Rule Library

Sigma Rules

334 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

Access To ADMIN$ Network Share

Detects access to ADMIN$ network share

Windowssecurity
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Florian Roth (Nextron Systems)Sat Mar 04windows
Detectionlowtest

Windows Event Auditing Disabled

Detects scenarios where system auditing (i.e.: Windows event log auditing) is disabled. This may be used in a scenario where an entity would want to bypass local logging to evade detection when Windows event logging is enabled and reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc". Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off specific GPO modifications - however, it is recommended to perform these modifications in Active Directory anyways.

Windowssecurity
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
@neu5ron+1Sun Nov 19windows
Detectionlowtest

External Disk Drive Or USB Storage Device Was Recognized By The System

Detects external disk drives or plugged-in USB devices.

Windowssecurity
T1091 · Replication Through Removable MediaT1200 · Hardware AdditionsTA0008 · Lateral MovementTA0001 · Initial Access
Keith WrightWed Nov 20windows
Detectionlowtest

Service Registry Key Read Access Request

Detects "read access" requests on the services registry key. Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Adversaries may use flaws in the permissions for Registry keys related to services to redirect from the originally specified executable to one that they control, in order to launch their own code when a service starts.

Windowssecurity
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Center for Threat Informed Defense (CTID) Summiting the Pyramid TeamThu Sep 28windows
Detectionlowtest

Unauthorized System Time Modification

Detect scenarios where a potentially unauthorized application or user is modifying the system time.

Windowssecurity
TA0005 · Defense EvasionT1070.006 · Timestomp
@neu5ronTue Feb 05windows
Detectionlowtest

Tap Driver Installation - Security

Detects the installation of a well-known TAP driver service. This could be a sign of potential preparation for data exfiltration using tunnelling techniques.

Windowssecurity
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Daniil Yugoslavskiy+2Thu Oct 24windows
Detectionlowtest

Local User Creation

Detects local user creation on Windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your Windows server logs and not on your DC logs.

Windowssecurity
TA0003 · PersistenceT1136.001 · Local Account
Patrick BareissThu Apr 18windows
Detectionlowtest

Active Directory Certificate Services Denied Certificate Enrollment Request

Detects denied requests by Active Directory Certificate Services. Example of these requests denial include issues with permissions on the certificate template or invalid signatures.

Windowssystem
TA0006 · Credential AccessTA0005 · Defense EvasionT1553.004 · Install Root Certificate
@serkinvaleryThu Mar 07windows
Detectionlowtest

No Suitable Encryption Key Found For Generating Kerberos Ticket

Detects errors when a target server doesn't have suitable keys for generating kerberos tickets. This issue can occur for example when a service uses a user account or a computer account that is configured for only DES encryption on a computer that is running Windows 7 which has DES encryption for Kerberos authentication disabled.

Windowssystem
TA0006 · Credential AccessT1558.003 · Kerberoasting
@serkinvaleryThu Mar 07windows
Detectionlowtest

Volume Shadow Copy Mount

Detects volume shadow copy mount via Windows event log

Windowssystem
TA0006 · Credential AccessT1003.002 · Security Account Manager
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectionlowtest

Windows Service Terminated With Error

Detects Windows services that got terminated for whatever reason

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionlowstable

Windows Defender Submit Sample Feature Disabled

Detects disabling of the "Automatic Sample Submission" feature of Windows Defender.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionlowtest

DNS Server Discovery Via LDAP Query

Detects DNS server discovery via LDAP query requests from uncommon applications

WindowsDNS Query
TA0007 · DiscoveryT1482 · Domain Trust Discovery
François HubautSat Aug 20windows
Detectionlowtest

DNS Query Request To OneLaunch Update Service

Detects DNS query requests to "update.onelaunch.com". This domain is associated with the OneLaunch adware application. When the OneLaunch application is installed it will attempt to get updates from this domain.

WindowsDNS Query
TA0006 · Credential AccessTA0009 · CollectionT1056 · Input Capture
Josh NickelsMon Feb 26windows
Detectionlowexperimental

DNS Query Request By QuickAssist.EXE

Detects DNS queries initiated by "QuickAssist.exe" to Microsoft Quick Assist primary endpoint that is used to establish a session.

