Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Remote File Download Via Findstr.EXE

Detects execution of "findstr" with specific flags and a remote share path. This specific set of CLI flags would allow "findstr" to download the content of the file located on the remote share as described in the LOLBAS entry.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionmediumtest

Findstr Launching .lnk File

Detects usage of findstr to identify and execute a lnk file as seen within the HHS redirect attack

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1202 · Indirect Command ExecutionT1027.003 · Steganography
Trent LiffickFri May 01windows
Detectionmediumtest

Permission Misconfiguration Reconnaissance Via Findstr.EXE

Detects usage of findstr with the "EVERYONE" or "BUILTIN" keywords. This was seen being used in combination with "icacls" and other utilities to spot misconfigured files or folders permissions.

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionmediumtest

Recon Command Output Piped To Findstr.EXE

Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example. Attackers often time use this technique to extract specific information they require in their reconnaissance phase.

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discovery
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 06windows
Detectionmediumtest

Security Tools Keyword Lookup Via Findstr.EXE

Detects execution of "findstr" to search for common names of security tools. Attackers often pipe the results of recon commands such as "tasklist" or "whoami" to "findstr" in order to filter out the results. This detection focuses on the keywords that the attacker might use as a filter.

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 20windows
Detectionmediumtest

Filter Driver Unloaded Via Fltmc.EXE

Detect filter driver unloading activity via fltmc.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562 · Impair DefensesT1562.002 · Disable Windows Event Logging
Nasreddine Bencherchali (Nextron Systems)Mon Feb 13windows
Detectionmediumtest

Forfiles Command Execution

Detects the execution of "forfiles" with the "/c" flag. While this is an expected behavior of the tool, it can be abused in order to proxy execution through it with any binary. Can be used to bypass application whitelisting.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+4Tue Jun 14windows
Detectionmediumtest

Use of FSharp Interpreters

Detects the execution of FSharp Interpreters "FsiAnyCpu.exe" and "FSi.exe" Both can be used for AWL bypass and to execute F# code via scripts or inline.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Christopher Peacock+1Thu Jun 02windows
Detectionmediumtest

Potentially Suspicious NTFS Symlink Behavior Modification

Detects the modification of NTFS symbolic link behavior using fsutil, which could be used to enable remote to local or remote to remote symlinks for potential attacks.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense Evasionattack.t1222.001
François Hubaut+1Wed Mar 02windows
Detectionmediumtest

Potential Arbitrary Command Execution Via FTP.EXE

Detects execution of "ftp.exe" script with the "-s" or "/s" flag and any child processes ran by "ftp.exe".

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
Victor Sergeev+1Fri Oct 09windows
Detectionmediumtest

Arbitrary File Download Via GfxDownloadWrapper.EXE

Detects execution of GfxDownloadWrapper.exe with a URL as an argument to download file.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Victor Sergeev+1Fri Oct 09windows
Detectionmediumtest

Suspicious Git Clone

Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious

WindowsProcess Creation
TA0043 · Reconnaissanceattack.t1593.003
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03windows
Detectionmediumtest

Github Self-Hosted Runner Execution

Detects GitHub self-hosted runners executing workflows on local infrastructure that could be abused for persistence and code execution. Shai-Hulud is an npm supply chain worm targeting CI/CD environments. It installs runners on compromised systems to maintain access after credential theft, leveraging their access to secrets and internal networks.

WindowsProcess Creation
TA0011 · Command and ControlT1102.002 · Bidirectional CommunicationT1071 · Application Layer Protocol
Daniel Koifman (KoifSec)Sat Nov 29windows
Detectionmediumtest

File Decryption Using Gpg4win

Detects usage of Gpg4win to decrypt files

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Aug 09windows
Detectionmediumtest

File Encryption Using Gpg4win

Detects usage of Gpg4win to encrypt files

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Aug 09windows
Detectionmediumtest

Portable Gpg.EXE Execution

Detects the execution of "gpg.exe" from uncommon location. Often used by ransomware and loaders to decrypt/encrypt data.

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impact
François Hubaut+1Sun Aug 06windows
Detectionmediumtest

Gpresult Display Group Policy Information

Detects cases in which a user uses the built-in Windows utility gpresult to display the Resultant Set of Policy (RSoP) information

WindowsProcess Creation
TA0007 · DiscoveryT1615 · Group Policy Discovery
François HubautSun May 01windows
Detectionmediumtest

Arbitrary Binary Execution Using GUP Utility

Detects execution of the Notepad++ updater (gup) to launch other commands or executables

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 10windows
Detectionmediumtest

HackTool - WinRM Access Via Evil-WinRM

Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.006 · Windows Remote Management
François HubautFri Jan 07windows
Detectionmediumtest

HackTool - Impersonate Execution

Detects execution of the Impersonate tool. Which can be used to manipulate tokens on a Windows computers remotely (PsExec/WmiExec) or interactively

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1134.001 · Token Impersonation/TheftT1134.003 · Make and Impersonate Token
Sai Prashanth PulisettiWed Dec 21windows
Detectionmediumtest

Invoke-Obfuscation COMPRESS OBFUSCATION

Detects Obfuscated Powershell via COMPRESS OBFUSCATION

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionmediumtest

HackTool - Jlaive In-Memory Assembly Execution

Detects the use of Jlaive to execute assemblies in a copied PowerShell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
Jose Luis Sanchez MartinezTue May 24windows
Detectionmediumexperimental

HackTool - LaZagne Execution

Detects the execution of the LaZagne. A utility used to retrieve multiple types of passwords stored on a local computer. LaZagne has been leveraged multiple times by threat actors in order to dump credentials.

WindowsProcess Creation
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)+1Mon Jun 24windows
Detectionmediumtest

HackTool - SharpLDAPmonitor Execution

Detects execution of the SharpLDAPmonitor. Which can monitor the creation, deletion and changes to LDAP objects.

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Fri Dec 30windows
Detectionmediumtest

Suspicious ZipExec Execution

ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
François HubautSun Nov 07windows
Detectionmediumtest

Potential Fake Instance Of Hxtsr.EXE Executed

HxTsr.exe is a Microsoft compressed executable file called Microsoft Outlook Communications. HxTsr.exe is part of Outlook apps, because it resides in a hidden "WindowsApps" subfolder of "C:\Program Files". Any instances of hxtsr.exe not in this folder may be malware camouflaging itself as HxTsr.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
SreemanFri Apr 17windows
Detectionmediumtest

Use Icacls to Hide File to Everyone

Detect use of icacls to deny access for everyone in Users folder sometimes used to hide malicious files

WindowsProcess Creation
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
François HubautMon Jul 18windows
Detectionmediumtest

IIS Native-Code Module Command Line Installation

Detects suspicious IIS native-code module installations via command line

WindowsProcess Creation
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)Wed Dec 11windows
Detectionmediumtest

Suspicious IIS URL GlobalRules Rewrite Via AppCmd

Detects usage of "appcmd" to create new global URL rewrite rules. This behaviour has been observed being used by threat actors to add new rules so they can access their webshells.

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Sun Jan 22windows
Detectionmediumexperimental

IIS WebServer Log Deletion via CommandLine Utilities

Detects attempts to delete Internet Information Services (IIS) log files via command line utilities, which is a common defense evasion technique used by attackers to cover their tracks. Threat actors often abuse vulnerabilities in web applications hosted on IIS servers to gain initial access and later delete IIS logs to evade detection.

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator Removal
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Sep 02windows
Detectionmediumtest

C# IL Code Compilation Via Ilasm.EXE

Detects the use of "Ilasm.EXE" in order to compile C# intermediate (IL) code to EXE or DLL.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
François Hubaut+1Sat May 07windows
Detectionmediumtest

InfDefaultInstall.exe .inf Execution

Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautTue Jul 13windows
Detectionmediumtest

File Download Via InstallUtil.EXE

Detects use of .NET InstallUtil.exe in order to download arbitrary files. The files will be written to "%LOCALAPPDATA%\Microsoft\Windows\INetCache\IE\"

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

Suspicious Execution of InstallUtil Without Log

Uses the .NET InstallUtil.exe application in order to execute image without log

WindowsProcess Creation
TA0005 · Defense Evasion
François HubautSun Jan 23windows
Detectionmediumtest

Java Running with Remote Debugging

Detects a JAVA process running with remote debugging allowing more than just localhost to connect

WindowsProcess Creation
T1203 · Exploitation for Client ExecutionTA0002 · Execution
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionmediumtest

Shell Process Spawned by Java.EXE

Detects shell spawned from Java host process, which could be a sign of exploitation (e.g. log4j exploitation)

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Fri Dec 17windows
Detectionmediumtest

Suspicious SysAidServer Child

Detects suspicious child processes of SysAidServer (as seen in MERCURY threat actor intrusions)

WindowsProcess Creation
TA0008 · Lateral MovementT1210 · Exploitation of Remote Services
Florian Roth (Nextron Systems)Fri Aug 26windows
Detectionmediumtest

Windows Kernel Debugger Execution

Detects execution of the Windows Kernel Debugger "kd.exe".

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionmediumtest

Potentially Suspicious Child Process of KeyScrambler.exe

Detects potentially suspicious child processes of KeyScrambler.exe

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege Escalation+2
Swachchhanda Shrawan PoudelMon May 13windows
Detectionmediumtest

Computer Password Change Via Ksetup.EXE

Detects password change for the computer's domain account or host principal via "ksetup.exe"

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Apr 06windows
Detectionmediumtest

Logged-On User Password Change Via Ksetup.EXE

Detects password change for the logged-on user's via "ksetup.exe"

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Apr 06windows
Detectionmediumtest

Active Directory Structure Export Via Ldifde.EXE

Detects the execution of "ldifde.exe" in order to export organizational Active Directory structure.

WindowsProcess Creation
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

Import LDAP Data Interchange Format File Via Ldifde.EXE

Detects the execution of "Ldifde.exe" with the import flag "-i". The can be abused to include HTTP-based arguments which will allow the arbitrary download of files from a remote server.

WindowsProcess Creation
TA0011 · Command and ControlTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1105 · Ingress Tool Transfer
@gott_cyberFri Sep 02windows
Detectionmediumtest

Uncommon Link.EXE Parent Process

Detects an uncommon parent process of "LINK.EXE". Link.EXE in Microsoft incremental linker. Its a utility usually bundled with Visual Studio installation. Multiple utilities often found in the same folder (editbin.exe, dumpbin.exe, lib.exe, etc) have a hardcode call to the "LINK.EXE" binary without checking its validity. This would allow an attacker to sideload any binary with the name "link.exe" if one of the aforementioned tools get executed from a different location. By filtering the known locations of such utilities we can spot uncommon parent process of LINK.EXE that might be suspicious or malicious.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Mon Aug 22windows
Detectionmediumtest

Rebuild Performance Counter Values Via Lodctr.EXE

Detects the execution of "lodctr.exe" to rebuild the performance counter registry values. This can be abused by attackers by providing a malicious config file to overwrite performance counter configuration to confuse and evade monitoring and security solutions.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jun 15windows
Detectionmediumtest

LOLBAS Data Exfiltration by DataSvcUtil.exe

Detects when a user performs data exfiltration by using DataSvcUtil.exe

WindowsProcess Creation
TA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
Ialle Teixeira+1Thu Sep 30windows
Detectionmediumtest

Suspicious Diantz Alternate Data Stream Execution

Compress target file into a cab file stored in the Alternate Data Stream (ADS) of the target file.

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautFri Nov 26windows
Detectionmediumtest

Suspicious Diantz Download and Compress Into a CAB File

Download and compress a remote file and store it in a cab file on local machine.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautFri Nov 26windows