Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Findstr GPP Passwords

Look for the encrypted cpassword value within Group Policy Preference files on the Domain Controller. This value can be decrypted with gpp-decrypt.

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
François HubautMon Dec 27windows
Detectionhightest

LSASS Process Reconnaissance Via Findstr.EXE

Detects findstring commands that include the keyword lsass, which indicates recon actviity for the LSASS process PID

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Florian Roth (Nextron Systems)Fri Aug 12windows
Detectionhightest

Sysmon Discovery Via Default Driver Altitude Using Findstr.EXE

Detects usage of "findstr" with the argument "385201". Which could indicate potential discovery of an installed Sysinternals Sysmon service using the default driver altitude (even if the name is changed).

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
François HubautThu Dec 16windows
Detectionhightest

Finger.EXE Execution

Detects execution of the "finger.exe" utility. Finger.EXE or "TCPIP Finger Command" is an old utility that is still present on modern Windows installation. It Displays information about users on a specified remote computer (typically a UNIX computer) that is running the finger service or daemon. Due to the old nature of this utility and the rareness of machines having the finger service. Any execution of "finger.exe" can be considered "suspicious" and worth investigating.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+2Wed Feb 24windows
Detectionhightest

Sysmon Driver Unloaded Via Fltmc.EXE

Detects possible Sysmon filter driver unloaded via fltmc.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562 · Impair DefensesT1562.002 · Disable Windows Event Logging
Kirill Kiryanov+1Wed Oct 23windows
Detectionhightest

Forfiles.EXE Child Process Masquerading

Detects the execution of "forfiles" from a non-default location, in order to potentially spawn a custom "cmd.exe" from the current working directory.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Nasreddine Bencherchali (Nextron Systems)+1Fri Jan 05windows
Detectionhightest

Uncommon FileSystem Load Attempt By Format.com

Detects the execution of format.com with an uncommon filesystem selection that could indicate a defense evasion activity in which "format.com" is used to load malicious DLL files or other programs.

WindowsProcess Creation
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Tue Jan 04windows
Detectionhighstable

Fsutil Suspicious Invocation

Detects suspicious parameters of fsutil (deleting USN journal, configuring it with small size, etc). Might be used by ransomwares during the attack (seen by NotPetya and others).

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1070 · Indicator RemovalT1485 · Data Destruction
Ecco+2Thu Sep 26windows
Detectionhightest

Potentially Suspicious GoogleUpdate Child Process

Detects potentially suspicious child processes of "GoogleUpdate.exe"

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionhightest

File Encryption/Decryption Via Gpg4win From Suspicious Locations

Detects usage of Gpg4win to encrypt/decrypt files located in potentially suspicious locations.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 30windows
Detectionhightest

File Download Using Notepad++ GUP Utility

Detects execution of the Notepad++ updater (gup) from a process other than Notepad++ to download files.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Fri Jun 10windows
Detectionhighexperimental

Suspicious Child Process of Notepad++ Updater - GUP.Exe

Detects suspicious child process creation by the Notepad++ updater process (gup.exe). This could indicate potential exploitation of the updater component to deliver unwanted malware.

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1195.002 · Compromise Software Supply ChainTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Feb 03windows
Detectionhightest

Suspicious GUP Usage

Detects execution of the Notepad++ updater in a suspicious directory, which is often used in DLL side-loading attacks

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Florian Roth (Nextron Systems)Wed Feb 06windows
Detectionhightest

Remote CHM File Download/Execution Via HH.EXE

Detects the usage of "hh.exe" to execute/download remotely hosted ".chm" files.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.001 · Compiled HTML File
Nasreddine Bencherchali (Nextron Systems)Thu Sep 29windows
Detectionhightest

HTML Help HH.EXE Suspicious Child Process

Detects a suspicious child process of a Microsoft HTML Help (HH.exe)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0001 · Initial AccessT1047 · Windows Management Instrumentation+10
Maxim Pavlunin+1Wed Apr 01windows
Detectionhightest

Suspicious HH.EXE Execution

Detects a suspicious execution of a Microsoft HTML Help (HH.exe)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0001 · Initial AccessT1047 · Windows Management Instrumentation+10
Maxim PavluninWed Apr 01windows
Detectionhightest

HackTool - ADCSPwn Execution

Detects command line parameters used by ADCSPwn, a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Sat Jul 31windows
Detectionhightest

HackTool - Bloodhound/Sharphound Execution

Detects command line parameters used by Bloodhound and Sharphound hack tools

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain AccountT1482 · Domain Trust Discovery+4
Florian Roth (Nextron Systems)Fri Dec 20windows
Detectionhightest

HackTool - Certify Execution

Detects Certify a tool for Active Directory certificate abuse based on PE metadata characteristics and common command line arguments.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Martin MuellerMon Apr 17windows
Detectionhightest

HackTool - Certipy Execution

Detects Certipy execution, a tool for Active Directory Certificate Services enumeration and abuse based on PE metadata characteristics and common command line arguments.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Martin Mueller+1Mon Apr 17windows
Detectionhightest

Operator Bloopers Cobalt Strike Commands

Detects use of Cobalt Strike commands accidentally entered in the CMD shell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shellstp.1u
_pete_0+1Fri May 06windows
Detectionhightest

Operator Bloopers Cobalt Strike Modules

Detects Cobalt Strike module/commands accidentally entered in CMD shell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
_pete_0+1Fri May 06windows
Detectionhightest

CobaltStrike Load by Rundll32

Rundll32 can be use by Cobalt Strike with StartW function to load DLLs from the command line.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Wojciech LesickiTue Jun 01windows
Detectionhightest

