Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious Shells Spawn by Java Utility Keytool

Detects suspicious shell spawn from Java utility keytool process (e.g. adselfservice plus exploitation)

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas HunkelerWed Dec 22windows
Detectionhightest

Suspicious Child Process Of Manage Engine ServiceDesk

Detects suspicious child processes of the "Manage Engine ServiceDesk Plus" Java web service

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web Service
Florian Roth (Nextron Systems)Wed Jan 18windows
Detectionhightest

Suspicious Processes Spawned by Java.EXE

Detects suspicious processes spawned from a Java host process which could indicate a sign of exploitation (e.g. log4j)

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Fri Dec 17windows
Detectionhightest

Kavremover Dropped Binary LOLBIN Usage

Detects the execution of a signed binary dropped by Kaspersky Lab Products Remover (kavremover) which can be abused as a LOLBIN to execute arbitrary commands and binaries.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Nov 01windows
Detectionhighexperimental

Attempts of Kerberos Coercion Via DNS SPN Spoofing

Detects the presence of "UWhRC....AAYBAAAA" pattern in command line. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like in CVE-2025-33073. If you see this pattern in the command line, it is likely an attempt to add spoofed Service Principal Names (SPNs) to DNS records, or checking for the presence of such records through the `nslookup` command.

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20windows
Detectionhightest

Suspicious Windows Trace ETW Session Tamper Via Logman.EXE

Detects the execution of "logman" utility in order to disable or delete Windows trace sessions

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1070.001 · Clear Windows Event Logs
Florian Roth (Nextron Systems)Thu Feb 11windows
Detectionhightest

Devtoolslauncher.exe Executes Specified Binary

The Devtoolslauncher.exe executes other binary

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+2Sat Oct 12windows
Detectionhightest

Potential Manage-bde.wsf Abuse To Proxy Execution

Detects potential abuse of the "manage-bde.wsf" script as a LOLBIN to proxy execution

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
oscd.community+2Tue Oct 13windows
Detectionhightest

Mavinject Inject DLL Into Running Process

Detects process injection using the signed Windows tool "Mavinject" via the "INJECTRUNNING" flag

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library InjectionT1218.013 · Mavinject
François Hubaut+1Mon Jul 12windows
Detectionhightest

MpiExec Lolbin

Detects a certain command line flag combination used by mpiexec.exe LOLBIN from HPC pack that can be used to execute any other binary

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Florian Roth (Nextron Systems)Tue Jan 11windows
Detectionhightest

OpenWith.exe Executes Specified Binary

The OpenWith.exe executes other binary

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+2Sat Oct 12windows
Detectionhightest

Execute Pcwrun.EXE To Leverage Follina

Detects indirect command execution via Program Compatibility Assistant "pcwrun.exe" leveraging the follina (CVE-2022-30190) vulnerability

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jun 13windows
Detectionhightest

PrintBrm ZIP Creation of Extraction

Detects the execution of the LOLBIN PrintBrm.exe, which can be used to create or extract ZIP files. PrintBrm.exe should not be run on a normal workstation.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool TransferTA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautMon May 02windows
Detectionhightest

Using SettingSyncHost.exe as LOLBin

Detects using SettingSyncHost.exe to run hijacked binary

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense Evasion+1
Anton Kutepov+1Wed Feb 05windows
Detectionhightest

Suspicious GrpConv Execution

Detects the suspicious execution of a utility to convert Windows 3.x .grp files or for persistence purposes by malicious software or actors

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
Florian Roth (Nextron Systems)Thu May 19windows
Detectionhightest

Time Travel Debugging Utility Usage

Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1218 · System Binary Proxy ExecutionT1003.001 · LSASS Memory
Ensar Şamil+1Tue Oct 06windows
Detectionhightest

Visual Basic Command Line Compiler Usage

Detects successful code compilation via Visual Basic Command Line Compiler that utilizes Windows Resource to Object Converter.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Delivery
Ensar Şamil+1Wed Oct 07windows
Detectionhightest

MMC20 Lateral Movement

Detects MMC20.Application Lateral Movement; specifically looks for the spawning of the parent MMC.exe with a command line of "-Embedding" as a child of svchost.exe

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
(Security Risk Advisors) - rule; Teymur KheirkhabarovWed Mar 04windows
Detectionhighexperimental

MMC Executing Files with Reversed Extensions Using RTLO Abuse

Detects malicious behavior where the MMC utility (`mmc.exe`) executes files with reversed extensions caused by Right-to-Left Override (RLO) abuse, disguising them as document formats.

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious FileTA0005 · Defense EvasionT1218.014 · MMC+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionhightest

MMC Spawning Windows Shell

Detects a Windows command line executable started from MMC

WindowsProcess Creation
TA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Karneades+1Mon Aug 05windows
Detectionhightest

Potential Suspicious Mofcomp Execution

Detects execution of the "mofcomp" utility as a child of a suspicious shell or script running utility or by having a suspicious path in the commandline. The "mofcomp" utility parses a file containing MOF statements and adds the classes and class instances defined in the file to the WMI repository. Attackers abuse this utility to install malicious MOF scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionhightest

Potential Mpclient.DLL Sideloading Via Defender Binaries

Detects potential sideloading of "mpclient.dll" by Windows Defender processes ("MpCmdRun" and "NisSrv") from their non-default directory.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Bhabesh RajMon Aug 01windows
Detectionhightest

File Download Via Windows Defender MpCmpRun.EXE

Detects the use of Windows Defender MpCmdRun.EXE to download files

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Matthew MatchenFri Sep 04windows
Detectionhightest

Windows Defender Definition Files Removed

Adversaries may disable security tools to avoid possible detection of their tools and activities by removing Windows Defender Definition Files

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautWed Jul 07windows
Detectionhightest

MSDT Execution Via Answer File

Detects execution of "msdt.exe" using an answer file which is simulating the legitimate way of calling msdt via "pcwrun.exe" (For example from the compatibility tab).

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jun 13windows
Detectionhightest

Potential Arbitrary Command Execution Using Msdt.EXE

Detects processes leveraging the "ms-msdt" handler or the "msdt.exe" binary to execute arbitrary commands as seen in the follina (CVE-2022-30190) vulnerability

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Sun May 29windows
Detectionhightest

Suspicious MSDT Parent Process

Detects msdt.exe executed by a suspicious parent as seen in CVE-2022-30190 / Follina exploitation

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1218 · System Binary Proxy Execution
Nextron SystemsWed Jun 01windows
Detectionhightest

Remotely Hosted HTA File Executed Via Mshta.EXE

Detects execution of the "mshta" utility with an argument containing the "http" keyword, which could indicate that an attacker is executing a remotely hosted malicious hta file

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.005 · Mshta
Nasreddine Bencherchali (Nextron Systems)Mon Aug 08windows
Detectionhightest

Suspicious JavaScript Execution Via Mshta.EXE

Detects execution of javascript code using "mshta.exe".

WindowsProcess Creation
TA0005 · Defense EvasionT1218.005 · Mshta
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhightest

Potential LethalHTA Technique Execution

Detects potential LethalHTA technique where the "mshta.exe" is spawned by an "svchost.exe" process

WindowsProcess Creation
TA0005 · Defense EvasionT1218.005 · Mshta
Markus NeisThu Jun 07windows
Detectionhightest

Suspicious MSHTA Child Process

Detects a suspicious process spawning from an "mshta.exe" process, which could be indicative of a malicious HTA script execution

WindowsProcess Creation
TA0005 · Defense EvasionT1218.005 · Mshta2013-02-003 · CAR 2013-02-0032013-03-001 · CAR 2013-03-001+1
Michael HaagWed Jan 16windows
Detectionhightest

MSHTA Execution with Suspicious File Extensions

Detects execution of mshta.exe with file types that looks like they do not typically represent HTA (HTML Application) content, such as .png, .jpg, .zip, .pdf, and others, which are often polyglots. MSHTA is a legitimate Windows utility for executing HTML Applications containing VBScript or JScript. Threat actors often abuse this lolbin utility to download and execute malicious scripts disguised as benign files or hosted under misleading extensions to evade detection.

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationT1218.005 · MshtaTA0002 · Execution+2
Diego Perez+3Fri Feb 22windows
Detectionhightest

Suspicious Mshta.EXE Execution Patterns

Detects suspicious mshta process execution patterns

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native API
Florian Roth (Nextron Systems)+1Sat Jul 17windows
Detectionhightest

Potential MsiExec Masquerading

Detects the execution of msiexec.exe from an uncommon directory

WindowsProcess Creation
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Florian Roth (Nextron Systems)Thu Nov 14windows
Detectionhightest

Potential Process Injection Via Msra.EXE

Detects potential process injection via Microsoft Remote Asssistance (Msra.exe) by looking at suspicious child processes spawned from the aforementioned process. It has been a target used by many threat actors and used for discovery and persistence tactics

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Alexander McDonaldFri Jun 24windows
Detectionhightest

Suspicious Child Process Of SQL Server

Detects suspicious child processes of the SQLServer process. This could indicate potential RCE or SQL Injection.

WindowsProcess Creation
T1505.003 · Web ShellT1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessTA0003 · Persistence+1
FPT.EagleEye Team+1Fri Dec 11windows
Detectionhightest

Potential MSTSC Shadowing Activity

Detects RDP session hijacking by using MSTSC shadowing

WindowsProcess Creation
TA0008 · Lateral MovementT1563.002 · RDP Hijacking
Florian Roth (Nextron Systems)Fri Jan 24windows
Detectionhightest

Suspicious Mstsc.EXE Execution With Local RDP File

Detects potential RDP connection via Mstsc using a local ".rdp" file located in suspicious locations.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionhightest

Mstsc.EXE Execution From Uncommon Parent

Detects potential RDP connection via Mstsc using a local ".rdp" file located in suspicious locations.

WindowsProcess Creation
TA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionhightest

Remote XSL Execution Via Msxsl.EXE

Detects the execution of the "msxsl" binary with an "http" keyword in the command line. This might indicate a potential remote execution of XSL files.

WindowsProcess Creation
TA0005 · Defense EvasionT1220 · XSL Script Processing
Swachchhanda Shrawan PoudelThu Nov 09windows
Detectionhightest

Windows Internet Hosted WebDav Share Mount Via Net.EXE

Detects when an internet hosted webdav share is mounted using the "net.exe" utility

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Nasreddine Bencherchali (Nextron Systems)Tue Feb 21windows
Detectionhightest

New User Created Via Net.EXE With Never Expire Option

Detects creation of local users via the net.exe command with the option "never expire"

WindowsProcess Creation
TA0003 · PersistenceT1136.001 · Local Account
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionhightest

Suspicious Manipulation Of Default Accounts Via Net.EXE

Detects suspicious manipulations of default accounts such as 'administrator' and 'guest'. For example 'enable' or 'disable' accounts or change the password...etc

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Detectionhightest

Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE

Detects Netsh command execution that whitelists a program located in a suspicious location in the Windows Firewall

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Sander Wiebing+3Mon May 25windows
Detectionhightest

RDP Connection Allowed Via Netsh.EXE

Detects usage of the netsh command to open and allow connections to port 3389 (RDP). As seen used by Sarwent Malware

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Sander WiebingSat May 23windows
Detectionhightest

RDP Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh to configure a port forwarding of port 3389 (RDP) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+1Tue Jan 29windows
Detectionhightest

Potential Arbitrary Code Execution Via Node.EXE

Detects the execution node.exe which is shipped with multiple software such as VMware, Adobe...etc. In order to execute arbitrary code. For example to establish reverse shell as seen in Log4j attacks...etc

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

Network Reconnaissance Activity

Detects a set of suspicious network related commands often used in recon stages

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account DiscoveryT1082 · System Information Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Feb 07windows