Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious Driver/DLL Installation Via Odbcconf.EXE

Detects execution of "odbcconf" with the "INSTALLDRIVER" action where the driver doesn't contain a ".dll" extension. This is often used as a defense evasion method.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Tue May 23windows
Detectionhightest

Odbcconf.EXE Suspicious DLL Location

Detects execution of "odbcconf" where the path of the DLL being registered is located in a potentially suspicious location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Mon May 22windows
Detectionhightest

Potentially Suspicious DLL Registered Via Odbcconf.EXE

Detects execution of "odbcconf" with the "REGSVR" action where the DLL in question doesn't contain a ".dll" extension. Which is often used as a method to evade defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Mon May 22windows
Detectionhightest

Suspicious Response File Execution Via Odbcconf.EXE

Detects execution of "odbcconf" with the "-f" flag in order to load a response file with a non-".rsp" extension.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Mon May 22windows
Detectionhightest

Potential Arbitrary File Download Using Office Application

Detects potential arbitrary file download using a Microsoft Office application

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)+2Tue May 17windows
Detectionhightest

Potential Excel.EXE DCOM Lateral Movement Via ActivateMicrosoftApp

Detects suspicious child processes of Excel which could be an indicator of lateral movement leveraging the "ActivateMicrosoftApp" Excel DCOM object.

WindowsProcess Creation
T1021.003 · Distributed Component Object ModelTA0008 · Lateral Movement
Aaron StrattonMon Nov 13windows
Detectionhightest

Potentially Suspicious Office Document Executed From Trusted Location

Detects the execution of an Office application that points to a document that is located in a trusted location. Attackers often used this to avoid macro security and execute their malicious code.

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Wed Jun 21windows
Detectionhightest

OneNote.EXE Execution of Malicious Embedded Scripts

Detects the execution of malicious OneNote documents that contain embedded scripts. When a user clicks on a OneNote attachment and then on the malicious link inside the ".one" file, it exports and executes the malicious embedded script from specific directories.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.001 · Compiled HTML File
kostastsaleThu Feb 02windows
Detectionhightest

Suspicious Microsoft OneNote Child Process

Detects suspicious child processes of the Microsoft OneNote application. This may indicate an attempt to execute malicious embedded objects from a .one file.

WindowsProcess Creation
T1566 · PhishingT1566.001 · Spearphishing AttachmentTA0001 · Initial Access
Tim Rauch+2Fri Oct 21windows
Detectionhightest

Outlook EnableUnsafeClientMailRules Setting Enabled

Detects an attacker trying to enable the outlook security setting "EnableUnsafeClientMailRules" which allows outlook to run applications or execute macros

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059 · Command and Scripting InterpreterT1202 · Indirect Command Execution
Markus Neis+1Thu Dec 27windows
Detectionhightest

Suspicious Execution From Outlook Temporary Folder

Detects a suspicious program execution in Outlook temp folder

WindowsProcess Creation
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)Tue Oct 01windows
Detectionhightest

Suspicious Outlook Child Process

Detects a suspicious process spawning from an Outlook process.

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious File
Michael Haag+4Mon Feb 28windows
Detectionhightest

Suspicious Remote Child Process From Outlook

Detects a suspicious child process spawning from Outlook where the image is located in a remote location (SMB/WebDav shares).

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059 · Command and Scripting InterpreterT1202 · Indirect Command Execution
Markus Neis+1Thu Dec 27windows
Detectionhightest

Suspicious Binary In User Directory Spawned From Office Application

Detects an executable in the users directory started from one of the Microsoft Office suite applications (Word, Excel, PowerPoint, Publisher, Visio)

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious FileG0046 · G00462013-05-002 · CAR 2013-05-002
Jason LynchTue Apr 02windows
Detectionhightest

