Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

ProcessHacker Privilege Elevation

Detects a ProcessHacker tool that elevated privileges to a very high level

Windowssystem
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1543.003 · Windows Service+1
Florian Roth (Nextron Systems)Thu May 27windows
Detectionhightest

Sliver C2 Default Service Installation

Detects known malicious service installation that appear in cases in which a Sliver implants execute the PsExec commands

Windowssystem
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1543.003 · Windows Service+1
Florian Roth (Nextron Systems)+1Thu Aug 25windows
Detectionhightest

Service Installed By Unusual Client - System

Detects a service installed by a client which has PID 0 or whose parent has PID 0

Windowssystem
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Tim Rauch+1Thu Sep 15windows
Detectionhightest

Suspicious Service Installation

Detects suspicious service installation commands

Windowssystem
TA0003 · PersistenceTA0004 · Privilege Escalation2013-09-005 · CAR 2013-09-005T1543.003 · Windows Service
Martin Mueller+1Fri Mar 18windows
Detectionhightest

Important Windows Service Terminated With Error

Detects important or interesting Windows services that got terminated for whatever reason

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhightest

Important Windows Service Terminated Unexpectedly

Detects important or interesting Windows services that got terminated unexpectedly.

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhightest

RTCore Suspicious Service Installation

Detects the installation of RTCore service. Which could be an indication of Micro-Star MSI Afterburner vulnerable driver abuse

Windowssystem
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Aug 30windows
Detectionhightest

Service Installation with Suspicious Folder Pattern

Detects service installation with suspicious folder patterns

Windowssystem
TA0003 · PersistenceTA0004 · Privilege Escalation2013-09-005 · CAR 2013-09-005T1543.003 · Windows Service
Martin MuellerFri Mar 18windows
Detectionhightest

Suspicious Service Installation Script

Detects suspicious service installation scripts

Windowssystem
TA0003 · PersistenceTA0004 · Privilege Escalation2013-09-005 · CAR 2013-09-005T1543.003 · Windows Service
Martin MuellerFri Mar 18windows
Detectionhightest

Important Scheduled Task Deleted

Detects when adversaries try to stop system services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities

Windowstaskscheduler
TA0040 · ImpactT1489 · Service Stop
François HubautFri Jan 13windows
Detectionhightest

Ngrok Usage with Remote Desktop Service

Detects cases in which ngrok, a reverse proxy tool, forwards events to the local RDP port, which could be a sign of malicious behaviour

Windowsterminalservices-localsessionmanager
TA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)Fri Apr 29windows
Detectionhightest

Mimikatz Use

This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)

Windows
S0002 · MimikatzTA0008 · Lateral MovementTA0006 · Credential Access2013-07-001 · CAR 2013-07-001+5
Florian Roth (Nextron Systems)+1Tue Jan 10windows
Detectionhighstable

Windows Defender Grace Period Expired

Detects the expiration of the grace period of Windows Defender. This means protection against viruses, spyware, and other potentially unwanted software is disabled.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

LSASS Access Detected via Attack Surface Reduction

Detects Access to LSASS Process

Windowswindefend
TA0006 · Credential AccessT1003.001 · LSASS Memory
Markus NeisSun Aug 26windows
Detectionhightest

PSExec and WMI Process Creations Block

Detects blocking of process creations originating from PSExec and WMI commands

Windowswindefend
TA0002 · ExecutionTA0008 · Lateral MovementT1047 · Windows Management InstrumentationT1569.002 · Service Execution
Bhabesh RajTue Jul 14windows
Detectionhightest

Windows Defender Exploit Guard Tamper

Detects when someone is adding or removing applications or folders from exploit guard "ProtectedFolders" or "AllowedApplications"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhighstable

Windows Defender Malware And PUA Scanning Disabled

Detects disabling of the Windows Defender feature of scanning for malware and other potentially unwanted software

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhighstable

Windows Defender AMSI Trigger Detected

Detects triggering of AMSI by Windows Defender.

Windowswindefend
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Bhabesh RajMon Sep 14windows
Detectionhighstable

Windows Defender Real-time Protection Disabled

Detects disabling of Windows Defender Real-time Protection. As this event doesn't contain a lot of information on who initiated this action you might want to reduce it to a "medium" level if this occurs too many times in your environment

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

Win Defender Restored Quarantine File

Detects the restoration of files from the defender quarantine

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Windows Defender Configuration Changes

Detects suspicious changes to the Windows Defender configuration

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Microsoft Defender Tamper Protection Trigger

Detects blocked attempts to change any of Defender's settings such as "Real Time Monitoring" and "Behavior Monitoring"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Bhabesh Raj+1Mon Jul 05windows
Detectionhighstable

Windows Defender Threat Detected

Detects actions taken by Windows Defender malware detection engines

Windowswindefend
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Ján TrenčanskýTue Jul 28windows
Detectionhighstable

Windows Defender Virus Scanning Feature Disabled

Detects disabling of the Windows Defender virus scanning feature

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

HackTool - CACTUSTORCH Remote Thread Creation

Detects remote thread creation from CACTUSTORCH as described in references.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1055.012 · Process Hollowing+3
Thomas PatzkeFri Feb 01windows
Detectionhightest

