Rule Library

Sigma Rules

178 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Unsigned AppX Installation Attempt Using Add-AppxPackage - PsScript

Detects usage of the "Add-AppxPackage" or it's alias "Add-AppPackage" to install unsigned AppX packages

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Jan 31windows
Detectionmediumtest

Execute Invoke-command on Remote Host

Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.

WindowsPowerShell Script
TA0008 · Lateral MovementT1021.006 · Windows Remote Management
François HubautFri Jan 07windows
Detectionhightest

Powershell DNSExfiltration

DNSExfiltrator allows for transferring (exfiltrate) a file over a DNS request covert channel

WindowsPowerShell Script
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
François HubautFri Jan 07windows
Detectionhightest

Invoke-Obfuscation CLIP+ Launcher - PowerShell

Detects Obfuscated use of Clip.exe to execute PowerShell

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Tue Oct 13windows
Detectionhightest

Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell

Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Daniel Bohannon ( / )+1Fri Nov 08windows
Detectionhightest

Invoke-Obfuscation STDIN+ Launcher - Powershell

Detects Obfuscated use of stdin to execute PowerShell

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionhightest

Invoke-Obfuscation VAR+ Launcher - PowerShell

Detects Obfuscated use of Environment Variables to execute PowerShell

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionmediumtest

Invoke-Obfuscation COMPRESS OBFUSCATION - PowerShell

Detects Obfuscated Powershell via COMPRESS OBFUSCATION

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionmediumtest

Invoke-Obfuscation RUNDLL LAUNCHER - PowerShell

Detects Obfuscated Powershell via RUNDLL LAUNCHER

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionhightest

Invoke-Obfuscation Via Stdin - Powershell

Detects Obfuscated Powershell via Stdin in Scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Mon Oct 12windows
Detectionhightest

Invoke-Obfuscation Via Use Clip - Powershell

Detects Obfuscated Powershell via use Clip.exe in Scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Fri Oct 09windows
Detectionhightest

Invoke-Obfuscation Via Use MSHTA - PowerShell

Detects Obfuscated Powershell via use MSHTA in Scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Thu Oct 08windows
Detectionhightest

Invoke-Obfuscation Via Use Rundll32 - PowerShell

Detects Obfuscated Powershell via use Rundll32 in Scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Tue Oct 08windows
Detectionhightest

Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell

Detects Obfuscated Powershell via VAR++ LAUNCHER

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Tue Oct 13windows
Detectionmediumtest

Powershell Keylogging

Adversaries may log user keystrokes to intercept credentials as the user types them.

WindowsPowerShell Script
TA0006 · Credential AccessTA0009 · CollectionT1056.001 · Keylogging
François HubautFri Jul 30windows
Detectionmediumtest

Powershell LocalAccount Manipulation

Adversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
François HubautTue Dec 28windows
Detectioncriticaltest

Suspicious PowerShell Mailbox Export to Share - PS

Detects usage of the powerShell New-MailboxExportRequest Cmdlet to exports a mailbox to a remote or local share, as used in ProxyShell exploitations

WindowsPowerShell Script
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)Wed Oct 26windows
Detectionhightest

Malicious PowerShell Commandlets - ScriptBlock

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Sean Metcalf+10Sun Mar 05windows
Detectionmediumtest

Malicious PowerShell Keywords

Detects keywords from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionhightest

Live Memory Dump Using Powershell

Detects usage of a PowerShell command to dump the live memory of a Windows machine

WindowsPowerShell Script
TA0006 · Credential AccessT1003 · OS Credential Dumping
Max Altgelt (Nextron Systems)Tue Sep 21windows
Detectionlowexperimental

DMSA Link Attributes Modified

Detects modification of dMSA link attributes (msDS-ManagedAccountPrecededByLink) via PowerShell scripts. This command line pattern could be an indicator an attempt to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0001 · Initial Access+2
Swachchhanda Shrawan Poudel (Nextron Systems)Sat May 24windows
Detectionmediumtest

Modify Group Policy Settings - ScriptBlockLogging

Detect malicious GPO modifications can be used to implement many other malicious behaviors.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
François HubautFri Aug 19windows
Detectionmediumtest

Powershell MsXml COM Object

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François Hubaut+1Wed Jan 19windows
Detectionhightest

Malicious Nishang PowerShell Commandlets

Detects Commandlet names and arguments from the Nishang exploitation framework

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Alec CostelloThu May 16windows
Detectionhightest

NTFS Alternate Data Stream

Detects writing data into NTFS alternate data streams from powershell. Needs Script Block Logging.

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.004 · NTFS File AttributesTA0002 · ExecutionT1059.001 · PowerShell
Sami RuohonenTue Jul 24windows
Detectionhightest

Code Executed Via Office Add-in XLL File

Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used to add functionality to Office programs

WindowsPowerShell Script
TA0003 · PersistenceT1137.006 · Add-ins
François HubautTue Dec 28windows
Detectionmediumtest

Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock

Detects the execution of powershell scripts with calls to the "Start-NetEventSession" cmdlet. Which allows an attacker to start event and packet capture for a network event session. Adversaries may attempt to capture network to gather information over the course of an operation. Data captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol.

WindowsPowerShell Script
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
François HubautSun May 12windows
Detectionhightest

Potential Invoke-Mimikatz PowerShell Script

Detects Invoke-Mimikatz PowerShell script and alike. Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords.

WindowsPowerShell Script
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+1Wed Sep 28windows
Detectionmediumexperimental

Potential Unconstrained Delegation Discovery Via Get-ADComputer - ScriptBlock

Detects the use of the "Get-ADComputer" cmdlet in order to identify systems which are configured for unconstrained delegation.

WindowsPowerShell Script
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential AccessT1018 · Remote System Discovery+2
François HubautWed Mar 05windows
Detectionhightest

PowerShell Web Access Installation - PsScript

Detects the installation and configuration of PowerShell Web Access, which could be used for remote access and potential abuse

WindowsPowerShell Script
TA0003 · PersistenceTA0002 · ExecutionT1059.001 · PowerShell
Michael HaagTue Sep 03windows
Detectionhightest

PowerView PowerShell Cmdlets - ScriptBlock

Detects Cmdlet names from PowerView of the PowerSploit exploitation framework.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Bhabesh RajTue May 18windows
Detectionhightest

PowerShell Credential Prompt

Detects PowerShell calling a credential prompt

WindowsPowerShell Script
TA0006 · Credential AccessTA0002 · ExecutionT1059.001 · PowerShell
John Lambert+1Sun Apr 09windows
Detectionhightest

PSAsyncShell - Asynchronous TCP Reverse Shell

Detects the use of PSAsyncShell an Asynchronous TCP Reverse Shell written in powershell

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Oct 04windows
Detectionhightest

PowerShell PSAttack

Detects the use of PSAttack PowerShell hack tool

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell ScriptBlock

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

PowerShell Remote Session Creation

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautThu Jan 06windows
Detectionhightest

Suspicious Kerberos Ticket Request via PowerShell Script - ScriptBlock

Detects PowerShell scripts that utilize native PowerShell Identity modules to request Kerberos tickets. This behavior is typically seen during a Kerberos or silver ticket attack. A successful execution will output the SPNs for the endpoint in question.

WindowsPowerShell Script
TA0006 · Credential AccessT1558.003 · Kerberoasting
François HubautTue Dec 28windows
Detectionmediumtest

PowerShell Script With File Hostname Resolving Capabilities

Detects PowerShell scripts that have capabilities to read files, loop through them and resolve DNS host entries.

WindowsPowerShell Script
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionmediumtest

Root Certificate Installed - PowerShell

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sat Oct 10windows
Detectionmediumtest

Suspicious Invoke-Item From Mount-DiskImage

Adversaries may abuse container files such as disk image (.iso, .vhd) file formats to deliver malicious payloads that may not be tagged with MOTW.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.005 · Mark-of-the-Web Bypass
François HubautTue Feb 01windows
Detectionlowtest

PowerShell Script With File Upload Capabilities

Detects PowerShell scripts leveraging the "Invoke-WebRequest" cmdlet to send data via either "PUT" or "POST" method.

WindowsPowerShell Script
TA0010 · ExfiltrationT1020 · Automated Exfiltration
François HubautFri Jan 07windows
Detectionmediumtest

Powershell Sensitive File Discovery

Detect adversaries enumerate sensitive files

WindowsPowerShell Script
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautFri Sep 16windows
Detectionlowtest

PowerShell Script Change Permission Via Set-Acl - PsScript

Detects PowerShell scripts set ACL to of a file or a folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionhightest

PowerShell Set-Acl On Windows Folder - PsScript

Detects PowerShell scripts to set the ACL to a file in the Windows folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionmediumtest

Change PowerShell Policies to an Insecure Level - PowerShell

Detects changing the PowerShell script execution policy to a potentially insecure level using the "Set-ExecutionPolicy" cmdlet.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautWed Oct 20windows
Detectionhightest

PowerShell ShellCode

Detects Base64 encoded Shellcode

WindowsPowerShell Script
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process InjectionTA0002 · Execution+1
David Ledbetter (shellcode)+1Sat Nov 17windows
Detectionhightest

Malicious ShellIntel PowerShell Commandlets

Detects Commandlet names from ShellIntel exploitation scripts.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Max Altgelt (Nextron Systems)+1Mon Aug 09windows
Detectionmediumtest

Detected Windows Software Discovery - PowerShell

Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable.

WindowsPowerShell Script
TA0007 · DiscoveryT1518 · Software Discovery
Nikita Nazarov+1Fri Oct 16windows