Suspicious Microsoft Office Child Process

Detects a suspicious process spawning from one of the Microsoft Office suite products (Word, Excel, PowerPoint, Publisher, Visio, etc.)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1047 · Windows Management InstrumentationT1204.002 · Malicious File+1
Florian Roth (Nextron Systems)+7Fri Apr 06windows
Detectionhightest

Ping Hex IP

Detects a ping command that uses a hex encoded IP address

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Fri Mar 23windows
Detectionhightest

Suspicious Plink Port Forwarding

Detects suspicious Plink tunnel port forwarding to a local port

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol TunnelingTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol
Florian Roth (Nextron Systems)Tue Jan 19windows
Detectionhightest

Potential RDP Tunneling Via Plink

Execution of plink to perform data exfiltration and tunneling

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Florian Roth (Nextron Systems)Thu Aug 04windows
Detectionhightest

AADInternals PowerShell Cmdlets Execution - ProccessCreation

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

WindowsProcess Creation
TA0002 · ExecutionTA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential Access+1
Austin Songer+2Fri Dec 23windows
Detectionhightest

Potential AMSI Bypass Via .NET Reflection

Detects Request to "amsiInitFailed" that can be used to disable AMSI Scanning

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Markus NeisFri Aug 17windows
Detectionhightest

Suspicious Encoded PowerShell Command Line

Detects suspicious powershell process starts with base64 encoded commands (e.g. Emotet)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+5Mon Sep 03windows
Detectionhightest

Suspicious PowerShell Encoded Command Patterns

Detects PowerShell command line patterns in combincation with encoded commands that often appear in malware infection chains

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue May 24windows
Detectionhightest

Suspicious Obfuscated PowerShell Code

Detects suspicious UTF16 and base64 encoded and often obfuscated PowerShell code often used in command lines

WindowsProcess Creation
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Mon Jul 11windows
Detectionhightest

PowerShell Base64 Encoded FromBase64String Cmdlet

Detects usage of a base64 encoded "FromBase64String" cmdlet in a process command line

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sat Aug 24windows
Detectionhightest

Malicious Base64 Encoded PowerShell Keywords in Command Lines

Detects base64 encoded strings used in hidden malicious PowerShell command lines

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
John LambertWed Jan 16windows
Detectionhightest

PowerShell Base64 Encoded IEX Cmdlet

Detects usage of a base64 encoded "IEX" cmdlet in a process command line

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Fri Aug 23windows
Detectionhightest

PowerShell Base64 Encoded Invoke Keyword

Detects UTF-8 and UTF-16 Base64 encoded powershell 'Invoke-' calls

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Martin Mueller+1Fri May 20windows
Detectionhightest

Powershell Base64 Encoded MpPreference Cmdlet

Detects base64 encoded "MpPreference" PowerShell cmdlet code that tries to modifies or tamper with Windows Defender AV

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Fri Mar 04windows
Detectionhightest

PowerShell Base64 Encoded Reflective Assembly Load

Detects base64 encoded .NET reflective loading of Assembly

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information+1
Christian Burkard (Nextron Systems)+1Tue Mar 01windows
Detectionhightest

Suspicious Encoded And Obfuscated Reflection Assembly Load Function Call

Detects suspicious base64 encoded and obfuscated "LOAD" keyword used in .NET "reflection.assembly"

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.001 · PowerShellT1027 · Obfuscated Files or Information
Martin MuellerTue Mar 01windows
Detectionhightest

PowerShell Base64 Encoded WMI Classes

Detects calls to base64 encoded WMI class such as "Win32_ShadowCopy", "Win32_ScheduledJob", etc.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Christian Burkard (Nextron Systems)+1Mon Jan 30windows
Detectionhightest

Potential PowerShell Obfuscation Via Reversed Commands

Detects the presence of reversed PowerShell commands in the CommandLine. This is often used as a method of obfuscation by attackers

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Teymur Kheirkhabarov+3Sun Oct 11windows
Detectionhightest