HackTool - Potential CobaltStrike Process Injection

Detects a potential remote threat creation with certain characteristics which are typical for Cobalt Strike beacons

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.001 · Dynamic-link Library Injection
Olaf Hartong+3Fri Nov 30windows
Detectionhightest

Remote Thread Created In KeePass.EXE

Detects remote thread creation in "KeePass.exe" which could indicates potential password dumping activity

WindowsRemote Thread Creation
TA0006 · Credential AccessT1555.005 · Password Managers
Timon HackenjosFri Apr 22windows
Detectionhightest

Remote Thread Creation In Mstsc.Exe From Suspicious Location

Detects remote thread creation in the "mstsc.exe" process by a process located in a potentially suspicious location. This technique is often used by attackers in order to hook some APIs used by DLLs loaded by "mstsc.exe" during RDP authentications in order to steal credentials.

WindowsRemote Thread Creation
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Fri Jul 28windows
Detectionhightest

Potential Credential Dumping Attempt Via PowerShell Remote Thread

Detects remote thread creation by PowerShell processes into "lsass.exe"

WindowsRemote Thread Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
oscd.community+1Tue Oct 06windows
Detectionhighstable

Password Dumper Remote Thread in LSASS

Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundreds of events.

WindowsRemote Thread Creation
TA0006 · Credential AccessS0005 · S0005T1003.001 · LSASS Memory
Thomas PatzkeSun Feb 19windows
Detectionhightest

Rare Remote Thread Creation By Uncommon Source Image

Detects uncommon processes creating remote threads.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Perez Diego+1Sun Oct 27windows
Detectionhightest

Remote Thread Creation Ttdinject.exe Proxy

Detects a remote thread creation of Ttdinject.exe used as proxy

WindowsRemote Thread Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
François HubautMon May 16windows
Detectionhightest

Suspicious File Download From File Sharing Websites - File Stream

Detects the download of suspicious file type from a well-known file and paste sharing domain

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionhightest

HackTool Named File Stream Created

Detects the creation of a named file stream with the imphash of a well-known hack tool

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionhightest

Exports Registry Key To an Alternate Data Stream

Exports the target Registry key and hides it in the specified alternate data stream.

WindowsAlternate Data Stream
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Oddvar Moe+2Wed Oct 07windows
Detectionhightest

Unusual File Download from Direct IP Address

Detects the download of suspicious file type from URLs with IP

WindowsAlternate Data Stream
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Nasreddine Bencherchali (Nextron Systems)+1Wed Sep 07windows
Detectionhightest

Potential Suspicious Winget Package Installation

Detects potential suspicious winget package installation from a suspicious source.

WindowsAlternate Data Stream
TA0005 · Defense EvasionTA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionhightest

Potentially Suspicious File Download From ZIP TLD

Detects the download of a file with a potentially suspicious extension from a .zip top level domain.

WindowsAlternate Data Stream
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Thu May 18windows
Detectionhightest

DNS Query for Anonfiles.com Domain - Sysmon

Detects DNS queries for "anonfiles.com", which is an anonymous file upload platform often used for malicious purposes

WindowsDNS Query
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Martin MuellerFri Jul 15windows
Detectionhighexperimental

DNS Query by Finger Utility

Detects DNS queries made by the finger utility, which can be abused by threat actors to retrieve remote commands for execution on Windows devices. In one ClickFix malware campaign, adversaries leveraged the finger protocol to fetch commands from a remote server. Since the finger utility is not commonly used in modern Windows environments, its presence already raises suspicion. Investigating such DNS queries can also help identify potential malicious infrastructure used by threat actors for command and control (C2) communication.

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNSTA0002 · ExecutionT1059.003 · Windows Command Shell
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Nov 19windows
Detectionhightest

DNS HybridConnectionManager Service Bus

Detects Azure Hybrid Connection Manager services querying the Azure service bus service

WindowsDNS Query
TA0003 · PersistenceT1554 · Compromise Host Software Binary
Roberto Rodriguez (Cyb3rWard0g)+1Mon Apr 12windows
Detectionhighexperimental

Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing

Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.

WindowsDNS Query
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20windows
Detectionhightest

DNS Query Tor .Onion Address - Sysmon

Detects DNS queries to an ".onion" address related to Tor routing networks

WindowsDNS Query
TA0011 · Command and ControlT1090.003 · Multi-hop Proxy
François HubautSun Feb 20windows
Detectionhightest

Malicious Driver Load

Detects loading of known malicious drivers via their hash.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows
Detectionhightest

PUA - Process Hacker Driver Load

Detects driver load of the Process Hacker tool

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege Escalationcve.2021-21551T1543 · Create or Modify System Process
Florian Roth (Nextron Systems)Wed Nov 16windows
Detectionhightest

Driver Load From A Temporary Directory

Detects a driver load from a temporary directory

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Florian Roth (Nextron Systems)Sun Feb 12windows
Detectionhightest

Vulnerable Driver Load

Detects loading of known vulnerable drivers via their hash.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows
Detectionhightest

Vulnerable HackSys Extreme Vulnerable Driver Load

Detects the load of HackSys Extreme Vulnerable Driver which is an intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level and often abused by threat actors

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows