Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Threat Huntmediumtest

Mail Forwarding/Redirecting Activity In O365

Detects email forwarding or redirecting activity in O365 Audit logs.

Microsoft 365audit
TA0009 · CollectionT1114.003 · Email Forwarding RuleTA0005 · Defense EvasionT1564.008 · Email Hiding Rules+3
RedCanary Team+1Wed Oct 11cloud
Threat Huntmediumexperimental

Inbox Rules Creation Or Update Activity in O365

Detects inbox rule creation or update via O365 Audit logs, a technique commonly observed in Business Email Compromise (BEC) attacks to hide emails. The usage of inbox rules can be a sign of a compromised mailbox, where an attacker is attempting to evade detections by suppressing or redirecting incoming emails. Analysts should review these rules in context, validate whether they reflect normal user behavior, and correlate with other indicators such as unusual login activity or recent mailbox rule modifications.

Microsoft 365audit
TA0005 · Defense EvasionT1564.008 · Email Hiding RulesTA0010 · ExfiltrationTA0009 · Collection+2
Marco Pedrinazzi (InTheCyber)Fri Jan 09cloud
Threat Huntmediumtest

Python Path Configuration File Creation - Linux

Detects creation of a Python path configuration file (.pth) in Python library folders, which can be maliciously abused for code execution and persistence. Modules referenced by these files are run at every Python startup (v3.5+), regardless of whether the module is imported by the calling script. Default paths are '\lib\site-packages\*.pth' (Windows) and '/lib/pythonX.Y/site-packages/*.pth' (Unix and macOS).

LinuxFile Event
TA0002 · ExecutionT1059.006 · Pythondetection.threat-hunting
Andreas Braathen (mnemonic.io)Thu Apr 25linux
Threat Huntmediumtest

Terminate Linux Process Via Kill

Detects usage of command line tools such as "kill", "pkill" or "killall" to terminate or signal a running process.

LinuxProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defensesdetection.threat-hunting
Tuan Le (NCSGroup)Thu Mar 16linux
Threat Huntmediumtest

Python Path Configuration File Creation - MacOS

Detects creation of a Python path configuration file (.pth) in Python library folders, which can be maliciously abused for code execution and persistence. Modules referenced by these files are run at every Python startup (v3.5+), regardless of whether the module is imported by the calling script. Default paths are '\lib\site-packages\*.pth' (Windows) and '/lib/pythonX.Y/site-packages/*.pth' (Unix and macOS).

macOSFile Event
TA0002 · ExecutionT1059.006 · Pythondetection.threat-hunting
Andreas Braathen (mnemonic.io)Thu Apr 25macos
Threat Huntmediumtest

Clipboard Data Collection Via Pbpaste

Detects execution of the "pbpaste" utility, which retrieves the contents of the clipboard (a.k.a. pasteboard) and writes them to the standard output (stdout). The utility is often used for creating new files with the clipboard content or for piping clipboard contents to other commands. It can also be used in shell scripts that may require clipboard content as input. Attackers can abuse this utility in order to collect data from the user clipboard, which may contain passwords or sensitive information. Use this rule to hunt for potential abuse of the utility by looking at the parent process and any potentially suspicious command line content.

macOSProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1115 · Clipboard Datadetection.threat-hunting
Daniel CortezTue Jul 30macos
Threat Huntmediumexperimental

Low Reputation Effective Top-Level Domain (eTLD)

Detects DNS queries to domains within known low reputation eTLDs. This rule uses AlphaSOC's threat intelligence data and is updated on a monthly basis.

dns
TA0011 · Command and ControlT1071.004 · DNSTA0001 · Initial Accessdetection.threat-hunting
Norbert Jaśniewicz (AlphaSOC)Mon Aug 04network
Threat Huntmediumtest

.Class Extension URI Ending Request

Detects requests to URI ending with the ".class" extension in proxy logs. This could rules can be used to hunt for potential downloads of Java classes as seen for example in Log4shell exploitation attacks against Log4j.

Proxy Log
TA0001 · Initial Accessdetection.threat-hunting
Andreas HunkelerTue Dec 21web
Threat Huntmediumtest

Potential Remote WMI ActiveScriptEventConsumers Activity

Detect potential adversaries leveraging WMI ActiveScriptEventConsumers remotely to move laterally in a network. This event is best correlated and used as an enrichment to determine the potential lateral movement activity.

Windowssecurity
TA0008 · Lateral MovementTA0004 · Privilege Escalationdetection.threat-huntingTA0003 · Persistence+1
Roberto Rodriguez (Cyb3rWard0g)+1Wed Sep 02windows
Threat Huntmediumtest

CreateRemoteThread API and LoadLibrary

Detects potential use of CreateRemoteThread api and LoadLibrary function to inject DLL into a process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library Injectiondetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sun Aug 11windows
Threat Huntmediumtest

Remote Thread Creation Via PowerShell

Detects the creation of a remote thread from a Powershell process to another process

WindowsRemote Thread Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Nikita Nazarov+1Tue Oct 06windows
Threat Huntmediumtest

Remote Thread Created In Shell Application

Detects remote thread creation in command shell applications, such as "Cmd.EXE" and "PowerShell.EXE". It is a common technique used by malware, such as IcedID, to inject malicious code and execute it within legitimate processes.

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
Splunk Research TeamMon Jul 29windows
Threat Huntmediumtest

Access To Sysvol Policies Share By Uncommon Process

Detects file access requests to the Windows Sysvol Policies Share by uncommon processes

Windowsfile_access
TA0006 · Credential AccessT1552.006 · Group Policy Preferencesdetection.threat-hunting
François HubautThu Dec 21windows
Threat Huntmediumtest

Python Path Configuration File Creation - Windows

Detects creation of a Python path configuration file (.pth) in Python library folders, which can be maliciously abused for code execution and persistence. Modules referenced by these files are run at every Python startup (v3.5+), regardless of whether the module is imported by the calling script. Default paths are '\lib\site-packages\*.pth' (Windows) and '/lib/pythonX.Y/site-packages/*.pth' (Unix and macOS).

WindowsFile Event
TA0002 · ExecutionT1059.006 · Pythondetection.threat-hunting
Andreas Braathen (mnemonic.io)+1Thu Apr 25windows
Threat Huntmediumtest

VsCode Code Tunnel Execution File Indicator

Detects the creation of a file with the name "code_tunnel.json" which indicate execution and usage of VsCode tunneling utility. Attackers can abuse this functionality to establish a C2 channel

WindowsFile Event
TA0011 · Command and Controldetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25windows
Threat Huntmediumexperimental

WDAC Policy File Creation In CodeIntegrity Folder

Attackers can craft a custom Windows Defender Application Control (WDAC) policy that blocks Endpoint Detection and Response (EDR) components while allowing their own malicious code. The policy is placed in the privileged Windows Code Integrity folder (C:\Windows\System32\CodeIntegrity\). Upon reboot, the policy prevents EDR drivers from loading, effectively bypassing security measures and may further enable undetected lateral movement within an Active Directory environment.

WindowsFile Event
TA0005 · Defense EvasionT1562.001 · Disable or Modify Toolsdetection.threat-hunting
Andreas Braathen (mnemonic.io)Thu Jan 30windows
Threat Huntmediumtest

WebDAV Temporary Local File Creation

Detects the creation of WebDAV temporary files with potentially suspicious extensions

WindowsFile Event
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing+1
Micah BabinskiMon Aug 21windows
Threat Huntmediumtest

Non-DLL Extension File Renamed With DLL Extension

Detects rename operations of files with non-DLL extensions to files with a DLL extension. This is often performed by malware in order to avoid initial detections based on extensions.

WindowsFile Rename
TA0005 · Defense EvasionT1036.008 · Masquerade File Typedetection.threat-hunting
François HubautSat Feb 19windows
Threat Huntmediumtest

Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process

Detects the load of dbghelp/dbgcore DLL by a potentially uncommon or potentially suspicious process. The Dbghelp and Dbgcore DLLs export functions that allow for the dump of process memory. Tools like ProcessHacker, Task Manager and some attacker tradecraft use the MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity C2 Framework has a module that leverages this API to dump the contents of Lsass.exe and transfer it over the network back to the attacker's machine. Keep in mind that many legitimate Windows processes and services might load the aforementioned DLLs for debugging or other related purposes. Investigate the CommandLine and the Image location of the process loading the DLL.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003.001 · LSASS Memorydetection.threat-hunting
Perez Diego+2Sun Oct 27windows
Threat Huntmediumexperimental

WerFaultSecure Loading DbgCore or DbgHelp - EDR-Freeze

Detects the loading of dbgcore.dll or dbghelp.dll by WerFaultSecure.exe, which has been observed in EDR-Freeze attacks to suspend processes and evade detection. However, this behavior has also been observed during normal software installations, so further investigation is required to confirm malicious activity. When threat hunting, look for this activity in conjunction with other suspicious processes starting, network connections, or file modifications that occur shortly after the DLL load. Pay special attention to timing - if other malicious activities occur during or immediately after this library loading, it may indicate EDR evasion attempts. Also correlate with any EDR/AV process suspension events or gaps in security monitoring during the timeframe.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1562.001 · Disable or Modify Toolsdetection.threat-hunting
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Threat Huntmediumtest

Dfsvc.EXE Network Connection To Non-Local IPs

Detects network connections from "dfsvc.exe" used to handled ClickOnce applications to non-local IPs

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Huntmediumtest

Dllhost.EXE Initiated Network Connection To Non-Local IP Address

Detects Dllhost.EXE initiating a network connection to a non-local IP address. Aside from Microsoft own IP range that needs to be excluded. Network communication from Dllhost will depend entirely on the hosted DLL. An initial baseline is recommended before deployment.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · ExecutionT1559.001 · Component Object Model+1
bartblazeMon Jul 13windows
Threat Huntmediumtest

HH.EXE Initiated HTTP Network Connection

Detects a network connection initiated by the "hh.exe" process to HTTP destination ports, which could indicate the execution/download of remotely hosted .chm files.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.001 · Compiled HTML Filedetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Oct 05windows
Threat Huntmediumtest

Potentially Suspicious Azure Front Door Connection

Detects connections with Azure Front Door (known legitimate service that can be leveraged for C2) that fall outside of known benign behavioral baseline (not using common apps or common azurefd.net endpoints)

WindowsNetwork Connection
TA0011 · Command and ControlT1102.002 · Bidirectional CommunicationT1090.004 · Domain Frontingdetection.threat-hunting
Isaac DunhamThu Nov 07windows
Threat Huntmediumtest

Network Connection Initiated From Users\Public Folder

Detects a network connection initiated from a process located in the "C:\Users\Public" folder. Attacker are known to drop their malicious payloads and malware in this directory as its writable by everyone. Use this rule to hunt for potential suspicious or uncommon activity in your environement.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Fri May 31windows
Threat Huntmediumtest

Uncommon PowerShell Hosts

Detects alternate PowerShell hosts potentially bypassing detections looking for powershell.exe

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sun Aug 11windows
Threat Huntmediumexperimental

Mail Forwarding/Redirecting Activity Via ExchangePowerShell Cmdlet

Detects email forwarding or redirecting activity via ExchangePowerShell Cmdlet

WindowsPowerShell Script
TA0009 · CollectionT1114.003 · Email Forwarding RuleTA0005 · Defense EvasionT1564.008 · Email Hiding Rules+3
Nasreddine Bencherchali (Nextron Systems)+1Sun Mar 01windows
Threat Huntmediumexperimental

Inbox Rules Creation Or Update Activity Via ExchangePowerShell Cmdlet

Detects inbox rule creation or update via ExchangePowerShell cmdlet, a technique commonly observed in Business Email Compromise (BEC) attacks to hide emails. The usage of inbox rules can be a sign of a compromised mailbox, where an attacker is attempting to evade detections by suppressing or redirecting incoming emails. Analysts should review these rules in context, validate whether they reflect normal user behavior, and correlate with other indicators such as unusual login activity or recent mailbox rule modifications.

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.008 · Email Hiding RulesTA0010 · ExfiltrationTA0009 · Collection+2
Marco Pedrinazzi (InTheCyber)Tue Feb 10windows
Threat Huntmediumtest

Windows Mail App Mailbox Access Via PowerShell Script

Detects PowerShell scripts that try to access the default Windows MailApp MailBox. This indicates manipulation of or access to the stored emails of a user. E.g. this could be used by an attacker to exfiltrate or delete the content of the emails.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.008 · Clear Mailbox Datadetection.threat-hunting
François HubautSat Jul 08windows
Threat Huntmediumtest

SMB over QUIC Via PowerShell Script

Detects the mounting of Windows SMB shares over QUIC, which can be an unexpected event in some enterprise environments

WindowsPowerShell Script
TA0008 · Lateral MovementT1570 · Lateral Tool Transferdetection.threat-hunting
François HubautFri Jul 21windows
Threat Huntmediumtest

Potential Registry Reconnaissance Via PowerShell Script

Detects PowerShell scripts with potential registry reconnaissance capabilities. Adversaries may interact with the Windows registry to gather information about the system credentials, configuration, and installed software.

WindowsPowerShell Script
TA0007 · DiscoveryT1012 · Query RegistryT1007 · System Service Discoverydetection.threat-hunting
François HubautSun Jul 02windows
Threat Huntmediumtest

Potential Data Exfiltration Over SMTP Via Send-MailMessage Cmdlet

Detects the execution of a PowerShell script with a call to the "Send-MailMessage" cmdlet along with the "-Attachments" flag. This could be a potential sign of data exfiltration via Email. Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.