WindowsDNS Query
TA0011 · Command and ControlTA0001 · Initial AccessTA0008 · Lateral MovementT1071.001 · Web Protocols+1
Muhammad FaisalThu Dec 19windows
Detectionlowtest

DNS Query To Ufile.io

Detects DNS queries to "ufile.io", which was seen abused by malware and threat actors as a method for data exfiltration

WindowsDNS Query
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
yatinwad+1Thu Jun 23windows
Detectionlowtest

Vulnerable Driver Load By Name

Detects the load of known vulnerable drivers via the file name of the drivers.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Mon Oct 03windows
Detectionlowexperimental

Suspicious File Access to Browser Credential Storage

Detects file access to browser credential storage paths by non-browser processes, which may indicate credential access attempts. Adversaries may attempt to access browser credential storage to extract sensitive information such as usernames and passwords or cookies. This behavior is often commonly observed in credential stealing malware.

Windowsfile_access
TA0006 · Credential AccessT1555.003 · Credentials from Web BrowsersTA0007 · DiscoveryT1217 · Browser Information Discovery
François Hubaut+3Thu May 22windows
Detectionlowtest

TeamViewer Log File Deleted

Detects the deletion of the TeamViewer log files which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletion
François HubautSun Jan 16windows
Detectionlowexperimental

Suspicious Deno File Written from Remote Source

Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL. This behavior may indicate an attempt to execute remotely hosted, potentially malicious files through deno.

WindowsFile Event
TA0002 · ExecutionT1204 · User ExecutionT1059.007 · JavaScriptTA0011 · Command and Control+1
Josh Nickels+1Thu May 22windows
Detectionlowtest

Dynamic CSharp Compile Artefact

When C# is compiled dynamically, a .cmdline file will be created as a part of the process. Certain processes are not typically observed compiling C# code, but can do so without touching disk. This can be used to unpack a payload for execution

WindowsFile Event
TA0005 · Defense EvasionT1027.004 · Compile After Delivery
François HubautSun Jan 09windows
Detectionlowtest

NTDS.DIT Created

Detects creation of a file named "ntds.dit" (Active Directory Database)

WindowsFile Event
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionlowtest

Office Macro File Creation

Detects the creation of a new office macro files on the systems

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Nasreddine Bencherchali (Nextron Systems)Sun Jan 23windows
Detectionlowtest

Office Macro File Download

Detects the creation of a new office macro files on the system via an application (browser, mail client). This can help identify potential malicious activity, such as the download of macro-enabled documents that could be used for exploitation.

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Nasreddine Bencherchali (Nextron Systems)Sun Jan 23windows
Detectionlowtest

PowerShell Script Dropped Via PowerShell.EXE

Detects PowerShell creating a PowerShell file (.ps1). While often times this behavior is benign, sometimes it can be a sign of a dropper script trying to achieve persistence.

WindowsFile Event
TA0003 · Persistence
François HubautTue May 09windows
Detectionlowtest

PowerShell Module File Created

Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc.

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionlowtest

Remote Access Tool - ScreenConnect Temporary File

Detects the creation of files in a specific location by ScreenConnect RMM. ScreenConnect has feature to remotely execute binaries on a target machine. These binaries will be dropped to ":\Users\<username>\Documents\ConnectWiseControl\Temp\" before execution.

WindowsFile Event
TA0002 · ExecutionT1059.003 · Windows Command Shell
Ali AlwashaliTue Oct 10windows
Detectionlowtest

PsExec Service File Creation

Detects default PsExec service filename which indicates PsExec service installation and execution

WindowsFile Event
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Thomas PatzkeMon Jun 12windows
Detectionlowtest

Potential Azure Browser SSO Abuse

Detects abusing Azure Browser SSO by requesting OAuth 2.0 refresh tokens for an Azure-AD-authenticated Windows user (i.e. the machine is joined to Azure AD and a user logs in with their Azure AD account) wanting to perform SSO authentication in the browser. An attacker can use this to authenticate to Azure AD in a browser as that user.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Den IuzvykWed Jul 15windows
Detectionlowtest

Load Of RstrtMgr.DLL By An Uncommon Process

Detects the load of RstrtMgr DLL (Restart Manager) by an uncommon process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows. It could also be used for anti-analysis purposes by shut downing specific processes.

WindowsImage Load (DLL)
TA0040 · ImpactTA0005 · Defense EvasionT1486 · Data Encrypted for ImpactT1562.001 · Disable or Modify Tools
Luc GénauxTue Nov 28windows
Detectionlowtest

Potential 7za.DLL Sideloading

Detects potential DLL sideloading of "7za.dll"

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__JuniorFri Jun 09windows
Detectionlowtest

Python Image Load By Non-Python Process

Detects the image load of "Python Core" by a non-Python process. This might be indicative of a execution of executable that has been bundled from Python code. Various tools like Py2Exe, PyInstaller, and cx_Freeze are used to bundle Python code into standalone executables. Threat actors often use these tools to bundle malicious Python scripts into executables, sometimes to obfuscate the code or to bypass security measures.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1027.002 · Software Packing
Patrick St. John+1Sun May 03windows
Detectionlowtest

Network Connection Initiated To Mega.nz

Detects a network connection initiated by a binary to "api.mega.co.nz". Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.

