Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Detection of PowerShell Execution via Sqlps.exe

This rule detects execution of a PowerShell code through the sqlps.exe utility, which is included in the standard set of utilities supplied with the MSSQL Server. Script blocks are not logged in this case, so this utility helps to bypass protection mechanisms based on the analysis of these logs.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Agro oscd.communitySat Oct 10windows
Detectionmediumtest

SQL Client Tools PowerShell Session Detection

This rule detects execution of a PowerShell code through the sqltoolsps.exe utility, which is included in the standard set of utilities supplied with the Microsoft SQL Server Management studio. Script blocks are not logged in this case, so this utility helps to bypass protection mechanisms based on the analysis of these logs.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Agro oscd.communitlyTue Oct 13windows
Detectionmediumtest

New Remote Desktop Connection Initiated Via Mstsc.EXE

Detects the usage of "mstsc.exe" with the "/v" flag to initiate a connection to a remote server. Adversaries may use valid accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol
François HubautFri Jan 07windows
Detectionmediumtest

Msxsl.EXE Execution

Detects the execution of the MSXSL utility. This can be used to execute Extensible Stylesheet Language (XSL) files. These files are commonly used to describe the processing and rendering of data within XML files. Adversaries can abuse this functionality to execute arbitrary files while potentially bypassing application whitelisting defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1220 · XSL Script Processing
Timur Zinniatullin+1Mon Oct 21windows
Detectionmediumtest

Suspicious Group And Account Reconnaissance Activity Using Net.EXE

Detects suspicious reconnaissance command line activity on Windows systems using Net.EXE Check if the user that executed the commands is suspicious (e.g. service accounts, LOCAL_SYSTEM)

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain Account
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionmediumtest

Windows Admin Share Mount Via Net.EXE

Detects when an admin share is mounted using net.exe

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
oscd.community+3Mon Oct 05windows
Detectionmediumtest

Password Provided In Command Line Of Net.EXE

Detects a when net.exe is called with a password in the command line

WindowsProcess Creation
TA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation+3
Tim Shelton (HAWK.IO)Thu Dec 09windows
Detectionmediumtest

New User Created Via Net.EXE

Identifies the creation of local users via the net.exe command.

WindowsProcess Creation
TA0003 · PersistenceT1136.001 · Local Account
Endgame+1Tue Oct 30windows
Detectionmediumtest

New Firewall Rule Added Via Netsh.EXE

Detects the addition of a new rule to the Windows firewall via netsh

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System FirewallS0246 · S0246
Markus Neis+1Tue Jan 29windows
Detectionmediumtest

Firewall Rule Deleted Via Netsh.EXE

Detects the removal of a port or application rule in the Windows Firewall configuration using netsh

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSun Aug 14windows
Detectionmediumtest

Firewall Disabled via Netsh.EXE

Detects netsh commands that turns off the Windows firewall

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System FirewallS0108 · S0108
Fatih SirinFri Nov 01windows
Detectionmediumtest

Netsh Allow Group Policy on Microsoft Defender Firewall

Adversaries may modify system firewalls in order to bypass controls limiting network usage

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSun Jan 09windows
Detectionmediumtest

Firewall Rule Update Via Netsh.EXE

Detects execution of netsh with the "advfirewall" and the "set" option in order to set new values for properties of a existing rule

WindowsProcess Creation
TA0005 · Defense Evasion
X__Junior (Nextron Systems)Tue Jul 18windows
Detectionmediumtest

Potential Persistence Via Netsh Helper DLL

Detects the execution of netsh with "add helper" flag in order to add a custom helper DLL. This technique can be abused to add a malicious helper DLL that can be used as a persistence proxy that gets called when netsh.exe is executed.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.007 · Netsh Helper DLLS0108 · S0108
Victor Sergeev+1Fri Oct 25windows
Detectionmediumtest

New Network Trace Capture Started Via Netsh.EXE

Detects the execution of netsh with the "trace" flag in order to start a network capture

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Kutepov Anton+1Thu Oct 24windows
Detectionmediumtest

New Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+3Tue Jan 29windows
Detectionmediumtest

Harvesting Of Wifi Credentials Via Netsh.EXE

Detect the harvesting of wifi credentials using netsh.exe

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Andreas Hunkeler+1Mon Apr 20windows
Detectionmediumtest

Potential Recon Activity Via Nltest.EXE

Detects nltest commands that can be used for information discovery

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration DiscoveryT1482 · Domain Trust Discovery
Craig Young+2Sat Jul 24windows
Detectionmediumtest

Node Process Executions

Detects the execution of other scripts using the Node executable packaged with Adobe Creative Cloud

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1059.007 · JavaScript
Max Altgelt (Nextron Systems)Wed Apr 06windows
Detectionmediumtest

Nslookup PowerShell Download Cradle - ProcessCreation

Detects suspicious powershell download cradle using nslookup. This cradle uses nslookup to extract payloads from DNS records

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Sep 05windows
Detectionmediumtest

Suspicious Usage Of Active Directory Diagnostic Tool (ntdsutil.exe)

Detects execution of ntdsutil.exe to perform different actions such as restoring snapshots...etc.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)Wed Sep 14windows
Detectionmediumtest

Invocation of Active Directory Diagnostic Tool (ntdsutil.exe)

Detects execution of ntdsutil.exe, which can be used for various attacks against the NTDS database (NTDS.DIT)

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Thomas PatzkeWed Jan 16windows
Detectionmediumtest

Driver/DLL Installation Via Odbcconf.EXE

Detects execution of "odbcconf" with "INSTALLDRIVER" which installs a new ODBC driver. Attackers abuse this to install and run malicious DLLs.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Nasreddine Bencherchali (Nextron Systems)Mon May 22windows
Detectionmediumtest

New DLL Registered Via Odbcconf.EXE

Detects execution of "odbcconf" with "REGSVR" in order to register a new DLL (equivalent to running regsvr32). Attackers abuse this to install and run malicious DLLs.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Kirill Kiryanov+4Mon May 22windows
Detectionmediumtest

Response File Execution Via Odbcconf.EXE

Detects execution of "odbcconf" with the "-f" flag in order to load a response file which might contain a malicious action.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Kirill Kiryanov+4Mon May 22windows
Detectionmediumtest

Uncommon Child Process Spawned By Odbcconf.EXE

Detects an uncommon child process of "odbcconf.exe" binary which normally shouldn't have any child processes.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Harjot SinghMon May 22windows
Detectionmediumtest

Potential Arbitrary DLL Load Using Winword

Detects potential DLL sideloading using the Microsoft Office winword process via the '/l' flag.

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Victor Sergeev+1Fri Oct 09windows
Detectionmediumtest

Potential Mpclient.DLL Sideloading Via OfflineScannerShell.EXE Execution

Detects execution of Windows Defender "OfflineScannerShell.exe" from its non standard directory. The "OfflineScannerShell.exe" binary is vulnerable to DLL side loading and will load any DLL named "mpclient.dll" from the current working directory.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautSun Mar 06windows
Detectionmediumtest

PDQ Deploy Remote Adminstartion Tool Execution

Detect use of PDQ Deploy remote admin tool

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1072 · Software Deployment Tools
François HubautSat Oct 01windows
Detectionmediumtest

Potentially Suspicious Execution Of PDQDeployRunner

Detects suspicious execution of "PDQDeployRunner" which is part of the PDQDeploy service stack that is responsible for executing commands and packages on a remote machines

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jul 22windows
Detectionmediumtest

Perl Inline Command Execution

Detects execution of perl using the "-e"/"-E" flags. This is could be used as a way to launch a reverse shell or execute live perl code.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionmediumtest

Php Inline Command Execution

Detects execution of php using the "-r" flag. This is could be used as a way to launch a reverse shell or execute live php code.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionmediumtest

PktMon.EXE Execution

Detects execution of PktMon, a tool that captures network packets.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
François HubautThu Mar 17windows
Detectionmediumtest

Suspicious Powercfg Execution To Change Lock Screen Timeout

Detects suspicious execution of 'Powercfg.exe' to change lock screen timeout

WindowsProcess Creation
TA0005 · Defense Evasion
François HubautFri Nov 18windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - ProcCreation

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsProcess Creation
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
François HubautSun Jan 22windows
Detectionmediumtest

Add Windows Capability Via PowerShell Cmdlet

Detects usage of the "Add-WindowsCapability" cmdlet to add Windows capabilities. Notable capabilities could be "OpenSSH" and others.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Sun Jan 22windows
Detectionmediumtest

Potential AMSI Bypass Using NULL Bits

Detects usage of special strings/null bits in order to potentially bypass AMSI functionalities

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Wed Jan 04windows
Detectionmediumtest

Audio Capture via PowerShell

Detects audio capture via PowerShell Cmdlet.

WindowsProcess Creation
TA0009 · CollectionT1123 · Audio Capture
E.M. Anhaus (originally from Atomic Blue Detections+3Thu Oct 24windows
Detectionmediumtest

Potential Process Execution Proxy Via CL_Invocation.ps1

Detects calls to "SyncInvoke" that is part of the "CL_Invocation.ps1" script to proxy execution using "System.Diagnostics.Process"

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+2Wed Oct 14windows
Detectionmediumtest

Assembly Loading Via CL_LoadAssembly.ps1

Detects calls to "LoadAssemblyFromPath" or "LoadAssemblyFromNS" that are part of the "CL_LoadAssembly.ps1" script. This can be abused to load different assemblies and bypass App locker controls.

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
François Hubaut+1Sat May 21windows
Detectionmediumtest

Potential Script Proxy Execution Via CL_Mutexverifiers.ps1

Detects the use of the Microsoft signed script "CL_mutexverifiers" to proxy the execution of additional PowerShell script commands

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+3Sat May 21windows
Detectionmediumtest

ConvertTo-SecureString Cmdlet Usage Via CommandLine

Detects usage of the "ConvertTo-SecureString" cmdlet via the commandline. Which is fairly uncommon and could indicate potential suspicious activity

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Teymur Kheirkhabarov+3Sun Oct 11windows
Detectionmediumexperimental

PowerShell MSI Install via WindowsInstaller COM From Remote Location

Detects the execution of PowerShell commands that attempt to install MSI packages via the Windows Installer COM object (`WindowsInstaller.Installer`) hosted remotely. This could be indication of malicious software deployment or lateral movement attempts using Windows Installer functionality. And the usage of WindowsInstaller COM object rather than msiexec could be an attempt to bypass the detection.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+2
Meroujan Antonyan (vx3r)Thu Jun 05windows
Detectionmediumtest

Computer Discovery And Export Via Get-ADComputer Cmdlet

Detects usage of the Get-ADComputer cmdlet to collect computer information and output it to a file

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 10windows
Detectionmediumexperimental

Potential PowerShell Console History Access Attempt via History File

Detects potential access attempts to the PowerShell console history directly via history file (ConsoleHost_history.txt). This can give access to plaintext passwords used in PowerShell commands or used for general reconnaissance.

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Files
Luc GénauxThu Apr 03windows
Detectionmediumtest

Gzip Archive Decode Via PowerShell

Detects attempts of decoding encoded Gzip archives via PowerShell.

WindowsProcess Creation
TA0011 · Command and ControlT1132.001 · Standard Encoding
Hieu TranMon Mar 13windows
Detectionmediumtest

Powershell Defender Exclusion

Detects requests to exclude files, folders or processes from Antivirus scanning using PowerShell cmdlets

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Thu Apr 29windows
Detectionmediumtest

Windows Firewall Disabled via PowerShell

Detects attempts to disable the Windows Firewall using PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defenses
Tim Rauch+1Wed Sep 14windows