Rule Library

Sigma Rules

11 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Nslookup PowerShell Download Cradle

Detects a powershell download cradle using nslookup. This cradle uses nslookup to extract payloads from DNS records.

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShell
Sai Prashanth Pulisetti+1Sat Dec 10windows
Detectionhighstable

Delete Volume Shadow Copies Via WMI With PowerShell

Shadow Copies deletion using operating systems utilities via PowerShell

WindowsPowerShell Classic
TA0040 · ImpactT1490 · Inhibit System Recovery
François HubautThu Jun 03windows
Detectionmediumtest

PowerShell Downgrade Attack - PowerShell

Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0

WindowsPowerShell Classic
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Mar 22windows
Detectionhightest

PowerShell Called from an Executable Version Mismatch

Detects PowerShell called from an executable by the version mismatch method

WindowsPowerShell Classic
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionmediumtest

Netcat The Powershell Version

Adversaries may use a non-application layer protocol for communication between host and C2 server or among infected hosts within a network

WindowsPowerShell Classic
TA0011 · Command and ControlT1095 · Non-Application Layer Protocol
François HubautWed Jul 21windows
Detectionlowtest

Remote PowerShell Session (PS Classic)

Detects remote PowerShell sessions

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShellTA0008 · Lateral MovementT1021.006 · Windows Remote Management
Roberto Rodriguez (Cyb3rWard0g)Sat Aug 10windows
Detectionlowtest

Renamed Powershell Under Powershell Channel

Detects a renamed Powershell execution, which is a common technique used to circumvent security controls and bypass detection logic that's dependent on process names and process paths.

WindowsPowerShell Classic
TA0002 · ExecutionTA0005 · Defense EvasionT1059.001 · PowerShellT1036.003 · Rename System Utilities
Harish Segar+1Mon Jun 29windows
Detectionmediumtest

Suspicious PowerShell Download

Detects suspicious PowerShell download command

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 05windows
Detectionlowtest

Use Get-NetTCPConnection

Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.

WindowsPowerShell Classic
TA0007 · DiscoveryT1049 · System Network Connections Discovery
François HubautFri Dec 10windows
Threat Huntmediumtest

Uncommon PowerShell Hosts

Detects alternate PowerShell hosts potentially bypassing detections looking for powershell.exe

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sun Aug 11windows
Threat Huntlowtest

bXOR Operator Usage In PowerShell Command Line - PowerShell Classic

Detects powershell execution with that make use of to the bxor (Bitwise XOR). Attackers might use as an alternative obfuscation method to Base64 encoded commands. Investigate the CommandLine and process tree to determine if the activity is malicious.

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Teymur Kheirkhabarov+1Mon Jun 29windows