Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Winlogon Helper DLL

Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[Wow6432Node]Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.004 · Winlogon Helper DLL
Timur Zinniatullin+1Mon Oct 21windows
Detectionmediumtest

Powershell WMI Persistence

Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription.

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
François HubautThu Aug 19windows
Detectionmediumtest

WMIC Unquoted Services Path Lookup - PowerShell

Detects known WMI recon method to look for unquoted service paths, often used by pentest inside of powershell scripts attackers enum scripts

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionmediumtest

Suspicious X509Enrollment - Ps Script

Detect use of X509Enrollment

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
François HubautFri Dec 23windows
Detectionmediumtest

Powershell XML Execute Command

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautWed Jan 19windows
Detectionmediumtest

Potential Credential Dumping Activity Via LSASS

Detects process access requests to the LSASS process with specific call trace calls and access masks. This behaviour is expressed by many credential dumping tools such as Mimikatz, NanoDump, Invoke-Mimikatz, Procdump and even the Taskmgr dumping feature.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Samir Bousseaden+1Wed Apr 03windows
Detectionmediumtest

Potentially Suspicious GrantedAccess Flags On LSASS

Detects process access requests to LSASS process with potentially suspicious access flags

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)+9Mon Nov 22windows
Detectionmediumtest

Potential Direct Syscall of NtOpenProcess

Detects potential calls to NtOpenProcess directly from NTDLL.

WindowsProcess Access
TA0002 · ExecutionT1106 · Native API
Christian Burkard (Nextron Systems)+1Wed Jul 28windows
Detectionmediumtest

Function Call From Undocumented COM Interface EditionUpgradeManager

Detects function calls from the EditionUpgradeManager COM interface. Which is an interface that is not used by standard executables.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
oscd.community+1Wed Oct 07windows
Detectionmediumtest

7Zip Compressing Dump Files

Detects execution of 7z in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
Nasreddine Bencherchali (Nextron Systems)Tue Sep 27windows
Detectionmediumtest

Compress Data and Lock With Password for Exfiltration With 7-ZIP

An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party utilities

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
François HubautTue Jul 27windows
Detectionmediumtest

Potential DLL Injection Via AccCheckConsole

Detects the execution "AccCheckConsole" a command-line tool for verifying the accessibility implementation of an application's UI. One of the tests that this checker can run are called "verification routine", which tests for things like Consistency, Navigation, etc. The tool allows a user to provide a DLL that can contain a custom "verification routine". An attacker can build such DLLs and pass it via the CLI, which would then be loaded in the context of the "AccCheckConsole" utility.

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Florian Roth (Nextron Systems)Thu Jan 06windows
Detectionmediumtest

Uncommon Child Process Of AddinUtil.EXE

Detects uncommon child processes of the Add-In deployment cache updating utility (AddInutil.exe) which could be a sign of potential abuse of the binary to proxy execution via a custom Addins.Store payload.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionmediumtest

Uncommon AddinUtil.EXE CommandLine Execution

Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with uncommon Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionmediumtest

AddinUtil.EXE Execution From Uncommon Directory

Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) from a non-standard directory.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionmediumtest

AgentExecutor PowerShell Execution

Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Sat Dec 24windows
Detectionmediumtest

Uncommon Child Process Of Appvlp.EXE

Detects uncommon child processes of Appvlp.EXE Appvlp or the Application Virtualization Utility is included with Microsoft Office. Attackers are able to abuse "AppVLP" to execute shell commands. Normally, this binary is used for Application Virtualization, but it can also be abused to circumvent the ASR file path rule folder or to mark a file as a system file.

WindowsProcess Creation
T1218 · System Binary Proxy ExecutionTA0005 · Defense EvasionTA0002 · Execution
SreemanFri Mar 13windows
Detectionmediumtest

AspNetCompiler Execution

Detects execution of "aspnet_compiler.exe" which can be abused to compile and execute C# code.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
François HubautWed Nov 24windows
Detectionmediumtest

Uncommon Assistive Technology Applications Execution Via AtBroker.EXE

Detects the start of a non built-in assistive technology applications via "Atbroker.EXE".

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Mateusz Wydra+1Mon Oct 12windows
Detectionmediumtest

Hiding Files with Attrib.exe

Detects usage of attrib.exe to hide files from users.

WindowsProcess Creation
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
Sami RuohonenWed Jan 16windows
Detectionmediumtest

Indirect Inline Command Execution Via Bash.EXE

Detects execution of Microsoft bash launcher with the "-c" flag. This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash.

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
François HubautWed Nov 24windows
Detectionmediumtest

Indirect Command Execution From Script File Via Bash.EXE

Detects execution of Microsoft bash launcher without any flags to execute the content of a bash script directly. This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash.

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Tue Aug 15windows
Detectionmediumtest

Potential Ransomware or Unauthorized MBR Tampering Via Bcdedit.EXE

Detects potential malicious and unauthorized usage of bcdedit.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator RemovalTA0003 · PersistenceT1542.003 · Bootkit
@neu5ronThu Feb 07windows
Detectionmediumtest

Data Export From MSSQL Table Via BCP.EXE

Detects the execution of the BCP utility in order to export data from the database. Attackers were seen saving their malware to a database column or table and then later extracting it via "bcp.exe" into a file.

WindowsProcess Creation
TA0002 · ExecutionTA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Omar Khaled+2Tue Aug 20windows
Detectionmediumtest

Uncommon Child Process Of BgInfo.EXE

Detects uncommon child processes of "BgInfo.exe" which could be a sign of potential abuse of the binary to proxy execution via external VBScript

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Nasreddine Bencherchali (Nextron Systems)+2Sat Oct 26windows
Detectionmediumtest

File Download Via Bitsadmin

Detects usage of bitsadmin downloading a file

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Michael Haag+1Thu Mar 09windows
Detectionmediumtest

Monitoring For Persistence Via BITS

BITS will allow you to schedule a command to execute after a successful download to notify you that the job is finished. When the job runs on the system the command specified in the BITS job will be executed. This can be abused by actors to create a backdoor within the system and for persistence. It will be chained in a BITS job to schedule the download of malware/additional binaries and execute the program after being downloaded.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1197 · BITS Jobs
SreemanThu Oct 29windows
Detectionmediumtest

Chromium Browser Instance Executed With Custom Extension

Detects a Chromium based browser process with the 'load-extension' flag to start a instance with a custom extension

WindowsProcess Creation
TA0003 · Persistenceattack.t1176.001
Aedan Russell+2Sun Jun 19windows
Detectionmediumtest

File Download From Browser Process Via Inline URL

Detects execution of a browser process with a URL argument pointing to a file with a potentially interesting extension. This can be abused to download arbitrary files or to hide from the user for example by launching the browser in a minimized state.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionmediumtest

Browser Started with Remote Debugging

Detects browsers starting with the remote debugging flags. Which is a technique often used to perform browser injection attacks

WindowsProcess Creation
TA0006 · Credential AccessTA0009 · CollectionT1185 · Browser Session Hijacking
Martin Mueller+1Wed Jul 27windows
Detectionmediumtest

Potential Binary Proxy Execution Via Cdb.EXE

Detects usage of "cdb.exe" to launch arbitrary processes or commands from a debugger script file

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Beyu Denis+2Sat Oct 26windows
Detectionmediumtest

New Root Certificate Installed Via CertMgr.EXE

Detects execution of "certmgr" with the "add" flag in order to install a new certificate on the system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sun Mar 05windows
Detectionmediumtest

File Download via CertOC.EXE

Detects when a user downloads a file by using CertOC.exe

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Mon May 16windows
Detectionmediumtest

DLL Loaded via CertOC.EXE

Detects when a user installs certificates by using CertOC.exe to loads the target DLL file.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Austin SongerSat Oct 23windows
Detectionmediumtest

New Root Certificate Installed Via Certutil.EXE

Detects execution of "certutil" with the "addstore" flag in order to install a new certificate on the system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sun Mar 05windows
Detectionmediumtest

Suspicious Download Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+3Wed Feb 15windows
Detectionmediumtest

File Encoded To Base64 Via Certutil.EXE

Detects the execution of certutil with the "encode" flag to encode a file to base64. This can be abused by threat actors and attackers for data exfiltration

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)+3Sun Feb 24windows
Detectionmediumtest

Certificate Exported Via Certutil.EXE

Detects the execution of the certutil with the "exportPFX" flag which allows the utility to export certificates.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)+3Wed Feb 15windows
Detectionmediumtest

Console CodePage Lookup Via CHCP

Detects use of chcp to look up the system locale value as part of host discovery

WindowsProcess Creation
TA0007 · DiscoveryT1614.001 · System Language Discovery
_pete_0+1Mon Feb 21windows
Detectionmediumtest

Suspicious CodePage Switch Via CHCP

Detects a code page switch in command line or batch scripts to a rare language

WindowsProcess Creation
T1036 · MasqueradingTA0005 · Defense Evasion
Florian Roth (Nextron Systems)+2Mon Oct 14windows
Detectionmediumtest

Deleted Data Overwritten Via Cipher.EXE

Detects usage of the "cipher" built-in utility in order to overwrite deleted data from disk. Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives

WindowsProcess Creation
TA0040 · ImpactT1485 · Data Destruction
François HubautSun Dec 26windows
Detectionmediumtest

Cloudflared Portable Execution

Detects the execution of the "cloudflared" binary from a non standard location.

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Nasreddine Bencherchali (Nextron Systems)Wed Dec 20windows
Detectionmediumtest

Cloudflared Quick Tunnel Execution

Detects creation of an ad-hoc Cloudflare Quick Tunnel, which can be used to tunnel local services such as HTTP, RDP, SSH and SMB. The free TryCloudflare Quick Tunnel will generate a random subdomain on trycloudflare[.]com, following a call to api[.]trycloudflare[.]com. The tool has been observed in use by threat groups including Akira ransomware.

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Sajid Nawaz KhanWed Dec 20windows
Detectionmediumtest

Cloudflared Tunnel Connections Cleanup

Detects execution of the "cloudflared" tool with the tunnel "cleanup" flag in order to cleanup tunnel connections.

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web ServiceT1090 · ProxyT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed May 17windows
Detectionmediumtest

Cloudflared Tunnel Execution

Detects execution of the "cloudflared" tool to connect back to a tunnel. This was seen used by threat actors to maintain persistence and remote access to compromised networks.

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web ServiceT1090 · ProxyT1572 · Protocol Tunneling
Janantha Marasinghe+1Wed May 17windows
Detectionmediumtest

Greedy File Deletion Using Del

Detects execution of the "del" builtin command to remove files using greedy/wildcard expression. This is often used by malware to delete content of folders that perhaps contains the initial malware infection or to delete evidence.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
François Hubaut+1Thu Dec 02windows
Detectionmediumtest

Potential Dosfuscation Activity

Detects possible payload obfuscation via the commandline

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
François Hubaut+1Tue Feb 15windows
Detectionmediumtest

Command Line Execution with Suspicious URL and AppData Strings

Detects a suspicious command line execution that includes an URL and AppData string in the command line parameters as used by several droppers (js/vbs > powershell)

WindowsProcess Creation
TA0002 · ExecutionTA0011 · Command and ControlT1059.003 · Windows Command ShellT1059.001 · PowerShell+1
Florian Roth (Nextron Systems)+2Wed Jan 16windows