Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Taskmgr as LOCAL_SYSTEM

Detects the creation of taskmgr.exe process in context of LOCAL_SYSTEM

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)Sun Mar 18windows
Detectionhightest

Suspicious TSCON Start as SYSTEM

Detects a tscon.exe start as LOCAL SYSTEM

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sat Mar 17windows
Detectionhightest

Suspicious RDP Redirect Using TSCON

Detects a suspicious RDP session redirect using tscon.exe

WindowsProcess Creation
TA0008 · Lateral MovementT1563.002 · RDP HijackingT1021.001 · Remote Desktop Protocol2013-07-002 · CAR 2013-07-002
Florian Roth (Nextron Systems)Sat Mar 17windows
Detectionhightest

UAC Bypass Using ChangePK and SLUI

Detects an UAC bypass that uses changepk.exe and slui.exe (UACMe 61)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

UAC Bypass Using Disk Cleanup

Detects the pattern of UAC Bypass using scheduled tasks and variable expansion of cleanmgr.exe (UACMe 34)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

Bypass UAC via CMSTP

Detect commandline usage of Microsoft Connection Manager Profile Installer (cmstp.exe) to install specially formatted local .INF files

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account ControlT1218.003 · CMSTP
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhighstable

CMSTP UAC Bypass via COM Object Access

Detects UAC Bypass Attempt Using Microsoft Connection Manager Profile Installer Autoelevate-capable COM Objects (e.g. UACMe ID of 41, 43, 58 or 65)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control+3
Nik Seetharaman+1Wed Jul 31windows
Detectionhightest

UAC Bypass Tools Using ComputerDefaults

Detects tools such as UACMe used to bypass UAC with computerdefaults.exe (UACMe 59)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Tue Aug 31windows
Detectionhightest

UAC Bypass Using Consent and Comctl32 - Process

Detects the pattern of UAC Bypass using consent.exe and comctl32.dll (UACMe 22)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

UAC Bypass Using DismHost

Detects the pattern of UAC Bypass using DismHost DLL hijacking (UACMe 63)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using Event Viewer RecentViews

Detects the pattern of UAC Bypass using Event Viewer RecentViews

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Nov 22windows
Detectionhightest

Bypass UAC via Fodhelper.exe

Identifies use of Fodhelper.exe to bypass User Account Control. Adversaries use this technique to execute privileged processes.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhightest

UAC Bypass via ICMLuaUtil

Detects the pattern of UAC Bypass using ICMLuaUtil Elevated COM interface

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Florian Roth (Nextron Systems)+1Tue Sep 13windows
Detectionhightest

UAC Bypass Using IDiagnostic Profile

Detects the "IDiagnosticProfileUAC" UAC bypass technique

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Nasreddine Bencherchali (Nextron Systems)Sun Jul 03windows
Detectionhightest

UAC Bypass Using IEInstal - Process

Detects the pattern of UAC Bypass using IEInstal.exe (UACMe 64)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using MSConfig Token Modification - Process

Detects the pattern of UAC Bypass using a msconfig GUI hack (UACMe 55)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using NTFS Reparse Point - Process

Detects the pattern of UAC Bypass using NTFS reparse point and wusa.exe DLL hijacking (UACMe 36)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using PkgMgr and DISM

Detects the pattern of UAC Bypass using pkgmgr.exe and dism.exe (UACMe 23)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

UAC Bypass Abusing Winsat Path Parsing - Process

Detects the pattern of UAC Bypass using a path parsing issue in winsat.exe (UACMe 52)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using Windows Media Player - Process

Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll (UACMe 32)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

Bypass UAC via WSReset.exe

Detects use of WSReset.exe to bypass User Account Control (UAC). Adversaries use this technique to execute privileged processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account Control
E.M. Anhaus (originally from Atomic Blue Detections+3Thu Oct 24windows
Detectionhightest

UAC Bypass WSReset

Detects the pattern of UAC Bypass via WSReset usable by default sysmon-config

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

Suspicious UltraVNC Execution

Detects suspicious UltraVNC command line flag combination that indicate a auto reconnect upon execution, e.g. startup (as seen being used by Gamaredon threat group)

WindowsProcess Creation
TA0008 · Lateral MovementG0047 · G0047T1021.005 · VNC
Bhabesh RajFri Mar 04windows
Detectionhightest

Uninstall Crowdstrike Falcon Sensor

Adversaries may disable security tools to avoid possible detection of their tools and activities by uninstalling Crowdstrike Falcon

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautMon Jul 12windows
Detectionhighexperimental

User Shell Folders Registry Modification via CommandLine

Detects modifications to User Shell Folders registry values via reg.exe or PowerShell, which could indicate persistence attempts. Attackers may modify User Shell Folders registry values to point to malicious executables or scripts that will be executed during startup. This technique is often used to maintain persistence on a compromised system by ensuring that malicious payloads are executed automatically.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1547.001 · Registry Run Keys / Startup FolderTA0005 · Defense Evasion+1
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jan 05windows
Detectionhightest

Uncommon Userinit Child Process

Detects uncommon "userinit.exe" child processes, which could be a sign of uncommon shells or login scripts used for persistence.

