Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Anydesk Temporary Artefact

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautFri Feb 11windows
Detectionmediumtest

Assembly DLL Creation Via AspNetCompiler

Detects the creation of new DLL assembly files by "aspnet_compiler.exe", which could be a sign of "aspnet_compiler" abuse to proxy execution through a build provider.

WindowsFile Event
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Aug 14windows
Detectionmediumexperimental

Potentially Suspicious File Creation by OpenEDR's ITSMService

Detects the creation of potentially suspicious files by OpenEDR's ITSMService process. The ITSMService is responsible for remote management operations and can create files on the system through the Process Explorer or file management features. While legitimate for IT operations, creation of executable or script files could indicate unauthorized file uploads, data staging, or malicious file deployment.

WindowsFile Event
TA0011 · Command and ControlT1105 · Ingress Tool TransferTA0008 · Lateral MovementT1570 · Lateral Tool Transfer+1
kostastsaleThu Feb 19windows
Detectionmediumtest

EVTX Created In Uncommon Location

Detects the creation of new files with the ".evtx" extension in non-common or non-standard location. This could indicate tampering with default EVTX locations in order to evade security controls or simply exfiltration of event log to search for sensitive information within. Note that backup software and legitimate administrator might perform similar actions during troubleshooting.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
D3F7A5105Mon Jan 02windows
Detectionmediumtest

Creation Of Non-Existent System DLL

Detects creation of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes. Phantom DLL hijacking involves placing malicious DLLs with names of non-existent system binaries in locations where legitimate applications may search for them, leading to execution of the malicious DLLs. Thus, the creation of such DLLs may indicate preparation for phantom DLL hijacking attacks.

WindowsFile Event
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Thu Dec 01windows
Detectionmediumtest

New Custom Shim Database Created

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backward compatibility of software as the operating system codebase changes over time.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
François Hubaut+1Wed Dec 29windows
Detectionmediumtest

Suspicious Screensaver Binary File Creation

Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.002 · Screensaver
François HubautWed Dec 29windows
Detectionmediumtest

Files With System DLL Name In Unsuspected Locations

Detects the creation of a file with the ".dll" extension that has the name of a System DLL in uncommon or unsuspected locations. (Outisde of "System32", "SysWOW64", etc.). It is highly recommended to perform an initial baseline before using this rule in production.

WindowsFile Event
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionmediumtest

Files With System Process Name In Unsuspected Locations

Detects the creation of an executable with a system process name in folders other than the system ones (System32, SysWOW64, etc.). It is highly recommended to perform an initial baseline before using this rule in production.

WindowsFile Event
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Sander Wiebing+2Tue May 26windows
Detectionmediumtest

CSExec Service File Creation

Detects default CSExec service filename which indicates CSExec service installation and execution

WindowsFile Event
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Nasreddine Bencherchali (Nextron Systems)Fri Aug 04windows
Detectionmediumtest

Desktop.INI Created by Uncommon Process

Detects unusual processes accessing desktop.ini, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
Maxime Thiebaut+1Thu Mar 19windows
Detectionmediumtest

Potentially Suspicious DMP/HDMP File Creation

Detects the creation of a file with the ".dmp"/".hdmp" extension by a shell or scripting application such as "cmd", "powershell", etc. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 07windows
Detectionmediumtest

Potential Persistence Attempt Via ErrorHandler.Cmd

Detects creation of a file named "ErrorHandler.cmd" in the "C:\WINDOWS\Setup\Scripts\" directory which could be used as a method of persistence The content of C:\WINDOWS\Setup\Scripts\ErrorHandler.cmd is read whenever some tools under C:\WINDOWS\System32\oobe\ (e.g. Setup.exe) fail to run for any reason.

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Aug 09windows
Detectionmediumtest

Suspicious File Drop by Exchange

Detects suspicious file type dropped by an Exchange component in IIS

WindowsFile Event
TA0003 · PersistenceT1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessT1505.003 · Web Shell
Florian Roth (Nextron Systems)Tue Oct 04windows
Detectionmediumtest

GoToAssist Temporary Installation Artefact

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautSun Feb 13windows
Detectionmediumtest

Potential Initial Access via DLL Search Order Hijacking

Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious module via DLL search order hijacking.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1566 · PhishingT1566.001 · Spearphishing Attachment+4
Tim Rauch+1Fri Oct 21windows
Detectionmediumtest

Installation of TeamViewer Desktop

TeamViewer_Desktop.exe is create during install

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautFri Jan 28windows
Detectionmediumtest

ISO or Image Mount Indicator in Recent Files

Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks. This can be a false positive on server systems but on workstations users should rarely mount .iso or .img files.

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)Fri Feb 11windows
Detectionmediumtest

GatherNetworkInfo.VBS Reconnaissance Script Output

Detects creation of files which are the results of executing the built-in reconnaissance script "C:\Windows\System32\gatherNetworkInfo.vbs".

WindowsFile Event
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

SCR File Write Event

Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an ".SCR" file using "rundll32.exe desk.cpl,InstallScreenSaver" for example.

WindowsFile Event
TA0005 · Defense EvasionT1218.011 · Rundll32
Christopher Peacock+1Wed Apr 27windows
Detectionmediumtest

Potential Persistence Via Notepad++ Plugins

Detects creation of new ".dll" files inside the plugins directory of a notepad++ installation by a process other than "gup.exe". Which could indicates possible persistence

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Fri Jun 10windows
Detectionmediumtest

OneNote Attachment File Dropped In Suspicious Location

Detects creation of files with the ".one"/".onepkg" extension in suspicious or uncommon locations. This could be a sign of attackers abusing OneNote attachments

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Sun Jan 22windows
Detectionmediumtest

New Outlook Macro Created

Detects the creation of a macro file for Outlook.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
@scoubimtlMon Apr 05windows
Detectionmediumtest

Publisher Attachment File Dropped In Suspicious Location

Detects creation of files with the ".pub" extension in suspicious or uncommon locations. This could be a sign of attackers abusing Publisher documents

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

Suspicious File Created In PerfLogs

Detects suspicious file based on their extension being created in "C:\PerfLogs\". Note that this directory mostly contains ".etl" files

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionmediumtest

Potential Binary Or Script Dropper Via PowerShell

Detects PowerShell creating a binary executable or a script file.

WindowsFile Event
TA0003 · Persistence
François Hubaut+1Fri Mar 17windows
Detectionmediumtest

Potential Suspicious PowerShell Module File Created

Detects the creation of a new PowerShell module in the first folder of the module directory structure "\WindowsPowerShell\Modules\malware\malware.psm1". This is somewhat an uncommon practice as legitimate modules often includes a version folder.

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

PowerShell Module File Created By Non-PowerShell Process

Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc. by a non-PowerShell process

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

PSScriptPolicyTest Creation By Uncommon Process

Detects the creation of the "PSScriptPolicyTest" PowerShell script by an uncommon process. This file is usually generated by Microsoft Powershell to test against Applocker.

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jun 01windows
Detectionmediumtest

Rclone Config File Creation

Detects Rclone config files being created

WindowsFile Event
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Aaron Greetham - NCC GroupWed May 26windows
Detectionmediumtest

RemCom Service File Creation

Detects default RemCom service filename which indicates RemCom service installation and execution

WindowsFile Event
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Nasreddine Bencherchali (Nextron Systems)Fri Aug 04windows
Detectionmediumtest

ScreenConnect Temporary Installation Artefact

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautSun Feb 13windows
Detectionmediumtest

Self Extraction Directive File Created In Potentially Suspicious Location

Detects the creation of Self Extraction Directive files (.sed) in a potentially suspicious location. These files are used by the "iexpress.exe" utility in order to create self extracting packages. Attackers were seen abusing this utility and creating PE files with embedded ".sed" entries.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Joseliyo SanchezMon Feb 05windows
Detectionmediumtest