WindowsPowerShell Script
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocoldetection.threat-hunting
François HubautMon Sep 26windows
Threat Huntmediumtest

Powershell Token Obfuscation - Powershell

Detects TOKEN OBFUSCATION technique from Invoke-Obfuscation in Powershell scripts. Use this rule as a threat-hunting baseline to find obfuscated scripts in your environment. Once tested and tuned, consider deploying a production detection rule based on this hunting rule.

WindowsPowerShell Script
TA0005 · Defense EvasionT1027.009 · Embedded Payloadsdetection.threat-hunting
François HubautTue Dec 27windows
Threat Huntmediumtest

WinAPI Library Calls Via PowerShell Scripts

Detects calls to WinAPI libraries from PowerShell scripts. Attackers can often leverage these APIs to avoid detection based on typical PowerShell function calls. Use this rule as a basis to hunt for interesting scripts.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellT1106 · Native APIdetection.threat-hunting
Nikita Nazarov+2Fri Jul 21windows
Threat Huntmediumtest

WinAPI Function Calls Via PowerShell Scripts

Detects calls to WinAPI functions from PowerShell scripts. Attackers can often leverage these APIs to avoid detection based on typical PowerShell function calls. Use this rule as a basis to hunt for interesting scripts.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellT1106 · Native APIdetection.threat-hunting
Nikita Nazarov+2Fri Jul 21windows
Threat Huntmediumtest

Potential Credential Dumping Attempt Via PowerShell

Detects a PowerShell process requesting access to "lsass.exe", which can be indicative of potential credential dumping attempts

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS Memorydetection.threat-hunting
oscd.community+1Tue Oct 06windows
Threat Huntmediumtest

LSASS Access From Program In Potentially Suspicious Folder

Detects process access to LSASS memory with suspicious access flags and from a potentially suspicious folder

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatzdetection.threat-hunting
Florian Roth (Nextron Systems)Sat Nov 27windows
Threat Huntmediumtest

Uncommon GrantedAccess Flags On LSASS

Detects process access to LSASS memory with uncommon access flags 0x410 and 0x01410

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatzdetection.threat-hunting
Florian Roth (Nextron Systems)Sun Mar 13windows
Threat Huntmediumtest

Potential Shellcode Injection

Detects potential shellcode injection as seen used by tools such as Metasploit's migrate and Empire's psinject.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
Bhabesh RajFri Mar 11windows
Threat Huntmediumtest

Headless Process Launched Via Conhost.EXE

Detects the launch of a child process via "conhost.exe" with the "--headless" flag. The "--headless" flag hides the windows from the user upon execution.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shell+1
Nasreddine Bencherchali (Nextron Systems)Tue Jul 23windows
Threat Huntmediumtest

Dynamic .NET Compilation Via Csc.EXE - Hunting

Detects execution of "csc.exe" to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Deliverydetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Aug 02windows
Threat Huntmediumtest

File Download Via Curl.EXE

Detects file download using curl.exe

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Tue Jul 05windows
Threat Huntmediumtest

Potential Data Exfiltration Via Curl.EXE

Detects the execution of the "curl" process with "upload" flags. Which might indicate potential data exfiltration

WindowsProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer+1
Florian Roth (Nextron Systems)+1Fri Jul 03windows
Threat Huntmediumtest

Curl.EXE Execution With Custom UserAgent

Detects execution of curl.exe with custom useragent options

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocolsdetection.threat-hunting
François HubautSun Jan 23windows
Threat Huntmediumtest

ClickOnce Deployment Execution - Dfsvc.EXE Child Process

Detects child processes of "dfsvc" which indicates a ClickOnce deployment execution.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Huntmediumtest

Diskshadow Child Process Spawned

Detects any child process spawning from "Diskshadow.exe". This could be due to executing Diskshadow in interpreter mode or script mode and using the "exec" flag to launch other applications.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Harjot SinghFri Sep 15windows
Threat Huntmediumtest

Diskshadow Script Mode Execution

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag. Attackers often abuse "diskshadow" to execute scripts that deleted the shadow copies on the systems. Investigate the content of the scripts and its location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Ivan Dyachkov+1Wed Oct 07windows
Threat Huntmediumtest

Potential DLL Sideloading Activity Via ExtExport.EXE

Detects the execution of "Extexport.exe".A utility that is part of the Internet Explorer browser and is used to export and import various settings and data, particularly when switching between Internet Explorer and other web browsers like Firefox. It allows users to transfer bookmarks, browsing history, and other preferences from Internet Explorer to Firefox or vice versa. It can be abused as a tool to side load any DLL. If a folder is provided in the command line it'll load any DLL with one of the following names "mozcrt19.dll", "mozsqlite3.dll", or "sqlite.dll". Arbitrary DLLs can also be loaded if a specific number of flags was provided.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
François Hubaut+1Fri Nov 26windows