Rule Library

Sigma Rules

224 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

NET NGenAssemblyUsageLog Registry Key Tamper

Detects changes to the NGenAssemblyUsageLog registry key. .NET Usage Log output location can be controlled by setting the NGenAssemblyUsageLog CLR configuration knob in the Registry or by configuring an environment variable (as described in the next section). By simplify specifying an arbitrary value (e.g. fake output location or junk data) for the expected value, a Usage Log file for the .NET execution context will not be created.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Nov 18windows
Detectioninformationaltest

New Application in AppCompat

A General detection for a new application in AppCompat. This indicates an application executing for the first time on an endpoint.

WindowsRegistry Set
TA0002 · ExecutionT1204.002 · Malicious File
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionmediumtest

Potential Credential Dumping Attempt Using New NetworkProvider - REG

Detects when an attacker tries to add a new network provider in order to dump clear text credentials, similar to how the NPPSpy tool does it

WindowsRegistry Set
TA0006 · Credential AccessT1003 · OS Credential Dumping
Nasreddine Bencherchali (Nextron Systems)Tue Aug 23windows
Detectionlowtest

New ODBC Driver Registered

Detects the registration of a new ODBC driver.

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 23windows
Detectionhightest

Potentially Suspicious ODBC Driver Registered

Detects the registration of a new ODBC driver where the driver is located in a potentially suspicious location

WindowsRegistry Set
TA0006 · Credential AccessTA0003 · PersistenceT1003 · OS Credential Dumping
Nasreddine Bencherchali (Nextron Systems)Tue May 23windows
Detectionhightest

Trust Access Disable For VBApplications

Detects registry changes to Microsoft Office "AccessVBOM" to a value of "1" which disables trust access for VBA on the victim machine and lets attackers execute malicious macros without any Microsoft Office warnings.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Trent Liffick+1Fri May 22windows
Detectionhightest

Microsoft Office Protected View Disabled

Detects changes to Microsoft Office protected view registry keys with which the attacker disables this feature.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+1Tue Jun 08windows
Detectionhightest

Python Function Execution Security Warning Disabled In Excel - Registry

Detects changes to the registry value "PythonFunctionWarnings" that would prevent any warnings or alerts from showing when Python functions are about to be executed. Threat actors could run malicious code through the new Microsoft Excel feature that allows Python to run within the spreadsheet.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 23windows
Detectionmediumtest

Enable Microsoft Dynamic Data Exchange

Enable Dynamic Data Exchange protocol (DDE) in all supported editions of Microsoft Word or Excel.

WindowsRegistry Set
TA0002 · ExecutionT1559.002 · Dynamic Data Exchange
François HubautSat Feb 26windows
Detectionhightest

Potential Persistence Via Outlook LoadMacroProviderOnBoot Setting

Detects the modification of Outlook setting "LoadMacroProviderOnBoot" which if enabled allows the automatic loading of any configured VBA project/module

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
Nasreddine Bencherchali (Nextron Systems)Mon Apr 05windows
Detectionhightest

Outlook Macro Execution Without Warning Setting Enabled

Detects the modification of Outlook security setting to allow unprompted execution of macros.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
@scoubimtlMon Apr 05windows
Detectionhightest

Outlook EnableUnsafeClientMailRules Setting Enabled - Registry

Detects an attacker trying to enable the outlook security setting "EnableUnsafeClientMailRules" which allows outlook to run applications or execute macros

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

Outlook Security Settings Updated - Registry

Detects changes to the registry values related to outlook security settings

WindowsRegistry Set
TA0003 · PersistenceT1137 · Office Application Startup
François HubautTue Dec 28windows
Detectionhightest

Uncommon Microsoft Office Trusted Location Added

Detects changes to registry keys related to "Trusted Location" of Microsoft Office where the path is set to something uncommon. Attackers might add additional trusted locations to avoid macro security restrictions.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Jun 21windows
Detectionhightest

Macro Enabled In A Potentially Suspicious Document

Detects registry changes to Office trust records where the path is located in a potentially suspicious location

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Jun 21windows
Detectionhightest

Office Macros Warning Disabled

Detects registry changes to Microsoft Office "VBAWarning" to a value of "1" which enables the execution of all macros, whether signed or unsigned.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Trent Liffick+1Fri May 22windows
Detectionlowtest

MaxMpxCt Registry Value Changed

Detects changes to the "MaxMpxCt" registry value. MaxMpxCt specifies the maximum outstanding network requests for the server per client, which is used when negotiating a Server Message Block (SMB) connection with a client. Note if the value is set beyond 125 older Windows 9x clients will fail to negotiate. Ransomware threat actors and operators (specifically BlackCat) were seen increasing this value in order to handle a higher volume of traffic.