Startup Folder File Write

A General detection for files being created in the Windows startup directory. This could be an indicator of persistence.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionmediumtest

Created Files by Microsoft Sync Center

This rule detects suspicious files created by Microsoft Sync Center (mobsync)

WindowsFile Event
TA0004 · Privilege EscalationT1055 · Process InjectionT1218 · System Binary Proxy ExecutionTA0002 · Execution+1
elhoimThu Apr 28windows
Detectionmediumtest

Suspicious Files in Default GPO Folder

Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder

WindowsFile Event
T1036.005 · Match Legitimate Name or LocationTA0005 · Defense Evasion
elhoimThu Apr 28windows
Detectionmediumtest

Creation of a Diagcab

Detects the creation of diagcab file, which could be caused by some legitimate installer or is a sign of exploitation (review the filename and its location)

WindowsFile Event
TA0042 · Resource Development
François HubautWed Jun 08windows
Detectionmediumexperimental

Suspicious File Write to Webapps Root Directory

Detects suspicious file writes to the root directory of web applications, particularly Apache web servers or Tomcat servers. This may indicate an attempt to deploy malicious files such as web shells or other unauthorized scripts.

WindowsFile Event
TA0003 · PersistenceT1505.003 · Web ShellTA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Oct 20windows
Detectionmediumtest

Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream

Detects the creation of hidden file/folder with the "::$index_allocation" stream. Which can be used as a technique to prevent access to folder and files from tooling such as "explorer.exe" and "powershell.exe"

WindowsFile Event
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
ScoubiMon Oct 09windows
Detectionmediumtest

Potential Homoglyph Attack Using Lookalike Characters in Filename

Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters. This is used as an obfuscation and masquerading techniques. Only "perfect" homoglyphs are included; these are characters that are indistinguishable from ASCII characters and thus may make excellent candidates for homoglyph attack characters.

WindowsFile Event
TA0005 · Defense EvasionT1036 · MasqueradingT1036.003 · Rename System Utilities
Micah BabinskiMon May 08windows
Detectionmediumtest

Suspicious LNK Double Extension File Created

Detects the creation of files with an "LNK" as a second extension. This is sometimes used by malware as a method to abuse the fact that Windows hides the "LNK" extension by default.

WindowsFile Event
TA0005 · Defense EvasionT1036.007 · Double File Extension
Nasreddine Bencherchali (Nextron Systems)+1Mon Nov 07windows
Detectionmediumtest

PowerShell Profile Modification

Detects the creation or modification of a powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
HieuTT35+1Thu Oct 24windows
Detectionmediumtest

Suspicious PROCEXP152.sys File Created In TMP

Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder. This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) or Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU.

WindowsFile Event
T1562.001 · Disable or Modify ToolsTA0005 · Defense Evasion
xknow+1Mon Apr 08windows
Detectionmediumtest

Drop Binaries Into Spool Drivers Color Folder

Detects the creation of suspcious binary files inside the "\windows\system32\spool\drivers\color\" as seen in the blog referenced below

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 28windows
Detectionmediumtest

TeamViewer Remote Session

Detects the creation of log files during a TeamViewer remote session

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sun Jan 30windows
Detectionmediumtest

VsCode Powershell Profile Modification

Detects the creation or modification of a vscode related powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
Nasreddine Bencherchali (Nextron Systems)Wed Aug 24windows
Detectionmediumexperimental

Potentially Suspicious WDAC Policy File Creation

Detects suspicious Windows Defender Application Control (WDAC) policy file creation from abnormal processes that could be abused by attacker to block EDR/AV components while allowing their own malicious code to run on the system.

WindowsFile Event
TA0005 · Defense Evasion
X__JuniorFri Feb 07windows
Detectionmediumtest

Windows Terminal Profile Settings Modification By Uncommon Process

Detects the creation or modification of the Windows Terminal Profile settings file "settings.json" by an uncommon process.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.015 · Login Items
François Hubaut+1Sat Jul 22windows