Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Trust Access Disable For VBApplications

Detects registry changes to Microsoft Office "AccessVBOM" to a value of "1" which disables trust access for VBA on the victim machine and lets attackers execute malicious macros without any Microsoft Office warnings.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Trent Liffick+1Fri May 22windows
Detectionhightest

Microsoft Office Protected View Disabled

Detects changes to Microsoft Office protected view registry keys with which the attacker disables this feature.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+1Tue Jun 08windows
Detectionhightest

Python Function Execution Security Warning Disabled In Excel - Registry

Detects changes to the registry value "PythonFunctionWarnings" that would prevent any warnings or alerts from showing when Python functions are about to be executed. Threat actors could run malicious code through the new Microsoft Excel feature that allows Python to run within the spreadsheet.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 23windows
Detectionhightest

Potential Persistence Via Outlook LoadMacroProviderOnBoot Setting

Detects the modification of Outlook setting "LoadMacroProviderOnBoot" which if enabled allows the automatic loading of any configured VBA project/module

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
Nasreddine Bencherchali (Nextron Systems)Mon Apr 05windows
Detectionhightest

Outlook Macro Execution Without Warning Setting Enabled

Detects the modification of Outlook security setting to allow unprompted execution of macros.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
@scoubimtlMon Apr 05windows
Detectionhightest

Outlook EnableUnsafeClientMailRules Setting Enabled - Registry

Detects an attacker trying to enable the outlook security setting "EnableUnsafeClientMailRules" which allows outlook to run applications or execute macros

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionhightest

Macro Enabled In A Potentially Suspicious Document

Detects registry changes to Office trust records where the path is located in a potentially suspicious location

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Jun 21windows
Detectionhightest

Uncommon Microsoft Office Trusted Location Added

Detects changes to registry keys related to "Trusted Location" of Microsoft Office where the path is set to something uncommon. Attackers might add additional trusted locations to avoid macro security restrictions.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Jun 21windows
Detectionhightest

Office Macros Warning Disabled

Detects registry changes to Microsoft Office "VBAWarning" to a value of "1" which enables the execution of all macros, whether signed or unsigned.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Trent Liffick+1Fri May 22windows
Detectionhightest

Potential Persistence Via App Paths Default Property

Detects changes to the "Default" property for keys located in the \Software\Microsoft\Windows\CurrentVersion\App Paths\ registry. Which might be used as a method of persistence The entries found under App Paths are used primarily for the following purposes. First, to map an application's executable file name to that file's fully qualified path. Second, to prepend information to the PATH environment variable on a per-application, per-process basis.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.012 · Image File Execution Options Injection
Nasreddine Bencherchali (Nextron Systems)Wed Aug 10windows
Detectionhightest

Potential Persistence Via AutodialDLL

Detects change the the "AutodialDLL" key which could be used as a persistence method to load custom DLL via the "ws2_32" library

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Wed Aug 10windows
Detectionhightest

Potential Persistence Via CHM Helper DLL

Detects when an attacker modifies the registry key "HtmlHelp Author" to achieve persistence

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionhighexperimental

COM Object Hijacking Via Modification Of Default System CLSID Default Value

Detects potential COM object hijacking via modification of default system CLSID.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
Nasreddine Bencherchali (Nextron Systems)Tue Jul 16windows
Detectionhightest

Potential PSFactoryBuffer COM Hijacking

Detects changes to the PSFactory COM InProcServer32 registry. This technique was used by RomCom to create persistence storing a malicious DLL.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
BlackBerry Threat Research and Intelligence TeamWed Jun 07windows
Detectionhightest

Potential Persistence Via GlobalFlags

Detects registry persistence technique using the GlobalFlags and SilentProcessExit keys

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1546.012 · Image File Execution Options Injection+1
Karneades+2Wed Apr 11windows
Detectionhightest

Potential Persistence Via LSA Extensions

Detects when an attacker modifies the "REG_MULTI_SZ" value named "Extensions" to include a custom DLL to achieve persistence via lsass. The "Extensions" list contains filenames of DLLs being automatically loaded by lsass.exe. Each DLL has its InitializeLsaExtension() method called after loading.

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionhightest

Potential Persistence Via Mpnotify

Detects when an attacker register a new SIP provider for persistence and defense evasion

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionhightest

Potential Persistence Via MyComputer Registry Keys

Detects modification to the "Default" value of the "MyComputer" key and subkeys to point to a custom binary that will be launched whenever the associated action is executed (see reference section for example)

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Aug 09windows
Detectionhightest

Potential Persistence Via DLLPathOverride

Detects when an attacker adds a new "DLLPathOverride" value to the "Natural Language" key in order to achieve persistence which will get invoked by "SearchIndexer.exe" process

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionhightest

Potential Persistence Via Outlook Home Page

Detects potential persistence activity via outlook home page. An attacker can set a home page to achieve code execution and persistence by editing the WebView registry keys.

WindowsRegistry Set
TA0005 · Defense EvasionTA0003 · PersistenceT1112 · Modify Registry
Tobias Michalski+2Wed Jun 09windows
Detectionhightest

Potential Persistence Via Outlook Today Page

Detects potential persistence activity via outlook today page. An attacker can set a custom page to execute arbitrary code and link to it via the registry values "URL" and "UserDefinedUrl".

WindowsRegistry Set
TA0005 · Defense EvasionTA0003 · PersistenceT1112 · Modify Registry
Tobias Michalski+2Thu Jun 10windows
Detectionhightest

Potential WerFault ReflectDebugger Registry Value Abuse

Detects potential WerFault "ReflectDebugger" registry value abuse for persistence.

WindowsRegistry Set
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
X__JuniorThu May 18windows
Detectionhightest

Suspicious Shim Database Patching Activity

Detects installation of new shim databases that try to patch sections of known processes for potential process injection or persistence.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.011 · Application Shimming
Nasreddine Bencherchali (Nextron Systems)Tue Aug 01windows
Detectionhightest

Potential Persistence Via Shim Database In Uncommon Location

Detects the installation of a new shim database where the file is located in a non-default location

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.011 · Application Shimming
Nasreddine Bencherchali (Nextron Systems)Tue Aug 01windows
Detectionhightest

Potential Persistence Via TypedPaths

Detects modification addition to the 'TypedPaths' key in the user or admin registry from a non standard application. Which might indicate persistence attempt

WindowsRegistry Set
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Mon Aug 22windows
Detectionhightest

Potential Persistence Via Excel Add-in - Registry

Detect potential persistence via the creation of an excel add-in (XLL) file to make it run automatically when Excel is started.

WindowsRegistry Set
TA0003 · PersistenceT1137.006 · Add-ins
François HubautSun Jan 15windows
Detectionhightest

Potential Attachment Manager Settings Associations Tamper

Detects tampering with attachment manager settings policies associations to lower the default file type risks (See reference for more information)

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Aug 01windows
Detectionhightest

Potential Attachment Manager Settings Attachments Tamper

Detects tampering with attachment manager settings policies attachments (See reference for more information)

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Aug 01windows
Detectionhighexperimental

Potential ClickFix Execution Pattern - Registry

Detects potential ClickFix malware execution patterns by monitoring registry modifications in RunMRU keys containing HTTP/HTTPS links. ClickFix is known to be distributed through phishing campaigns and uses techniques like clipboard hijacking and fake CAPTCHA pages. Through the fakecaptcha pages, the adversary tricks users into opening the Run dialog box and pasting clipboard-hijacked content, such as one-liners that execute remotely hosted malicious files or scripts.

WindowsRegistry Set
TA0002 · ExecutionT1204.001 · Malicious Link
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Mar 25windows
Detectionhighexperimental

Registry Modification for OCI DLL Redirection

Detects registry modifications related to 'OracleOciLib' and 'OracleOciLibPath' under 'MSDTC' settings. Threat actors may modify these registry keys to redirect the loading of 'oci.dll' to a malicious DLL, facilitating phantom DLL hijacking via the MSDTC service.

WindowsRegistry Set
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Sat Jan 24windows
Detectionhightest

PowerShell as a Service in Registry

Detects that a powershell code is written to the registry as a service.

WindowsRegistry Set
TA0002 · ExecutionT1569.002 · Service Execution
oscd.community+1Tue Oct 06windows
Detectionhightest

PowerShell Logging Disabled Via Registry Key Tampering

Detects changes to the registry for the currently logged-in user. In order to disable PowerShell module logging, script block logging or transcription and script execution logging

WindowsRegistry Set
TA0005 · Defense EvasionT1564.001 · Hidden Files and DirectoriesT1112 · Modify RegistryTA0003 · Persistence
François HubautSat Apr 02windows
Detectionhightest

Potential Provisioning Registry Key Abuse For Binary Proxy Execution - REG

Detects potential abuse of the provisioning registry key for indirect command execution through "Provlaunch.exe".

WindowsRegistry Set
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Swachchhanda Shrawan PoudelWed Aug 02windows
Detectionhightest

Suspicious Execution Of Renamed Sysinternals Tools - Registry

Detects the creation of the "accepteula" key related to the Sysinternals tools being created from executables with the wrong name (e.g. a renamed Sysinternals tool)

WindowsRegistry Set
TA0042 · Resource DevelopmentT1588.002 · Tool
Nasreddine Bencherchali (Nextron Systems)Wed Aug 24windows
Detectionhightest

Usage of Renamed Sysinternals Tools - RegistrySet

Detects non-sysinternals tools setting the "accepteula" key which normally is set on sysinternals tool execution

WindowsRegistry Set
TA0042 · Resource DevelopmentT1588.002 · Tool
Nasreddine Bencherchali (Nextron Systems)Wed Aug 24windows
Detectionhightest

Potentially Suspicious Command Executed Via Run Dialog Box - Registry

Detects execution of commands via the run dialog box on Windows by checking values of the "RunMRU" registry key. This technique was seen being abused by threat actors to deceive users into pasting and executing malicious commands, often disguised as CAPTCHA verification steps.

WindowsRegistry Set
TA0002 · ExecutionT1059.001 · PowerShell
Ahmed Farouk+1Fri Nov 01windows
Detectionhightest

Tamper With Sophos AV Registry Keys

Detects tamper attempts to sophos av functionality via registry key modification

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Sep 02windows
Detectionhightest

Hiding User Account Via SpecialAccounts Registry Key

Detects modifications to the registry key "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" where the value is set to "0" in order to hide user account from being listed on the logon screen.

WindowsRegistry Set
TA0005 · Defense EvasionT1564.002 · Hidden Users
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 12windows
Detectionhightest

Suspicious Printer Driver Empty Manufacturer

Detects a suspicious printer driver installation with an empty Manufacturer value

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574 · Hijack Execution Flow+1
Florian Roth (Nextron Systems)Wed Jul 01windows
Detectionhightest

Registry Persistence via Explorer Run Key

Detects a possible persistence mechanism using RUN key for Windows Explorer and pointing to a suspicious folder

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)+1Wed Jul 18windows
Detectionhighexperimental

New RUN Key Pointing to Suspicious Folder

Detects suspicious new RUN key element pointing to an executable in a suspicious folder

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)+3Sat Aug 25windows
Detectionhighexperimental

Suspicious Space Characters in RunMRU Registry Path - ClickFix

Detects the occurrence of numerous space characters in RunMRU registry paths, which may indicate execution via phishing lures using clickfix techniques to hide malicious commands in the Windows Run dialog box from naked eyes.

WindowsRegistry Set
TA0002 · Executionattack.t1204.004TA0005 · Defense EvasionT1027.010 · Command Obfuscation
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 04windows
Detectionhighexperimental

Suspicious Space Characters in TypedPaths Registry Path - FileFix

Detects the occurrence of numerous space characters in TypedPaths registry paths, which may indicate execution via phishing lures using file-fix techniques to hide malicious commands.

WindowsRegistry Set
TA0002 · Executionattack.t1204.004TA0005 · Defense EvasionT1027.010 · Command Obfuscation
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 04windows
Detectionhightest

Modify User Shell Folders Startup Value

Detect modification of the User Shell Folders registry values for Startup or Common Startup which could indicate persistence attempts. Attackers may modify User Shell Folders registry keys to point to malicious executables or scripts that will be executed during startup. This technique is often used to maintain persistence on a compromised system by ensuring that the malicious payload is executed automatically.

WindowsRegistry Set
TA0003 · PersistenceTA0004 · Privilege EscalationT1547.001 · Registry Run Keys / Startup Folder
François Hubaut+1Sat Oct 01windows
Detectionhightest

Suspicious Environment Variable Has Been Registered

Detects the creation of user-specific or system-wide environment variables via the registry. Which contains suspicious commands and strings

WindowsRegistry Set
TA0005 · Defense EvasionTA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Dec 20windows
Detectionhightest

Enable LM Hash Storage

Detects changes to the "NoLMHash" registry value in order to allow Windows to store LM Hashes. By setting this registry value to "0" (DWORD), Windows will be allowed to store a LAN manager hash of your password in Active Directory and local SAM databases.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Fri Dec 15windows
Detectionhightest

Scheduled TaskCache Change by Uncommon Program

Monitor the creation of a new key under 'TaskCache' when a new scheduled task is registered by a process that is not svchost.exe, which is suspicious

WindowsRegistry Set
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053 · Scheduled Task/Job+1
Syed HasanFri Jun 18windows
Detectionhightest

Potential Registry Persistence Attempt Via Windows Telemetry

Detects potential persistence behavior using the windows telemetry registry key. Windows telemetry makes use of the binary CompatTelRunner.exe to run a variety of commands and perform the actual telemetry collections. This binary was created to be easily extensible, and to that end, it relies on the registry to instruct on which commands to run. The problem is, it will run any arbitrary command without restriction of location or type.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Lednyov Alexey+2Fri Oct 16windows