WindowsRegistry Set
TA0005 · Defense EvasionT1070.005 · Network Share Connection Removal
Nasreddine Bencherchali (Nextron Systems)Tue Mar 19windows
Detectionmediumtest

Potential Persistence Via New AMSI Providers - Registry

Detects when an attacker adds a new AMSI provider via the Windows Registry to bypass AMSI (Antimalware Scan Interface) protections. Attackers may add custom AMSI providers to persist on the system and evade detection by security software that relies on AMSI for scanning scripts and other content. This technique is often used in conjunction with fileless malware and script-based attacks to maintain persistence while avoiding detection.

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionmediumtest

Potential Persistence Using DebugPath

Detects potential persistence using Appx DebugPath

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
François HubautWed Jul 27windows
Detectionmediumtest

Potential Persistence Via AppCompat RegisterAppRestart Layer

Detects the setting of the REGISTERAPPRESTART compatibility layer on an application. This compatibility layer allows an application to register for restart using the "RegisterApplicationRestart" API. This can be potentially abused as a persistence mechanism.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.011 · Application Shimming
Nasreddine Bencherchali (Nextron Systems)Mon Jan 01windows
Detectionhightest

Potential Persistence Via App Paths Default Property

Detects changes to the "Default" property for keys located in the \Software\Microsoft\Windows\CurrentVersion\App Paths\ registry. Which might be used as a method of persistence The entries found under App Paths are used primarily for the following purposes. First, to map an application's executable file name to that file's fully qualified path. Second, to prepend information to the PATH environment variable on a per-application, per-process basis.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.012 · Image File Execution Options Injection
Nasreddine Bencherchali (Nextron Systems)Wed Aug 10windows
Detectionhightest

Potential Persistence Via AutodialDLL

Detects change the the "AutodialDLL" key which could be used as a persistence method to load custom DLL via the "ws2_32" library

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Wed Aug 10windows
Detectionhightest

Potential Persistence Via CHM Helper DLL

Detects when an attacker modifies the registry key "HtmlHelp Author" to achieve persistence

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionhightest

Potential PSFactoryBuffer COM Hijacking

Detects changes to the PSFactory COM InProcServer32 registry. This technique was used by RomCom to create persistence storing a malicious DLL.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
BlackBerry Threat Research and Intelligence TeamWed Jun 07windows
Detectionhighexperimental

COM Object Hijacking Via Modification Of Default System CLSID Default Value

Detects potential COM object hijacking via modification of default system CLSID.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
Nasreddine Bencherchali (Nextron Systems)Tue Jul 16windows
Detectionmediumtest

Potential COM Object Hijacking Via TreatAs Subkey - Registry

Detects COM object hijacking via TreatAs subkey

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
Kutepov Anton+1Wed Oct 23windows
Detectionmediumtest

Potential Persistence Via Custom Protocol Handler

Detects potential persistence activity via the registering of a new custom protocole handlers. While legitimate applications register protocole handlers often times during installation. And attacker can abuse this by setting a custom handler to be used as a persistence mechanism.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Mon May 30windows
Detectionmediumtest

Potential Persistence Via Event Viewer Events.asp

Detects potential registry persistence technique using the Event Viewer "Events.asp" technique

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Fri Feb 17windows
Detectionhightest

Potential Persistence Via GlobalFlags

Detects registry persistence technique using the GlobalFlags and SilentProcessExit keys

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1546.012 · Image File Execution Options Injection+1
Karneades+2Wed Apr 11windows
Detectionlowtest

Modification of IE Registry Settings

Detects modification of the registry settings used for Internet Explorer and other Windows components that use these settings. An attacker can abuse this registry key to add a domain to the trusted sites Zone or insert JavaScript for persistence

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautSat Jan 22windows
Detectionmediumtest

Register New IFiltre For Persistence

Detects when an attacker registers a new IFilter for an extension. Microsoft Windows Search uses filters to extract the content of items for inclusion in a full-text index. You can extend Windows Search to index new or proprietary file types by writing filters to extract the content, and property handlers to extract the properties of files.

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionmediumtest

Potential Persistence Via Logon Scripts - Registry

Detects creation of "UserInitMprLogonScript" registry value which can be used as a persistence method by malicious actors

WindowsRegistry Set
TA0004 · Privilege EscalationT1037.001 · Logon Script (Windows)TA0003 · PersistenceTA0008 · Lateral Movement
Tom UeltschiSat Jan 12windows
Detectionhightest

Potential Persistence Via LSA Extensions

Detects when an attacker modifies the "REG_MULTI_SZ" value named "Extensions" to include a custom DLL to achieve persistence via lsass. The "Extensions" list contains filenames of DLLs being automatically loaded by lsass.exe. Each DLL has its InitializeLsaExtension() method called after loading.

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionhightest

Potential Persistence Via Mpnotify

Detects when an attacker register a new SIP provider for persistence and defense evasion

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionhightest

Potential Persistence Via MyComputer Registry Keys

Detects modification to the "Default" value of the "MyComputer" key and subkeys to point to a custom binary that will be launched whenever the associated action is executed (see reference section for example)

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Aug 09windows
Detectionhightest

Potential Persistence Via DLLPathOverride

Detects when an attacker adds a new "DLLPathOverride" value to the "Natural Language" key in order to achieve persistence which will get invoked by "SearchIndexer.exe" process

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionmediumtest

Potential Persistence Via Visual Studio Tools for Office

Detects persistence via Visual Studio Tools for Office (VSTO) add-ins in Office applications.

WindowsRegistry Set
T1137.006 · Add-insTA0003 · Persistence
Bhabesh RajSun Jan 10windows
Detectionhightest

Potential Persistence Via Outlook Home Page

Detects potential persistence activity via outlook home page. An attacker can set a home page to achieve code execution and persistence by editing the WebView registry keys.

WindowsRegistry Set
TA0005 · Defense EvasionTA0003 · PersistenceT1112 · Modify Registry
Tobias Michalski+2Wed Jun 09windows
Detectionhightest

Potential Persistence Via Outlook Today Page

Detects potential persistence activity via outlook today page. An attacker can set a custom page to execute arbitrary code and link to it via the registry values "URL" and "UserDefinedUrl".

WindowsRegistry Set
TA0005 · Defense EvasionTA0003 · PersistenceT1112 · Modify Registry
Tobias Michalski+2Thu Jun 10windows
Detectionhightest

Potential WerFault ReflectDebugger Registry Value Abuse

Detects potential WerFault "ReflectDebugger" registry value abuse for persistence.

WindowsRegistry Set
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
X__JuniorThu May 18windows
Detectionmediumtest

Potential Persistence Via Scrobj.dll COM Hijacking

Detect use of scrobj.dll as this DLL looks for the ScriptletURL key to get the location of the script to execute

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
François HubautSat Aug 20windows
Detectionmediumtest

Potential Persistence Via Shim Database Modification

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backward compatibility of software as the operating system codebase changes over time

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.011 · Application Shimming
François HubautThu Dec 30windows
Detectionhightest

Suspicious Shim Database Patching Activity

Detects installation of new shim databases that try to patch sections of known processes for potential process injection or persistence.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.011 · Application Shimming
Nasreddine Bencherchali (Nextron Systems)Tue Aug 01windows
Detectionhightest

Potential Persistence Via Shim Database In Uncommon Location

Detects the installation of a new shim database where the file is located in a non-default location

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.011 · Application Shimming
Nasreddine Bencherchali (Nextron Systems)Tue Aug 01windows
Detectionhightest

Potential Persistence Via TypedPaths

Detects modification addition to the 'TypedPaths' key in the user or admin registry from a non standard application. Which might indicate persistence attempt

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Mon Aug 22windows
Detectionhightest

Potential Persistence Via Excel Add-in - Registry

Detect potential persistence via the creation of an excel add-in (XLL) file to make it run automatically when Excel is started.

WindowsRegistry Set
TA0003 · PersistenceT1137.006 · Add-ins
François HubautSun Jan 15windows
Detectionhightest

Potential Attachment Manager Settings Associations Tamper

Detects tampering with attachment manager settings policies associations to lower the default file type risks (See reference for more information)

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Aug 01windows
Detectionhightest

Potential Attachment Manager Settings Attachments Tamper

Detects tampering with attachment manager settings policies attachments (See reference for more information)

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Aug 01windows