WindowsNetwork Connection
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Florian Roth (Nextron Systems)Mon Dec 06windows
Detectionlowtest

Potentially Suspicious Network Connection To Notion API

Detects a non-browser process communicating with the Notion API. This could indicate potential use of a covert C2 channel such as "OffensiveNotion C2"

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web Service
Gavin KnappWed May 03windows
Detectionlowtest

Remote PowerShell Session (PS Classic)

Detects remote PowerShell sessions

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShellTA0008 · Lateral MovementT1021.006 · Windows Remote Management
Roberto Rodriguez (Cyb3rWard0g)Sat Aug 10windows
Detectionlowtest

Renamed Powershell Under Powershell Channel

Detects a renamed Powershell execution, which is a common technique used to circumvent security controls and bypass detection logic that's dependent on process names and process paths.

WindowsPowerShell Classic
TA0002 · ExecutionTA0005 · Defense EvasionT1059.001 · PowerShellT1036.003 · Rename System Utilities
Harish Segar+1Mon Jun 29windows
Detectionlowtest

Use Get-NetTCPConnection

Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.

WindowsPowerShell Classic
TA0007 · DiscoveryT1049 · System Network Connections Discovery
François HubautFri Dec 10windows
Detectionlowtest

AD Groups Or Users Enumeration Using PowerShell - PoshModule

Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.

WindowsPowerShell Module
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionlowtest

Use Get-NetTCPConnection - PowerShell Module

Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.

WindowsPowerShell Module
TA0007 · DiscoveryT1049 · System Network Connections Discovery
François HubautFri Dec 10windows
Detectionlowtest

Suspicious Get Local Groups Information

Detects the use of PowerShell modules and cmdlets to gather local group information. Adversaries may use local system permission groups to determine which groups exist and which users belong to a particular group such as the local administrators group.

WindowsPowerShell Module
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautSun Dec 12windows
Detectionlowtest

Suspicious Get Information for SMB Share - PowerShell Module

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network.

WindowsPowerShell Module
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionlowtest

Active Directory Computers Enumeration With Get-AdComputer

Detects usage of the "Get-AdComputer" to enumerate Computers or properties within Active Directory.

WindowsPowerShell Script
TA0007 · DiscoveryT1018 · Remote System DiscoveryT1087.002 · Domain Account
François HubautThu Mar 17windows
Detectionlowtest

Active Directory Group Enumeration With Get-AdGroup

Detects usage of the "Get-AdGroup" cmdlet to enumerate Groups within Active Directory

WindowsPowerShell Script
TA0007 · DiscoveryT1069.002 · Domain Groups
François HubautThu Mar 17windows
Detectionlowtest

Automated Collection Bookmarks Using Get-ChildItem PowerShell

Adversaries may enumerate browser bookmarks to learn more about compromised hosts. Browser bookmarks may reveal personal information about users (ex: banking sites, interests, social media, etc.) as well as details about internal network resources such as servers, tools/dashboards, or other related infrastructure.

WindowsPowerShell Script
TA0007 · DiscoveryT1217 · Browser Information Discovery
François HubautMon Dec 13windows
Detectionlowexperimental

DMSA Link Attributes Modified

Detects modification of dMSA link attributes (msDS-ManagedAccountPrecededByLink) via PowerShell scripts. This command line pattern could be an indicator an attempt to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0001 · Initial Access+2
Swachchhanda Shrawan Poudel (Nextron Systems)Sat May 24windows
Detectionlowtest

PowerShell Script With File Upload Capabilities

Detects PowerShell scripts leveraging the "Invoke-WebRequest" cmdlet to send data via either "PUT" or "POST" method.

WindowsPowerShell Script
TA0010 · ExfiltrationT1020 · Automated Exfiltration
François HubautFri Jan 07windows
Detectionlowtest

PowerShell Script Change Permission Via Set-Acl - PsScript

Detects PowerShell scripts set ACL to of a file or a folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionlowtest

AD Groups Or Users Enumeration Using PowerShell - ScriptBlock

Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.

WindowsPowerShell Script
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows