Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Disable Important Scheduled Task

Detects when adversaries stop services or processes by disabling their respective scheduled tasks in order to conduct data destructive activities

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
François Hubaut+2Sun Dec 26windows
Detectionhightest

Schtasks From Suspicious Folders

Detects scheduled task creations that have suspicious action command and folder combinations

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Fri Apr 15windows
Detectionhightest

Uncommon One Time Only Scheduled Task At 00:00

Detects scheduled task creation events that include suspicious actions, and is run once at 00:00

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task
Martin MuellerFri Jul 15windows
Detectionhighexperimental

Potential SSH Tunnel Persistence Install Using A Scheduled Task

Detects the creation of new scheduled tasks via commandline, using Schtasks.exe. This rule detects tasks creating that call OpenSSH, which may indicate the creation of reverse SSH tunnel to the attacker's server.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task+1
Rory DuncanMon Jul 14windows
Detectionhightest

Potential Persistence Via Powershell Search Order Hijacking - Task

Detects suspicious powershell execution via a schedule task where the command ends with an suspicious flags to hide the powershell instance instead of executeing scripts or commands. This could be a sign of persistence via PowerShell "Get-Variable" technique as seen being used in Colibri Loader

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+1Fri Apr 08windows
Detectionhightest

Scheduled Task Executing Encoded Payload from Registry

Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+3Sat Feb 12windows
Detectionhightest

Suspicious Schtasks Schedule Types

Detects scheduled task creations or modification on a suspicious schedule type

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

Suspicious Command Patterns In Scheduled Task Creation

Detects scheduled task creation using "schtasks" that contain potentially suspicious or uncommon commands

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Wed Feb 23windows
Detectionhightest

Schtasks Creation Or Modification With SYSTEM Privileges

Detects the creation or update of a scheduled task to run with "NT AUTHORITY\SYSTEM" privileges

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Thu Jul 28windows
Detectionhighexperimental

Scheduled Task Creation Masquerading as System Processes

Detects the creation of scheduled tasks that involve system processes, which may indicate malicious actors masquerading as or abusing these processes to execute payloads or maintain persistence.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+3
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionhightest

Script Event Consumer Spawning Process

Detects a suspicious child process of Script Event Consumer (scrcons.exe).

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Sittikorn SMon Jun 21windows
Detectionhightest

Sdiagnhost Calling Suspicious Child Process

Detects sdiagnhost.exe calling a suspicious child process (e.g. used in exploits for Follina / CVE-2022-30190)

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1218 · System Binary Proxy Execution
kostastsaleWed Jun 01windows
Detectionhightest

Suspicious Serv-U Process Pattern

Detects a suspicious process pattern which could be a sign of an exploited Serv-U service

WindowsProcess Creation
TA0006 · Credential AccessT1555 · Credentials from Password Storescve.2021-35211
Florian Roth (Nextron Systems)Wed Jul 14windows
Detectionhightest

Uncommon Child Process Of Setres.EXE

Detects uncommon child process of Setres.EXE. Setres.EXE is a Windows server only process and tool that can be used to set the screen resolution. It can potentially be abused in order to launch any arbitrary file with a name containing the word "choice" from the current execution path.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
@gott_cyber+1Sun Dec 11windows
Detectionhighexperimental

Suspicious Speech Runtime Binary Child Process

Detects suspicious Speech Runtime Binary Execution by monitoring its child processes. Child processes spawned by SpeechRuntime.exe could indicate an attempt for lateral movement via COM & DCOM hijacking.

WindowsProcess Creation
TA0005 · Defense EvasionTA0008 · Lateral MovementT1021.003 · Distributed Component Object ModelT1218 · System Binary Proxy Execution
andrewdanisThu Oct 23windows
Detectionhightest

Suspicious Splwow64 Without Params

Detects suspicious Splwow64.exe process without any command line parameters

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)Mon Aug 23windows
Detectionhightest

Suspicious Spool Service Child Process

Detects suspicious print spool service (spoolsv.exe) child processes.

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Justin C.+1Sun Jul 11windows
Detectionhightest

VeeamBackup Database Credentials Dump Via Sqlcmd.EXE

Detects dump of credentials in VeeamBackup dbo

WindowsProcess Creation
TA0009 · CollectionT1005 · Data from Local System
François HubautMon Dec 20windows
Detectionhightest

SQLite Chromium Profile Data DB Access

Detect usage of the "sqlite" binary to query databases in Chromium-based browsers for potential data stealing.

WindowsProcess Creation
TA0006 · Credential AccessT1539 · Steal Web Session CookieT1555.003 · Credentials from Web BrowsersTA0009 · Collection+1
TropChaudMon Dec 19windows
Detectionhightest

SQLite Firefox Profile Data DB Access

Detect usage of the "sqlite" binary to query databases in Firefox and other Gecko-based browsers for potential data stealing.

WindowsProcess Creation
TA0006 · Credential AccessT1539 · Steal Web Session CookieTA0009 · CollectionT1005 · Data from Local System
François HubautFri Apr 08windows
Detectionhightest

Potential RDP Tunneling Via SSH

Execution of ssh.exe to perform data exfiltration and tunneling through RDP

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed Oct 12windows
Detectionhightest

Execution via stordiag.exe

Detects the use of stordiag.exe to execute schtasks.exe systeminfo.exe and fltmc.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Austin SongerThu Oct 21windows
Detectionhightest

Abused Debug Privilege by Arbitrary Parent Processes

Detection of unusual child processes by different system processes

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Semanur Guneysu+1Wed Oct 28windows
Detectionhightest

User Added To Highly Privileged Group

Detects addition of users to highly privileged groups via "Net" or "Add-LocalGroupMember".

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Nasreddine Bencherchali (Nextron Systems)Fri Feb 23windows
Detectionhightest

User Added to Remote Desktop Users Group

Detects addition of users to the local Remote Desktop Users group via "Net" or "Add-LocalGroupMember".

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0008 · Lateral MovementT1133 · External Remote Services+2
Florian Roth (Nextron Systems)Mon Dec 06windows
Detectionhightest

Phishing Pattern ISO in Archive

Detects cases in which an ISO files is opend within an archiver like 7Zip or Winrar, which is a sign of phishing as threat actors put small ISO files in archives as email attachments to bypass certain filters and protective measures (mark of web)

WindowsProcess Creation
TA0001 · Initial AccessT1566 · Phishing
Florian Roth (Nextron Systems)Tue Jun 07windows
Detectionhightest

Bad Opsec Defaults Sacrificial Processes With Improper Arguments

Detects attackers using tooling with bad opsec defaults. E.g. spawning a sacrificial process to inject a capability into the process without taking into account how the process is normally run. One trivial example of this is using rundll32.exe without arguments as a sacrificial process (default in CS, now highlighted by c2lint), running WerFault without arguments (Kraken - credit am0nsec), and other examples.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Oleg Kolesnikov invrep_de+3Fri Oct 23windows
Detectionhightest

Suspicious Child Process Created as System

Detection of child processes spawned with SYSTEM privileges by parents with LOCAL SERVICE or NETWORK SERVICE accounts

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.002 · Create Process with Token
Teymur Kheirkhabarov+2Sat Oct 26windows
Detectionhightest

Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image

Detects potential commandline obfuscation using unicode characters. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
François Hubaut+2Mon Sep 02windows
Detectionhighexperimental

Suspicious ClickFix/FileFix Execution Pattern

Detects suspicious execution patterns where users are tricked into running malicious commands via clipboard manipulation, either through the Windows Run dialog (ClickFix) or File Explorer address bar (FileFix). Attackers leverage social engineering campaigns—such as fake CAPTCHA challenges or urgent alerts—encouraging victims to paste clipboard contents, often executing mshta.exe, powershell.exe, or similar commands to infect systems.

WindowsProcess Creation
TA0002 · ExecutionT1204.001 · Malicious Linkattack.t1204.004
montysecurity+1Wed Nov 19windows
Detectionhighexperimental

Suspicious Explorer Process with Whitespace Padding - ClickFix/FileFix

Detects process creation with suspicious whitespace padding followed by a '#' character, which may indicate ClickFix or FileFix techniques used to conceal malicious commands from visual inspection. ClickFix and FileFix are social engineering attack techniques where adversaries distribute phishing documents or malicious links that deceive users into opening the Windows Run dialog box or File Explorer search bar. The victims are then instructed to paste commands from their clipboard, which contain extensive whitespace padding using various Unicode space characters to push the actual malicious command far to the right, effectively hiding it from immediate view.

WindowsProcess Creation
TA0002 · Executionattack.t1204.004TA0005 · Defense EvasionT1027.010 · Command Obfuscation
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 04windows
Detectionhightest

LOL-Binary Copied From System Directory

Detects a suspicious copy operation that tries to copy a known LOLBIN from system (System32, SysWOW64, WinSxS) directories to another on disk in order to bypass detections based on locations.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Nasreddine Bencherchali (Nextron Systems)Tue Aug 29windows
Detectionhighstable

Potential Crypto Mining Activity

Detects command line parameters or strings often used by crypto miners

WindowsProcess Creation
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26windows
Detectionhightest

Potential Data Exfiltration Activity Via CommandLine Tools

Detects the use of various CLI utilities exfiltrating data via web requests

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionhightest

Raccine Uninstall

Detects commands that indicate a Raccine removal from an end system. Raccine is a free ransomware protection tool.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Thu Jan 21windows
Detectionhighstable

Suspicious Double Extension File Execution

Detects suspicious use of an .exe extension after a non-executable file extension like .pdf.exe, a set of spaces or underlines to cloak the executable file in spear phishing campaigns

WindowsProcess Creation
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)+2Wed Jun 26windows
Detectionhightest

Suspicious Parent Double Extension File Execution

Detect execution of suspicious double extension files in ParentCommandLine

WindowsProcess Creation
TA0005 · Defense EvasionT1036.007 · Double File Extension
François Hubaut+1Fri Jan 06windows
Detectionhightest

Suspicious Download from Office Domain

Detects suspicious ways to download files from Microsoft domains that are used to store attachments in Emails or OneNote documents

WindowsProcess Creation
TA0011 · Command and ControlTA0042 · Resource DevelopmentT1105 · Ingress Tool TransferT1608 · Stage Capabilities
Florian Roth (Nextron Systems)+1Mon Dec 27windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 1

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 2

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 3

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 4

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

ETW Logging Tamper In .NET Processes Via CommandLine

Detects changes to environment variables related to ETW logging via the CommandLine. This could indicate potential adversaries stopping ETW providers recording loaded .NET assemblies.

WindowsProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defenses
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

ETW Trace Evasion Activity

Detects command line activity that tries to clear or disable any ETW trace log which could be a sign of logging evasion.

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562.006 · Indicator Blocking2016-04-002 · CAR 2016-04-002
@neu5ron+3Fri Mar 22windows
Detectionhighstable

Suspicious Eventlog Clearing or Configuration Change Activity

Detects the clearing or configuration tampering of EventLog using utilities such as "wevtutil", "powershell" and "wmic". This technique were seen used by threat actors and ransomware strains in order to evade defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.001 · Clear Windows Event LogsT1562.002 · Disable Windows Event Logging2016-04-002 · CAR 2016-04-002
Ecco+4Thu Sep 26windows
Detectionhightest

Potentially Suspicious Execution From Parent Process In Public Folder

Detects a potentially suspicious execution of a parent process located in the "\Users\Public" folder executing a child process containing references to shell or scripting binaries and commandlines.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1564 · Hide ArtifactsT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Fri Feb 25windows
Detectionhightest

Process Execution From A Potentially Suspicious Folder

Detects a potentially suspicious execution from an uncommon folder.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+1Wed Jan 16windows
Detectionhighexperimental

Suspicious FileFix Execution Pattern

Detects suspicious FileFix execution patterns where users are tricked into running malicious commands through browser file upload dialog manipulation. This attack typically begins when users visit malicious websites impersonating legitimate services or news platforms, which may display fake CAPTCHA challenges or direct instructions to open file explorer and paste clipboard content. The clipboard content usually contains commands that download and execute malware, such as information stealing tools.

WindowsProcess Creation
TA0002 · Executionattack.t1204.004
0xFustang+1Mon Nov 24windows