Potential CobaltStrike Process Patterns

Detects potential process patterns related to Cobalt Strike beacon activity

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Jul 27windows
Detectionhightest

HackTool - CoercedPotato Execution

Detects the use of CoercedPotato, a tool for privilege escalation

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Wed Oct 11windows
Detectionhightest

HackTool - Covenant PowerShell Launcher

Detects suspicious command lines used in Covenant luanchers

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.001 · PowerShellT1564.003 · Hidden Window
Florian Roth (Nextron Systems)+2Thu Jun 04windows
Detectionhightest

HackTool - CrackMapExec Execution

This rule detect common flag combinations used by CrackMapExec in order to detect its use even if the binary has been replaced.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential Access+7
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionhighstable

HackTool - CrackMapExec Execution Patterns

Detects various execution patterns of the CrackMapExec pentesting framework

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1047 · Windows Management Instrumentation+4
Thomas PatzkeFri May 22windows
Detectionhightest

HackTool - CrackMapExec Process Patterns

Detects suspicious process patterns found in logs when CrackMapExec is used

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Sat Mar 12windows
Detectionhightest

HackTool - CrackMapExec PowerShell Obfuscation

The CrachMapExec pentesting framework implements a PowerShell obfuscation with some static strings detected by this rule.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027.005 · Indicator Removal from Tools
Thomas PatzkeFri May 22windows
Detectionhightest

HackTool - CreateMiniDump Execution

Detects the use of CreateMiniDump hack tool used to dump the LSASS process memory for credential extraction on the attacker's machine

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Sun Dec 22windows
Detectionhighexperimental

HackTool - Doppelanger LSASS Dumper Execution

Detects the execution of the Doppelanger hacktool which is used to dump LSASS memory via process cloning while evading common detection methods

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jul 01windows
Detectionhighexperimental

Hacktool - EDR-Freeze Execution

Detects execution of EDR-Freeze, a tool that exploits the MiniDumpWriteDump function and WerFaultSecure.exe to suspend EDR and Antivirus processes on Windows. EDR-Freeze leverages a race-condition attack to put security processes into a dormant state by suspending WerFaultSecure at the moment it freezes the target process. This technique does not require kernel-level exploits or BYOVD, but instead abuses user-mode functionality to temporarily disable monitoring by EDR or Antimalware solutions.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24windows
Detectionhightest

HackTool - EDRSilencer Execution

Detects the execution of EDRSilencer, a tool that leverages Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server based on PE metadata information.

WindowsProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defenses
@gott_cyberTue Jan 02windows
Detectionhightest

HackTool - Empire PowerShell Launch Parameters

Detects suspicious powershell command line parameters used in Empire

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sat Apr 20windows
Detectionhightest

Hacktool Execution - PE Metadata

Detects the execution of different Windows based hacktools via PE metadata (company, product, etc.) even if the files have been renamed

WindowsProcess Creation
TA0006 · Credential AccessTA0042 · Resource DevelopmentT1588.002 · ToolT1003 · OS Credential Dumping
Florian Roth (Nextron Systems)Wed Apr 27windows
Detectionhightest

HackTool - GMER Rootkit Detector and Remover Execution

Detects the execution GMER tool based on image and hash fields.

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Oct 05windows
Detectionhightest

HackTool - HandleKatz LSASS Dumper Execution

Detects the use of HandleKatz, a tool that demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Thu Aug 18windows
Detectionhightest

HackTool - Hashcat Password Cracker Execution

Execute Hashcat.exe with provided SAM file from registry of Windows and Password list to crack against

WindowsProcess Creation
TA0006 · Credential AccessT1110.002 · Password Cracking
François HubautMon Dec 27windows
Detectionhighexperimental

HackTool - HollowReaper Execution

Detects usage of HollowReaper, a process hollowing shellcode launcher used for stealth payload execution through process hollowing. It replaces the memory of a legitimate process with custom shellcode, allowing the attacker to execute payloads under the guise of trusted binaries.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.012 · Process Hollowing
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jul 01windows
Detectionhightest

HackTool - Htran/NATBypass Execution

Detects executable names or flags used by Htran or Htran-like tools (e.g. NATBypass)

WindowsProcess Creation
TA0011 · Command and ControlT1090 · ProxyS0040 · S0040
Florian Roth (Nextron Systems)Tue Dec 27windows
Detectionhightest

HackTool - Hydra Password Bruteforce Execution

Detects command line parameters used by Hydra password guessing hack tool

WindowsProcess Creation
TA0006 · Credential AccessT1110 · Brute ForceT1110.001 · Password Guessing
Vasiliy BurovMon Oct 05windows
Detectionhighstable

HackTool - Potential Impacket Lateral Movement Activity

Detects wmiexec/dcomexec/atexec/smbexec from Impacket framework

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management InstrumentationTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Ecco+3Tue Sep 03windows
Detectionhightest

HackTool - Impacket Tools Execution

Detects the execution of different compiled Windows binaries of the impacket toolset (based on names or part of their names - could lead to false positives)

WindowsProcess Creation
TA0009 · CollectionTA0002 · ExecutionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Sat Jul 24windows
Detectionhightest

Invoke-Obfuscation CLIP+ Launcher

Detects Obfuscated use of Clip.exe to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Tue Oct 13windows
Detectionhightest

Invoke-Obfuscation Obfuscated IEX Invocation

Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Daniel Bohannon ( / )+1Fri Nov 08windows
Detectionhightest

Invoke-Obfuscation STDIN+ Launcher

Detects Obfuscated use of stdin to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionhightest

Invoke-Obfuscation VAR+ Launcher

Detects Obfuscated use of Environment Variables to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows