Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Clearing Windows Console History

Identifies when a user attempts to clear console history. An adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070 · Indicator RemovalT1070.003 · Clear Command History
Austin SongerThu Nov 25windows
Detectionhightest

Powershell Install a DLL in System Directory

Uses PowerShell to install/copy a file into a system directory such as "System32" or "SysWOW64"

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556.002 · Password Filter DLL
François Hubaut+1Mon Dec 27windows
Detectionhightest

Create Volume Shadow Copy with Powershell

Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information

WindowsPowerShell Script
TA0006 · Credential AccessT1003.003 · NTDSattack.ds0005
François HubautWed Jan 12windows
Detectionhightest

Disable Powershell Command History

Detects scripts or commands that disabled the Powershell command history by removing psreadline module

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.003 · Clear Command History
Ali AlwashaliSun Aug 21windows
Detectionhightest

Disable-WindowsOptionalFeature Command PowerShell

Detect built in PowerShell cmdlet Disable-WindowsOptionalFeature, Deployment Image Servicing and Management tool. Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautSat Sep 10windows
Detectionhightest

DSInternals Suspicious PowerShell Cmdlets - ScriptBlock

Detects execution and usage of the DSInternals PowerShell module. Which can be used to perform what might be considered as suspicious activity such as dumping DPAPI backup keys or manipulating NTDS.DIT files. The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Wed Jun 26windows
Detectionhightest

Disable of ETW Trace - Powershell

Detects usage of powershell cmdlets to disable or remove ETW trace sessions

WindowsPowerShell Script
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562.006 · Indicator Blocking2016-04-002 · CAR 2016-04-002
Nasreddine Bencherchali (Nextron Systems)Tue Jun 28windows
Detectionhightest

HackTool - Rubeus Execution - ScriptBlock

Detects the execution of the hacktool Rubeus using specific command line flags

WindowsPowerShell Script
TA0005 · Defense EvasionTA0006 · Credential AccessT1003 · OS Credential DumpingT1558.003 · Kerberoasting+2
Christian Burkard (Nextron Systems)+1Thu Apr 27windows
Detectionhightest

HackTool - WinPwn Execution - ScriptBlock

Detects scriptblock text keywords indicative of potential usge of the tool WinPwn. A tool for Windows and Active Directory reconnaissance and exploitation.

WindowsPowerShell Script
TA0006 · Credential AccessTA0005 · Defense EvasionTA0007 · DiscoveryTA0002 · Execution+9
Swachchhanda Shrawan PoudelMon Dec 04windows
Detectionhightest

Powershell DNSExfiltration

DNSExfiltrator allows for transferring (exfiltrate) a file over a DNS request covert channel

WindowsPowerShell Script
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
François HubautFri Jan 07windows
Detectionhightest

Invoke-Obfuscation CLIP+ Launcher - PowerShell

Detects Obfuscated use of Clip.exe to execute PowerShell

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Tue Oct 13windows
Detectionhightest

Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell

Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Daniel Bohannon ( / )+1Fri Nov 08windows
Detectionhightest

Invoke-Obfuscation STDIN+ Launcher - Powershell

Detects Obfuscated use of stdin to execute PowerShell

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionhightest

Invoke-Obfuscation VAR+ Launcher - PowerShell

Detects Obfuscated use of Environment Variables to execute PowerShell

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionhightest

Invoke-Obfuscation Via Stdin - Powershell

Detects Obfuscated Powershell via Stdin in Scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Mon Oct 12windows
Detectionhightest

Invoke-Obfuscation Via Use Clip - Powershell

Detects Obfuscated Powershell via use Clip.exe in Scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Fri Oct 09windows
Detectionhightest

Invoke-Obfuscation Via Use MSHTA - PowerShell

Detects Obfuscated Powershell via use MSHTA in Scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Thu Oct 08windows
Detectionhightest

Invoke-Obfuscation Via Use Rundll32 - PowerShell

Detects Obfuscated Powershell via use Rundll32 in Scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Tue Oct 08windows
Detectionhightest

Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell

Detects Obfuscated Powershell via VAR++ LAUNCHER

WindowsPowerShell Script
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Tue Oct 13windows
Detectionhightest

Malicious PowerShell Commandlets - ScriptBlock

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Sean Metcalf+10Sun Mar 05windows
Detectionhightest

Live Memory Dump Using Powershell

Detects usage of a PowerShell command to dump the live memory of a Windows machine

WindowsPowerShell Script
TA0006 · Credential AccessT1003 · OS Credential Dumping
Max Altgelt (Nextron Systems)Tue Sep 21windows
Detectionhightest

Malicious Nishang PowerShell Commandlets

Detects Commandlet names and arguments from the Nishang exploitation framework

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Alec CostelloThu May 16windows
Detectionhightest

NTFS Alternate Data Stream

Detects writing data into NTFS alternate data streams from powershell. Needs Script Block Logging.

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.004 · NTFS File AttributesTA0002 · ExecutionT1059.001 · PowerShell
Sami RuohonenTue Jul 24windows
Detectionhightest

Code Executed Via Office Add-in XLL File

Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used to add functionality to Office programs

WindowsPowerShell Script
TA0003 · PersistenceT1137.006 · Add-ins
François HubautTue Dec 28windows
Detectionhightest

Potential Invoke-Mimikatz PowerShell Script

Detects Invoke-Mimikatz PowerShell script and alike. Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords.

WindowsPowerShell Script
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+1Wed Sep 28windows
Detectionhightest

PowerShell Web Access Installation - PsScript

Detects the installation and configuration of PowerShell Web Access, which could be used for remote access and potential abuse

WindowsPowerShell Script
TA0003 · PersistenceTA0002 · ExecutionT1059.001 · PowerShell
Michael HaagTue Sep 03windows
Detectionhightest

PowerView PowerShell Cmdlets - ScriptBlock

Detects Cmdlet names from PowerView of the PowerSploit exploitation framework.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Bhabesh RajTue May 18windows
Detectionhightest

PowerShell Credential Prompt

Detects PowerShell calling a credential prompt

WindowsPowerShell Script
TA0006 · Credential AccessTA0002 · ExecutionT1059.001 · PowerShell
John Lambert+1Sun Apr 09windows
Detectionhightest

PSAsyncShell - Asynchronous TCP Reverse Shell

Detects the use of PSAsyncShell an Asynchronous TCP Reverse Shell written in powershell

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Oct 04windows
Detectionhightest

PowerShell PSAttack

Detects the use of PSAttack PowerShell hack tool

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell ScriptBlock

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionhightest

Suspicious Kerberos Ticket Request via PowerShell Script - ScriptBlock

Detects PowerShell scripts that utilize native PowerShell Identity modules to request Kerberos tickets. This behavior is typically seen during a Kerberos or silver ticket attack. A successful execution will output the SPNs for the endpoint in question.

WindowsPowerShell Script
TA0006 · Credential AccessT1558.003 · Kerberoasting
François HubautTue Dec 28windows
Detectionhightest

PowerShell Set-Acl On Windows Folder - PsScript

Detects PowerShell scripts to set the ACL to a file in the Windows folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionhightest

PowerShell ShellCode

Detects Base64 encoded Shellcode

WindowsPowerShell Script
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process InjectionTA0002 · Execution+1
David Ledbetter (shellcode)+1Sat Nov 17windows
Detectionhightest

Malicious ShellIntel PowerShell Commandlets

Detects Commandlet names from ShellIntel exploitation scripts.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Max Altgelt (Nextron Systems)+1Mon Aug 09windows
Detectionhightest

Potential Persistence Via Security Descriptors - ScriptBlock

Detects usage of certain functions and keywords that are used to manipulate security descriptors in order to potentially set a backdoor. As seen used in the DAMP project.

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Jan 05windows
Detectionhightest

PowerShell Get-Process LSASS in ScriptBlock

Detects a Get-Process command on lsass process, which is in almost all cases a sign of malicious activity

WindowsPowerShell Script
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Fri Apr 23windows
Detectionhightest

Suspicious PowerShell Invocations - Generic

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 12windows
Detectionhightest

Suspicious PowerShell Invocations - Specific

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Sun Mar 05windows
Detectionhightest

Suspicious Service DACL Modification Via Set-Service Cmdlet - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell - PS Script

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsPowerShell Script
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows
Detectionhightest

Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging

Detects attempts to remove Windows Defender configuration using the 'MpPreference' cmdlet

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Tamper Windows Defender - ScriptBlockLogging

Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+5Sun Jan 16windows
Detectionhightest

Abuse of Service Permissions to Hide Services Via Set-Service - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionhightest

Veeam Backup Servers Credential Dumping Script Execution

Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.

WindowsPowerShell Script
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Thu May 04windows
Detectionhightest

Potential WinAPI Calls Via PowerShell Scripts

Detects use of WinAPI functions in PowerShell scripts

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellT1106 · Native API
Nasreddine Bencherchali (Nextron Systems)+2Tue Oct 06windows
Detectionhightest

WMImplant Hack Tool

Detects parameters used by WMImplant

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management InstrumentationT1059.001 · PowerShell
NVISOThu Mar 26windows
Detectionhighstable

CMSTP Execution Process Access

Detects various indicators of Microsoft Connection Manager Profile Installer execution

WindowsProcess Access
TA0005 · Defense EvasionT1218.003 · CMSTPTA0002 · ExecutionT1559.001 · Component Object Model+3
Nik SeetharamanMon Jul 16windows