WindowsProcess Creation
TA0004 · Privilege EscalationT1037.001 · Logon Script (Windows)TA0003 · Persistence
Tom Ueltschi+1Sat Jan 12windows
Detectionhightest

Suspicious Persistence Via VMwareToolBoxCmd.EXE VM State Change Script

Detects execution of the "VMwareToolBoxCmd.exe" with the "script" and "set" flag to setup a specific script that's located in a potentially suspicious location to run for a specific VM state

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Jun 14windows
Detectionhightest

VMToolsd Suspicious Child Process

Detects suspicious child process creations of VMware Tools process which may indicate persistence setup

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
bohops+1Fri Oct 08windows
Detectionhightest

Renamed Visual Studio Code Tunnel Execution

Detects renamed Visual Studio Code tunnel execution. Attackers can abuse this functionality to establish a C2 channel

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1219 · Remote Access Software
Nasreddine Bencherchali (Nextron Systems)Thu Sep 28windows
Detectionhighexperimental

Vulnerable Driver Blocklist Registry Tampering Via CommandLine

Detects tampering of the Vulnerable Driver Blocklist registry via command line tools such as PowerShell or REG.EXE. The Vulnerable Driver Blocklist is a security feature that helps prevent the loading of known vulnerable drivers. Disabling this feature may indicate an attempt to bypass security controls, often targeted by threat actors to facilitate the installation of malicious or vulnerable drivers, particularly in scenarios involving Endpoint Detection and Response

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jan 26windows
Detectionhightest

Use of W32tm as Timer

When configured with suitable command line arguments, w32tm can act as a delay mechanism

WindowsProcess Creation
TA0007 · DiscoveryT1124 · System Time Discovery
François HubautSun Sep 25windows
Detectionhightest

Wab Execution From Non Default Location

Detects execution of wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) from non default locations as seen with bumblebee activity

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionhightest

Wab/Wabmig Unusual Parent Or Child Processes

Detects unusual parent or children of the wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) processes as seen being used with bumblebee activity

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionhightest

All Backups Deleted Via Wbadmin.EXE

Detects the deletion of all backups or system state backups via "wbadmin.exe". This technique is used by numerous ransomware families and actors. This may only be successful on server platforms that have Windows Backup enabled.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
François Hubaut+1Mon Dec 13windows
Detectionhightest

Sensitive File Dump Via Wbadmin.EXE

Detects the dump of highly sensitive files such as "NTDS.DIT" and "SECURITY" hive. Attackers can leverage the "wbadmin" utility in order to dump sensitive files that might contain credential or sensitive information.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionhightest

Sensitive File Recovery From Backup Via Wbadmin.EXE

Detects the dump of highly sensitive files such as "NTDS.DIT" and "SECURITY" hive. Attackers can leverage the "wbadmin" utility in order to dump sensitive files that might contain credential or sensitive information.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionhightest

Chopper Webshell Process Pattern

Detects patterns found in process executions cause by China Chopper like tiny (ASPX) webshells

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)+1Sat Oct 01windows
Detectionhightest

Webshell Hacking Activity Patterns

Detects certain parent child patterns found in cases in which a web shell is used to perform certain credential dumping or exfiltration activities on a compromised system

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)Thu Mar 17windows
Detectionhightest

Webshell Detection With Command Line Keywords

Detects certain command line parameters often used during reconnaissance activity via web shells

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)+5Sun Jan 01windows
Detectionhightest

Suspicious Process By Web Server Process

Detects potentially suspicious processes being spawned by a web server process which could be the result of a successfully placed web shell or exploitation

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1505.003 · Web ShellT1190 · Exploit Public-Facing Application
Thomas Patzke+4Wed Jan 16windows
Detectionhightest

Webshell Tool Reconnaissance Activity

Detects processes spawned from web servers (PHP, Tomcat, IIS, etc.) that perform reconnaissance looking for the existence of popular scripting tools (perl, python, wget) on the system via the help commands

WindowsProcess Creation
TA0003 · PersistenceT1505.003 · Web Shell
Cian Heasley+1Wed Jul 22windows
Detectionhightest

Potential Credential Dumping Via WER

Detects potential credential dumping via Windows Error Reporting LSASS Shtinkering technique which uses the Windows Error Reporting to dump lsass

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
@pbssubhash+1Thu Dec 08windows
Detectionhighexperimental

PPL Tampering Via WerFaultSecure

Detects potential abuse of WerFaultSecure.exe to dump Protected Process Light (PPL) processes like LSASS or to freeze security solutions (EDR/antivirus). This technique is used by tools such as EDR-Freeze and WSASS to bypass PPL protections and access sensitive information or disable security software. Distinct command line patterns help identify the specific tool: - WSASS usage typically shows: "WSASS.exe WerFaultSecure.exe [PID]" in ParentCommandLine - EDR-Freeze usage typically shows: "EDR-Freeze_[version].exe [PID] [timeout]" in ParentCommandLine Legitimate debugging operations using WerFaultSecure are rare in production environments and should be investigated.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsTA0006 · Credential AccessT1003.001 · LSASS Memory
Jason (https://github.com/0xbcf)Tue Sep 23windows
Detectionhightest

Suspicious Child Process Of Wermgr.EXE

Detects suspicious Windows Error Reporting manager (wermgr.exe) child process

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process InjectionT1036 · Masquerading
Florian Roth (Nextron Systems)Fri Oct 14windows
Detectionhightest

Suspicious Execution Location Of Wermgr.EXE

Detects suspicious Windows Error Reporting manager (wermgr.exe) execution location.

WindowsProcess Creation
TA0002 · Execution
Florian Roth (Nextron Systems)Fri Oct 14windows
Detectionhightest

Suspicious File Download From IP Via Wget.EXE

Detects potentially suspicious file downloads directly from IP addresses using Wget.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionhightest

Suspicious File Download From File Sharing Domain Via Wget.EXE

Detects potentially suspicious file downloads from file sharing domains using wget.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionhightest

Suspicious File Download From IP Via Wget.EXE - Paths

Detects potentially suspicious file downloads directly from IP addresses and stored in suspicious locations using Wget.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Feb 23windows