Potential PowerShell Command Line Obfuscation

Detects the PowerShell command lines with special characters

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1027 · Obfuscated Files or InformationT1059.001 · PowerShell
Teymur Kheirkhabarov+3Thu Oct 15windows
Detectionhighexperimental

Obfuscated PowerShell MSI Install via WindowsInstaller COM

Detects the execution of obfuscated PowerShell commands that attempt to install MSI packages via the Windows Installer COM object (`WindowsInstaller.Installer`). The technique involves manipulating strings to hide functionality, such as constructing class names using string insertion (e.g., 'indowsInstaller.Installer'.Insert(0,'W')) and correcting malformed URLs (e.g., converting 'htps://' to 'https://') at runtime. This behavior is commonly associated with malware loaders or droppers that aim to bypass static detection by hiding intent in runtime-generated strings and using legitimate tools for code execution. The use of `InstallProduct` and COM object creation, particularly combined with hidden window execution and suppressed UI, indicates an attempt to install software (likely malicious) without user interaction.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.010 · Command ObfuscationT1218.007 · MsiexecTA0002 · Execution+1
Meroujan Antonyan (vx3r)Tue May 27windows
Detectionhightest

PowerShell Execution With Potential Decryption Capabilities

Detects PowerShell commands that decrypt an ".LNK" "file to drop the next stage of the malware.

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)+1Fri Jun 30windows
Detectionhightest

Powershell Defender Disable Scan Feature

Detects requests to disable Microsoft Defender features using PowerShell commands

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Thu Mar 03windows
Detectionhightest

Disable Windows Defender AV Security Monitoring

Detects attackers attempting to disable Windows Defender using Powershell

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
ok invrep-de+2Mon Oct 12windows
Detectionhightest

Disabled IE Security Features

Detects command lines that indicate unwanted modifications to registry keys that disable important Internet Explorer security features

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Fri Jun 19windows
Detectionhightest

Obfuscated PowerShell OneLiner Execution

Detects the execution of a specific OneLiner to download and execute powershell modules in memory.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1562.001 · Disable or Modify Tools
kostastsale+1Mon May 09windows
Detectionhightest

PowerShell Download and Execution Cradles

Detects PowerShell download and execution cradles.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Thu Mar 24windows
Detectionhightest

Potentially Suspicious File Download From File Sharing Domain Via PowerShell.EXE

Detects potentially suspicious file downloads from file sharing domains using PowerShell.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Feb 23windows
Detectionhightest

DSInternals Suspicious PowerShell Cmdlets

Detects execution and usage of the DSInternals PowerShell module. Which can be used to perform what might be considered as suspicious activity such as dumping DPAPI backup keys or manipulating NTDS.DIT files. The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)+1Wed Jun 26windows
Detectionhightest

Email Exifiltration Via Powershell

Detects email exfiltration via powershell cmdlets

WindowsProcess Creation
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)+1Fri Sep 09windows
Detectionhightest

Base64 Encoded PowerShell Command Detected

Detects usage of the "FromBase64String" function in the commandline which is used to decode a base64 encoded string

WindowsProcess Creation
T1027 · Obfuscated Files or InformationTA0005 · Defense EvasionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+1
Florian Roth (Nextron Systems)Wed Jan 29windows
Detectionhightest

PowerShell Get-Process LSASS

Detects a "Get-Process" cmdlet and it's aliases on lsass process, which is in almost all cases a sign of malicious activity

WindowsProcess Creation
TA0006 · Credential AccessT1552.004 · Private Keys
Florian Roth (Nextron Systems)Fri Apr 23windows
Detectionhightest

Abuse of Service Permissions to Hide Services Via Set-Service

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionhightest

Suspicious PowerShell IEX Execution Patterns

Detects suspicious ways to run Invoke-Execution using IEX alias

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Thu Mar 24windows
Detectionhightest

Root Certificate Installed From Susp Locations

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows