and group all the policy names and inspect the results with a list of frequency occurrences. Hunting Opportunity 2 - Remote Sessions On Out Of Office Hours If you have admins within your environment using remote sessions to administer endpoints, you can create a threat-hunting query and modify the time of the initiated sessions looking for abnormal activity.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002detection.threat-hunting
kostastsaleThu Apr 13windows
Threat Huntmediumtest

Remote Access Tool - Ammy Admin Agent Execution

Detects the execution of the Ammy Admin RMM agent for remote management.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistencedetection.threat-hunting
kostastsaleMon Aug 05windows
Threat Huntmediumtest

Remote Access Tool - Cmd.EXE Execution via AnyViewer

Detects execution of "cmd.exe" via the AnyViewer RMM agent on a remote management sessions.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistencedetection.threat-hunting
kostastsaleSat Aug 03windows
Threat Huntmediumtest

Remote Access Tool - ScreenConnect Remote Command Execution - Hunting

Detects remote binary or command execution via the ScreenConnect Service. Use this rule in order to hunt for potentially anomalous executions originating from ScreenConnect

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Fri Feb 23windows
Threat Huntmediumstable

DLL Call by Ordinal Via Rundll32.EXE

Detects calls of DLLs exports by ordinal numbers via rundll32.dll.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.threat-hunting
Florian Roth (Nextron Systems)Tue Oct 22windows
Threat Huntmediumtest

Rundll32.EXE Calling DllRegisterServer Export Function Explicitly

Detects when the DLL export function 'DllRegisterServer' is called in the commandline by Rundll32 explicitly where the DLL is located in a non-standard path.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Andreas Braathen (mnemonic.io)Tue Oct 17windows