Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Potential PowerShell Downgrade Attack

Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShell
Harish SegarFri Mar 20windows
Detectionmediumtest

Potential COM Objects Download Cradles Usage - Process Creation

Detects usage of COM objects that can be abused to download files in PowerShell by CLSID

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSun Dec 25windows
Detectionmediumtest

Potential DLL File Download Via PowerShell Invoke-WebRequest

Detects potential DLL files being downloaded using the PowerShell Invoke-WebRequest or Invoke-RestMethod cmdlets.

WindowsProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1059.001 · PowerShellT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Mon Mar 13windows
Detectionmediumtest

PowerShell Download Pattern

Detects a Powershell process that contains download commands in its command line string

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionmediumtest

Potential Suspicious Windows Feature Enabled - ProcCreation

Detects usage of the built-in PowerShell cmdlet "Enable-WindowsOptionalFeature" used as a Deployment Image Servicing and Management tool. Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Dec 29windows
Detectionmediumtest

Suspicious Execution of Powershell with Base64

Commandline to launch powershell with a base64 payload

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Jan 02windows
Detectionmediumtest

Powershell Inline Execution From A File

Detects inline execution of PowerShell code from a file

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Dec 25windows
Detectionmediumtest

Certificate Exported Via PowerShell

Detects calls to cmdlets that are used to export certificates from the local certificate store. Threat actors were seen abusing this to steal private keys from compromised machines.

WindowsProcess Creation
TA0006 · Credential AccessTA0002 · ExecutionT1552.004 · Private KeysT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Thu May 18windows
Detectionmediumtest

Suspicious FromBase64String Usage On Gzip Archive - Process Creation

Detects attempts of decoding a base64 Gzip archive via PowerShell. This technique is often used as a method to load malicious content into memory afterward.

WindowsProcess Creation
TA0011 · Command and ControlT1132.001 · Standard Encoding
François HubautFri Dec 23windows
Detectionmediumtest

PowerShell Get-Clipboard Cmdlet Via CLI

Detects usage of the 'Get-Clipboard' cmdlet via CLI

WindowsProcess Creation
TA0009 · CollectionT1115 · Clipboard Data
Nasreddine Bencherchali (Nextron Systems)Sat May 02windows
Detectionmediumtest

Suspicious Reconnaissance Activity Using Get-LocalGroupMember Cmdlet

Detects suspicious reconnaissance command line activity on Windows systems using the PowerShell Get-LocalGroupMember Cmdlet

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local Account
Nasreddine Bencherchali (Nextron Systems)Mon Oct 10windows
Detectionmediumtest

Import PowerShell Modules From Suspicious Directories - ProcCreation

Detects powershell scripts that import modules from suspicious directories

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Jan 10windows
Detectionmediumtest

Unsigned AppX Installation Attempt Using Add-AppxPackage

Detects usage of the "Add-AppxPackage" or it's alias "Add-AppPackage" to install unsigned AppX packages

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Jan 31windows
Detectionmediumtest

Suspicious PowerShell Invocations - Specific - ProcessCreation

Detects suspicious PowerShell invocation command parameters

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jan 05windows
Detectionmediumtest

Suspicious Invoke-WebRequest Execution With DirectIP

Detects calls to PowerShell with Invoke-WebRequest cmdlet using direct IP access

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Fri Apr 21windows
Detectionmediumtest

MSExchange Transport Agent Installation

Detects the Installation of a Exchange Transport Agent

WindowsProcess Creation
TA0003 · PersistenceT1505.002 · Transport Agent
Tobias MichalskiTue Jun 08windows
Detectionmediumtest

Suspicious PowerShell Invocation From Script Engines

Detects suspicious powershell invocations from interpreters or unusual programs

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionmediumtest

Change PowerShell Policies to an Insecure Level

Detects changing the PowerShell script execution policy to a potentially insecure level using the "-ExecutionPolicy" flag.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautMon Nov 01windows
Detectionmediumtest

Service StartupType Change Via PowerShell Set-Service

Detects the use of the PowerShell "Set-Service" cmdlet to change the startup type of a service to "disabled" or "manual"

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Sat Mar 04windows
Detectionmediumtest

PowerShell Script Run in AppData

Detects a suspicious command line execution that invokes PowerShell with reference to an AppData folder

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 09windows
Detectionmediumtest

User Discovery And Export Via Get-ADUser Cmdlet

Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionmediumtest

Suspicious X509Enrollment - Process Creation

Detect use of X509Enrollment

WindowsProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
François HubautFri Dec 23windows
Detectionmediumtest

Suspicious XOR Encoded PowerShell Command

Detects presence of a potentially xor encoded powershell command

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1140 · Deobfuscate/Decode Files or Information+1
Sami Ruohonen+6Wed Sep 05windows
Detectionmediumtest

Folder Compress To Potentially Suspicious Output Via Compress-Archive Cmdlet

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsProcess Creation
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionmediumtest

Arbitrary File Download Via PresentationHost.EXE

Detects usage of "PresentationHost" which is a utility that runs ".xbap" (Browser Applications) files to download arbitrary files

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

XBAP Execution From Uncommon Locations Via PresentationHost.EXE

Detects the execution of ".xbap" (Browser Applications) files via PresentationHost.EXE from an uncommon location. These files can be abused to run malicious ".xbap" files any bypass AWL

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jul 01windows
Detectionmediumtest

Visual Studio NodejsTools PressAnyKey Arbitrary Binary Execution

Detects child processes of Microsoft.NodejsTools.PressAnyKey.exe that can be used to execute any other binary

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionmediumtest

Abusing Print Executable

Attackers can use print.exe for remote file copy

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Furkan CALISKAN+1Mon Oct 05windows
Detectionmediumtest

File Download Using ProtocolHandler.exe

Detects usage of "ProtocolHandler" to download files. Downloaded files will be located in the cache folder (for example - %LOCALAPPDATA%\Microsoft\Windows\INetCache\IE)

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautTue Jul 13windows
Detectionmediumtest

Potential Provlaunch.EXE Binary Proxy Execution Abuse

Detects child processes of "provlaunch.exe" which might indicate potential abuse to proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Aug 08windows
Detectionmediumtest

Screen Capture Activity Via Psr.EXE

Detects execution of Windows Problem Steps Recorder (psr.exe), a utility used to record the user screen and clicks.

WindowsProcess Creation
TA0009 · CollectionT1113 · Screen Capture
Beyu Denis+1Sat Oct 12windows
Detectionmediumexperimental

PUA - AdFind.EXE Execution

Detects execution of Adfind.exe utility, which can be used for reconnaissance in an Active Directory environment

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain Account
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 26windows
Detectionmediumtest

PUA - Advanced IP Scanner Execution

Detects the use of Advanced IP Scanner. Seems to be a popular tool for ransomware groups.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service DiscoveryT1135 · Network Share Discovery
Nasreddine Bencherchali (Nextron Systems)Tue May 12windows
Detectionmediumtest

PUA - Advanced Port Scanner Execution

Detects the use of Advanced Port Scanner.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service DiscoveryT1135 · Network Share Discovery
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionmediumtest

PUA - AdvancedRun Execution

Detects the execution of AdvancedRun utility

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1564.003 · Hidden Window+2
Florian Roth (Nextron Systems)Thu Jan 20windows
Detectionmediumtest

PUA - Mouse Lock Execution

In Kaspersky's 2020 Incident Response Analyst Report they listed legitimate tool "Mouse Lock" as being used for both credential access and collection in security incidents.

WindowsProcess Creation
TA0006 · Credential AccessTA0009 · CollectionT1056.002 · GUI Input Capture
Cian HeasleyThu Aug 13windows
Detectionmediumtest

PUA - SoftPerfect Netscan Execution

Detects usage of SoftPerfect's "netscan.exe". An application for scanning networks. It is actively used in-the-wild by threat actors to inspect and understand the network architecture of a victim.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Thu Apr 25windows
Detectionmediumtest

PUA - NimScan Execution

Detects usage of NimScan, a portscanner utility. In early 2025, adversaries were observed using this utility to scan for open ports on remote hosts in a compromised environment. This rule identifies the execution of NimScan based on the process image name and specific hash values associated with different versions of the tool.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionmediumtest

PUA - NirCmd Execution

Detects the use of NirCmd tool for command execution, which could be the result of legitimate administrative activity

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)+1Mon Jan 24windows
Detectionmediumtest

PUA - Nmap/Zenmap Execution

Detects usage of namp/zenmap. Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
François HubautFri Dec 10windows
Detectionmediumtest

PUA - PingCastle Execution

Detects the execution of PingCastle, a tool designed to quickly assess the Active Directory security level.

WindowsProcess Creation
TA0043 · ReconnaissanceT1595 · Active Scanning
Nasreddine Bencherchali (Nextron Systems)+1Thu Jan 11windows
Detectionmediumtest

PUA - Process Hacker Execution

Detects the execution of Process Hacker based on binary metadata information (Image, Hash, Imphash, etc). Process Hacker is a tool to view and manipulate processes, kernel options and other low level options. Threat actors abused older vulnerable versions to manipulate system processes.

WindowsProcess Creation
TA0005 · Defense EvasionTA0007 · DiscoveryTA0003 · PersistenceTA0004 · Privilege Escalation+3
Florian Roth (Nextron Systems)Mon Oct 10windows
Detectionmediumtest

PUA - Radmin Viewer Utility Execution

Detects the execution of Radmin which can be abused by an adversary to remotely control Windows machines

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1072 · Software Deployment Tools
François HubautSat Jan 22windows
Detectionmediumtest

PUA - Potential PE Metadata Tamper Using Rcedit

Detects the use of rcedit to potentially alter executable PE metadata properties, which could conceal efforts to rename system utilities for defense evasion.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System UtilitiesT1036 · MasqueradingT1027.005 · Indicator Removal from Tools+1
Micah BabinskiSun Dec 11windows
Detectionmediumtest

PUA - System Informer Execution

Detects the execution of System Informer, a task manager tool to view and manipulate processes, kernel options and other low level operations

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationTA0007 · DiscoveryTA0005 · Defense Evasion+3
Florian Roth (Nextron Systems)Mon May 08windows
Detectionmediumexperimental

PUA - TruffleHog Execution

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1083 · File and Directory DiscoveryT1552.001 · Credentials In Files
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24windows
Detectionmediumtest

PUA - WebBrowserPassView Execution

Detects the execution of WebBrowserPassView.exe. A password recovery tool that reveals the passwords stored by the following Web browsers, Internet Explorer (Version 4.0 - 11.0), Mozilla Firefox (All Versions), Google Chrome, Safari, and Opera

WindowsProcess Creation
TA0006 · Credential AccessT1555.003 · Credentials from Web Browsers
François HubautSat Aug 20windows
Detectionmediumtest

Python Inline Command Execution

Detects execution of python using the "-c" flag. This is could be used as a way to launch a reverse shell or execute live python code.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows