Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

WinSxS Executable File Creation By Non-System Process

Detects the creation of binaries in the WinSxS folder by non-system processes

WindowsFile Event
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu May 11windows
Detectionmediumexperimental

ADExplorer Writing Complete AD Snapshot Into .dat File

Detects the dual use tool ADExplorer writing a complete AD snapshot into a .dat file. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsFile Event
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Arnim Rupp (Nextron Systems)+1Wed Jul 09windows
Detectionmediumtest

LiveKD Driver Creation

Detects the creation of the LiveKD driver, which is used for live kernel debugging

WindowsFile Event
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue May 16windows
Detectionmediumtest

Process Monitor Driver Creation By Non-Sysinternals Binary

Detects creation of the Process Monitor driver by processes other than Process Monitor (procmon) itself.

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionmediumtest

VHD Image Download Via Browser

Detects creation of ".vhd"/".vhdx" files by browser processes. Malware can use mountable Virtual Hard Disk ".vhd" files to encapsulate payloads and evade security controls.

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malware
François Hubaut+2Mon Oct 25windows
Detectionmediumtest

Visual Studio Code Tunnel Remote File Creation

Detects the creation of file by the "node.exe" process in the ".vscode-server" directory. Could be a sign of remote file creation via VsCode tunnel feature

WindowsFile Event
TA0011 · Command and Control
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25windows
Detectionmediumtest

Potential Webshell Creation On Static Website

Detects the creation of files with certain extensions on a static web site. This can be indicative of potential uploads of a web shell.

WindowsFile Event
TA0003 · PersistenceT1505.003 · Web Shell
Beyu Denis+3Tue Oct 22windows
Detectionmediumtest

Creation of WerFault.exe/Wer.dll in Unusual Folder

Detects the creation of a file named "WerFault.exe" or "wer.dll" in an uncommon folder, which could be a sign of WerFault DLL hijacking.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
François HubautMon May 09windows
Detectionmediumtest

AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl - File

Detects execution of attacker-controlled WsmPty.xsl or WsmTxt.xsl via winrm.vbs and copied cscript.exe (can be renamed)

WindowsFile Event
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
Julia Fomina+1Tue Oct 06windows
Detectionmediumtest

Writing Local Admin Share

Aversaries may use to interact with a remote network share using Server Message Block (SMB). This technique is used by post-exploitation frameworks.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0008 · Lateral MovementT1546.002 · Screensaver
François HubautSat Jan 01windows
Detectionmediumtest

Potentially Suspicious Self Extraction Directive File Created

Detects the creation of a binary file with the ".sed" extension. The ".sed" extension stand for Self Extraction Directive files. These files are used by the "iexpress.exe" utility in order to create self extracting packages. Attackers were seen abusing this utility and creating PE files with embedded ".sed" entries. Usually ".sed" files are simple ini files and not PE binaries.

Windowsfile_executable_detected
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Joseliyo SanchezMon Feb 05windows
Detectionmediumtest

Suspicious Appended Extension

Detects file renames where the target filename uses an uncommon double extension. Could indicate potential ransomware activity renaming files and adding a custom extension to the encrypted files, such as ".jpg.crypted", ".docx.locky", etc.

WindowsFile Rename
TA0040 · ImpactT1486 · Data Encrypted for Impact
François HubautSat Jul 16windows
Detectionmediumexperimental

Clfs.SYS Loaded By Process Located In a Potential Suspicious Location

Detects Clfs.sys being loaded by a process running from a potentially suspicious location. Clfs.sys is loaded as part of many CVEs exploits that targets Common Log File.

WindowsImage Load (DLL)
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
X__JuniorMon Jan 20windows
Detectionmediumtest

Amsi.DLL Loaded Via LOLBIN Process

Detects loading of "Amsi.dll" by a living of the land process. This could be an indication of a "PowerShell without PowerShell" attack

WindowsImage Load (DLL)
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jun 01windows
Detectionmediumtest

CredUI.DLL Loaded By Uncommon Process

Detects loading of "credui.dll" and related DLLs by an uncommon process. Attackers might leverage this DLL for potential use of "CredUIPromptForCredentials" or "CredUnPackAuthenticationBufferW".

