Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Powershell LocalAccount Manipulation

Adversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
François HubautTue Dec 28windows
Detectionmediumtest

Malicious PowerShell Keywords

Detects keywords from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionmediumtest

Modify Group Policy Settings - ScriptBlockLogging

Detect malicious GPO modifications can be used to implement many other malicious behaviors.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
François HubautFri Aug 19windows
Detectionmediumtest

Powershell MsXml COM Object

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François Hubaut+1Wed Jan 19windows
Detectionmediumtest

Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock

Detects the execution of powershell scripts with calls to the "Start-NetEventSession" cmdlet. Which allows an attacker to start event and packet capture for a network event session. Adversaries may attempt to capture network to gather information over the course of an operation. Data captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol.

WindowsPowerShell Script
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
François HubautSun May 12windows
Detectionmediumexperimental

Potential Unconstrained Delegation Discovery Via Get-ADComputer - ScriptBlock

Detects the use of the "Get-ADComputer" cmdlet in order to identify systems which are configured for unconstrained delegation.

WindowsPowerShell Script
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential AccessT1018 · Remote System Discovery+2
François HubautWed Mar 05windows
Detectionmediumtest

PowerShell Remote Session Creation

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautThu Jan 06windows
Detectionmediumtest

PowerShell Script With File Hostname Resolving Capabilities

Detects PowerShell scripts that have capabilities to read files, loop through them and resolve DNS host entries.

WindowsPowerShell Script
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionmediumtest

Root Certificate Installed - PowerShell

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sat Oct 10windows
Detectionmediumtest

Suspicious Invoke-Item From Mount-DiskImage

Adversaries may abuse container files such as disk image (.iso, .vhd) file formats to deliver malicious payloads that may not be tagged with MOTW.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.005 · Mark-of-the-Web Bypass
François HubautTue Feb 01windows
Detectionmediumtest

Powershell Sensitive File Discovery

Detect adversaries enumerate sensitive files

WindowsPowerShell Script
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautFri Sep 16windows
Detectionmediumtest

Change PowerShell Policies to an Insecure Level - PowerShell

Detects changing the PowerShell script execution policy to a potentially insecure level using the "Set-ExecutionPolicy" cmdlet.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautWed Oct 20windows
Detectionmediumtest

Detected Windows Software Discovery - PowerShell

Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable.

WindowsPowerShell Script
TA0007 · DiscoveryT1518 · Software Discovery
Nikita Nazarov+1Fri Oct 16windows
Detectionmediumtest

Powershell Store File In Alternate Data Stream

Storing files in Alternate Data Stream (ADS) similar to Astaroth malware.

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautThu Sep 02windows
Detectionmediumtest

Suspicious Eventlog Clear

Detects usage of known powershell cmdlets such as "Clear-EventLog" to clear the Windows event logs

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 12windows
Detectionmediumtest

Powershell Directory Enumeration

Detects technique used by MAZE ransomware to enumerate directories using Powershell

WindowsPowerShell Script
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautThu Mar 17windows
Detectionmediumtest

Suspicious PowerShell Download - Powershell Script

Detects suspicious PowerShell download command

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 05windows
Detectionmediumtest

Powershell Execute Batch Script

Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](https://attack.mitre.org/software/S0106)) is the primary command prompt on Windows systems. The Windows command prompt can be used to control almost any aspect of a system, with various permission levels required for different subsets of commands. Batch files (ex: .bat or .cmd) also provide the shell with a list of sequential commands to run, as well as normal scripting operations such as conditionals and loops. Common uses of batch files include long or repetitive tasks, or the need to run the same set of commands on multiple system

WindowsPowerShell Script
TA0002 · ExecutionT1059.003 · Windows Command Shell
François HubautSun Jan 02windows
Detectionmediumtest

Extracting Information with PowerShell

Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files containing passwords for a system or service, or source code/binary files containing embedded passwords.

WindowsPowerShell Script
TA0006 · Credential AccessT1552.001 · Credentials In Files
François HubautSun Dec 19windows
Detectionmediumtest

Troubleshooting Pack Cmdlet Execution

Detects execution of "TroubleshootingPack" cmdlets to leverage CVE-2022-30190 or action similar to "msdt" lolbin (as described in LOLBAS)

WindowsPowerShell Script
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jun 21windows
Detectionmediumtest

Suspicious GetTypeFromCLSID ShellExecute

Detects suspicious Powershell code that execute COM Objects

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
François HubautSat Apr 02windows
Detectionmediumtest

Suspicious Hyper-V Cmdlets

Adversaries may carry out malicious operations using a virtual instance to avoid detection

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.006 · Run Virtual Instance
François HubautSat Apr 09windows
Detectionmediumtest

Change User Agents with WebRequest

Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server.

WindowsPowerShell Script
TA0011 · Command and ControlT1071.001 · Web Protocols
François HubautSun Jan 23windows
Detectionmediumtest

Suspicious IO.FileStream

Open a handle on the drive volume via the \\.\ DOS device path specifier and perform direct access read of the first few bytes of the volume.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.003 · Clear Command History
François HubautSun Jan 09windows
Detectionmediumtest

Potential Keylogger Activity

Detects PowerShell scripts that contains reference to keystroke capturing functions

WindowsPowerShell Script
TA0009 · CollectionTA0006 · Credential AccessT1056.001 · Keylogging
Nasreddine Bencherchali (Nextron Systems)Wed Jan 04windows
Detectionmediumtest

Potential Suspicious PowerShell Keywords

Detects potentially suspicious keywords that could indicate the use of a PowerShell exploitation framework

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Mon Feb 11windows
Detectionmediumtest

Powershell Local Email Collection

Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a users local system, such as Outlook storage or cache files.

WindowsPowerShell Script
TA0009 · CollectionT1114.001 · Local Email Collection
François HubautWed Jul 21windows
Detectionmediumtest

PowerShell Deleted Mounted Share

Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.005 · Network Share Connection Removal
oscd.community+1Thu Oct 08windows
Detectionmediumtest

Suspicious New-PSDrive to Admin Share

Adversaries may use to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user.

WindowsPowerShell Script
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
François HubautSat Aug 13windows
Detectionmediumtest

Suspicious TCP Tunnel Via PowerShell Script

Detects powershell scripts that creates sockets/listeners which could be indicative of tunneling activity

WindowsPowerShell Script
TA0011 · Command and ControlT1090 · Proxy
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectionmediumtest

Recon Information for Export with PowerShell

Once established within a system or network, an adversary may use automated techniques for collecting internal data

WindowsPowerShell Script
TA0009 · CollectionT1119 · Automated Collection
François HubautFri Jul 30windows
Detectionmediumtest

Remove Account From Domain Admin Group

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts.

WindowsPowerShell Script
TA0040 · ImpactT1531 · Account Access Removal
François HubautSun Dec 26windows
Detectionmediumtest

Suspicious Start-Process PassThru

Powershell use PassThru option to start in background

WindowsPowerShell Script
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
François HubautSat Jan 15windows
Detectionmediumtest

Suspicious Unblock-File

Remove the Zone.Identifier alternate data stream which identifies the file as downloaded from the internet.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.005 · Mark-of-the-Web Bypass
François HubautTue Feb 01windows
Detectionmediumtest

Suspicious PowerShell WindowStyle Option

Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.003 · Hidden Window
François Hubaut+1Wed Oct 20windows
Detectionmediumtest

PowerShell Write-EventLog Usage

Detects usage of the "Write-EventLog" cmdlet with 'RawData' flag. The cmdlet can be levreage to write malicious payloads to the EventLog and then retrieve them later for later use

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Aug 16windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Script

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Script
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionmediumtest

SyncAppvPublishingServer Execution to Bypass Powershell Restriction

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+1Mon Oct 05windows
Detectionmediumtest

Testing Usage of Uncommonly Used Port

Adversaries may communicate using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443.

WindowsPowerShell Script
TA0011 · Command and ControlT1571 · Non-Standard Port
François HubautSun Jan 23windows
Detectionmediumtest

Powershell Timestomp

Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.006 · Timestomp
François HubautTue Aug 03windows
Detectionmediumtest

User Discovery And Export Via Get-ADUser Cmdlet - PowerShell

Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 17windows
Detectionmediumtest

Potential Persistence Via PowerShell User Profile Using Add-Content

Detects calls to "Add-Content" cmdlet in order to modify the content of the user profile and potentially adding suspicious commands for persistence

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
François Hubaut+1Wed Aug 18windows
Detectionmediumexperimental

Registry Modification Attempt Via VBScript - PowerShell

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods embedded within PowerShell scripts or commands. Threat actors commonly embed VBScript code within PowerShell to perform registry modifications, attempting to evade detection that monitors for direct registry access through traditional tools. This technique can be used for persistence, defense evasion, and privilege escalation by modifying registry keys without using regedit.exe, reg.exe, or PowerShell's native registry cmdlets.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionmediumtest

Usage Of Web Request Commands And Cmdlets - ScriptBlock

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via PowerShell scriptblock logs

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
James PembertonThu Oct 24windows
Detectionmediumtest

Potentially Suspicious Call To Win32_NTEventlogFile Class - PSScript

Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 13windows
Detectionmediumtest

PowerShell WMI Win32_Product Install MSI

Detects the execution of an MSI file using PowerShell and the WMI Win32_Product class

WindowsPowerShell Script
TA0005 · Defense EvasionT1218.007 · Msiexec
François HubautSun Apr 24windows
Detectionmediumtest

Windows Defender Exclusions Added - PowerShell

Detects modifications to the Windows Defender configuration settings using PowerShell to add exclusions

WindowsPowerShell Script
TA0005 · Defense EvasionT1562 · Impair DefensesTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+1Fri Sep 16windows
Detectionmediumtest

Windows Firewall Profile Disabled

Detects when a user disables the Windows Firewall via a Profile to help evade defense.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerTue Oct 12windows