WindowsImage Load (DLL)
TA0006 · Credential AccessTA0009 · CollectionT1056.002 · GUI Input Capture
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectionmediumtest

PowerShell Core DLL Loaded By Non PowerShell Process

Detects loading of essential DLLs used by PowerShell by non-PowerShell process. Detects behavior similar to meterpreter's "load powershell" extension.

WindowsImage Load (DLL)
T1059.001 · PowerShellTA0002 · Execution
Tom Kern+5Thu Nov 14windows
Detectionmediumexperimental

Unsigned .node File Loaded

Detects the loading of unsigned .node files. Adversaries may abuse a lack of .node integrity checking to execute arbitrary code inside of trusted applications such as Slack. .node files are native add-ons for Electron-based applications, which are commonly used for desktop applications like Slack, Discord, and Visual Studio Code. This technique has been observed in the DripLoader malware, which uses unsigned .node files to load malicious native code into Electron applications.

WindowsImage Load (DLL)
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense Evasion+3
Jonathan BeierleSat Nov 22windows
Detectionmediumtest

Potentially Suspicious Volume Shadow Copy Vsstrace.dll Load

Detects the image load of VSS DLL by uncommon executables

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0040 · ImpactT1490 · Inhibit System Recovery
François HubautFri Feb 17windows
Detectionmediumtest

Unsigned Image Loaded Into LSASS Process

Loading unsigned image (DLL, EXE) into LSASS process

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003.001 · LSASS Memory
Teymur Kheirkhabarov+1Tue Oct 22windows
Detectionmediumtest

DotNET Assembly DLL Loaded Via Office Application

Detects any assembly DLL being loaded by an Office Product

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
AntonlovesdnbWed Feb 19windows
Detectionmediumtest

CLR DLL Loaded Via Office Applications

Detects CLR DLL being loaded by an Office Product

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
AntonlovesdnbWed Feb 19windows
Detectionmediumtest

Microsoft Excel Add-In Loaded From Uncommon Location

Detects Microsoft Excel loading an Add-In (.xll) file from an uncommon location

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
Nasreddine Bencherchali (Nextron Systems)Fri May 12windows
Detectionmediumtest

Microsoft VBA For Outlook Addin Loaded Via Outlook

Detects outlvba (Microsoft VBA for Outlook Addin) DLL being loaded by the outlook process

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

PowerShell Core DLL Loaded Via Office Application

Detects PowerShell core DLL being loaded by an Office Product

WindowsImage Load (DLL)
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jun 01windows
Detectionmediumtest

Remote DLL Load Via Rundll32.EXE

Detects a remote DLL load event via "rundll32.exe".

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious File
Nasreddine Bencherchali (Nextron Systems)Mon Sep 18windows
Detectionmediumtest

WMI ActiveScriptEventConsumers Activity Via Scrcons.EXE DLL Load

Detects signs of the WMI script host process "scrcons.exe" loading scripting DLLs which could indicates WMI ActiveScriptEventConsumers EventConsumers activity.

WindowsImage Load (DLL)
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0003 · PersistenceT1546.003 · Windows Management Instrumentation Event Subscription
Roberto Rodriguez (Cyb3rWard0g)+1Wed Sep 02windows
Detectionmediumtest

Potential Antivirus Software DLL Sideloading

Detects potential DLL sideloading of DLLs that are part of antivirus software suchas McAfee, Symantec...etc

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 17windows
Detectionmediumtest

Potential AVKkid.DLL Sideloading

Detects potential DLL sideloading of "AVKkid.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Aug 03windows
Detectionmediumtest

Potential CCleanerDU.DLL Sideloading

Detects potential DLL sideloading of "CCleanerDU.dll"

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Jul 13windows
Detectionmediumtest

Potential CCleanerReactivator.DLL Sideloading

Detects potential DLL sideloading of "CCleanerReactivator.dll"

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__JuniorThu Jul 13windows
Detectionmediumtest

Potential Chrome Frame Helper DLL Sideloading

Detects potential DLL sideloading of "chrome_frame_helper.dll"

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 17windows
Detectionmediumtest

Potential DLL Sideloading Via ClassicExplorer32.dll

Detects potential DLL sideloading using ClassicExplorer32.dll from the Classic Shell software

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
François HubautTue Dec 13windows
Detectionmediumtest

Potential DLL Sideloading Using Coregen.exe

Detect usage of the "coregen.exe" (Microsoft CoreCLR Native Image Generator) binary to sideload arbitrary DLLs.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1055 · Process Injection
François HubautSat Dec 31windows
Detectionmediumtest

Potential DLL Sideloading Of DBGCORE.DLL

Detects DLL sideloading of "dbgcore.dll"

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Tue Oct 25windows
Detectionmediumtest

Potential DLL Sideloading Of DBGHELP.DLL

Detects potential DLL sideloading of "dbghelp.dll"

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Tue Oct 25windows
Detectionmediumtest

Potential DLL Sideloading Of DbgModel.DLL

Detects potential DLL sideloading of "DbgModel.dll"

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Gary LobermierThu Jul 11windows
Detectionmediumtest

Potential Goopdate.DLL Sideloading

Detects potential DLL sideloading of "goopdate.dll", a DLL used by googleupdate.exe

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)+1Mon May 15windows
Detectionmediumtest

Potential DLL Sideloading Of Libcurl.DLL Via GUP.EXE

Detects potential DLL sideloading of "libcurl.dll" by the "gup.exe" process from an uncommon location

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionmediumtest

Potential DLL Sideloading Via JsSchHlp

Detects potential DLL sideloading using JUSTSYSTEMS Japanese word processor

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
François HubautWed Dec 14windows
Detectionmediumtest

Potential Libvlc.DLL Sideloading

Detects potential DLL sideloading of "libvlc.dll", a DLL that is legitimately used by "VLC.exe"

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__JuniorMon Apr 17windows
Detectionmediumtest

Potential Mfdetours.DLL Sideloading

Detects potential DLL sideloading of "mfdetours.dll". While using "mftrace.exe" it can be abused to attach to an arbitrary process and force load any DLL named "mfdetours.dll" from the current directory of execution.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Thu Aug 03windows
Detectionmediumtest

Potential DLL Sideloading Of MpSvc.DLL

Detects potential DLL sideloading of "MpSvc.dll".

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 11windows
Detectionmediumtest

Potential DLL Sideloading Of MsCorSvc.DLL

Detects potential DLL sideloading of "mscorsvc.dll".

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Wietze BeukemaThu Jul 11windows
Detectionmediumtest

Potential Python DLL SideLoading

Detects potential DLL sideloading of Python DLL files.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Swachchhanda Shrawan PoudelSun Oct 06windows
Detectionmediumtest

Potential RjvPlatform.DLL Sideloading From Default Location

Detects loading of "RjvPlatform.dll" by the "SystemResetPlatform.exe" binary which can be abused as a method of DLL side loading since the "$SysReset" directory isn't created by default.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionmediumtest

Potential RoboForm.DLL Sideloading

Detects potential DLL sideloading of "roboform.dll", a DLL used by RoboForm Password Manager

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)+1Sun May 14windows
Detectionmediumtest

Potential ShellDispatch.DLL Sideloading

Detects potential DLL sideloading of "ShellDispatch.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Tue Jun 20windows
Detectionmediumtest

Potential SolidPDFCreator.DLL Sideloading

Detects potential DLL sideloading of "SolidPDFCreator.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Sun May 07windows