Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumexperimental

MSSQL Destructive Query

Detects the invocation of MS SQL transactions that are destructive towards table or database data, such as "DROP TABLE" or "DROP DATABASE".

Windowsapplication
TA0010 · ExfiltrationTA0040 · ImpactT1485 · Data Destruction
Daniel DegasperiWed Jun 04windows
Detectionmediumtest

MSSQL Server Failed Logon From External Network

Detects failed logon attempts from clients with external network IP to an MSSQL server. This can be a sign of a bruteforce attack.

Windowsapplication
TA0006 · Credential AccessT1110 · Brute Force
j4sonWed Oct 11windows
Detectionmediumtest

AppLocker Prevented Application or Script from Running

Detects when AppLocker prevents the execution of an Application, DLL, Script, MSI, or Packaged-App from running.

Windowsapplocker
TA0002 · ExecutionT1204.002 · Malicious FileT1059.001 · PowerShellT1059.003 · Windows Command Shell+3
Pushkarev DmitrySun Jun 28windows
Detectionmediumtest

Deployment AppX Package Was Blocked By AppLocker

Detects an appx package deployment that was blocked by AppLocker policy.

Windowsappxdeployment-server
TA0005 · Defense Evasion
François HubautWed Jan 11windows
Detectionmediumtest

AppX Package Deployment Failed Due to Signing Requirements

Detects an appx package deployment / installation with the error code "0x80073cff" which indicates that the package didn't meet the signing requirements.

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumtest

Potential Malicious AppX Package Installation Attempts

Detects potential installation or installation attempts of known malicious appx packages

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumtest

Deployment Of The AppX Package Was Blocked By The Policy

Detects an appx package deployment that was blocked by the local computer policy. The following events indicate that an AppX package deployment was blocked by a policy: - Event ID 441: The package deployment operation is blocked by the "Allow deployment operations in special profiles" policy - Event ID 442: Deployments to non-system volumes are blocked by the "Disable deployment of Windows Store apps to non-system volumes" policy." - Event ID 453: Package blocked by a platform policy. - Event ID 454: Package blocked by a platform policy.

Windowsappxdeployment-server
TA0005 · Defense Evasion
François HubautWed Jan 11windows
Detectionmediumtest

AppX Located in Uncommon Directory Added to Deployment Pipeline

Detects an appx package that was added to the pipeline of the "to be processed" packages that is located in uncommon locations.

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumexperimental

Windows AppX Deployment Full Trust Package Installation

Detects the installation of MSIX/AppX packages with full trust privileges which run with elevated privileges outside normal AppX container restrictions

Windowsappxdeployment-server
TA0005 · Defense EvasionTA0002 · ExecutionT1204.002 · Malicious FileT1553.005 · Mark-of-the-Web Bypass
Michael Haag+1Mon Nov 03windows
Detectionmediumexperimental

Windows AppX Deployment Unsigned Package Installation

Detects attempts to install unsigned MSIX/AppX packages using the -AllowUnsigned parameter via AppXDeployment-Server events

Windowsappxdeployment-server
TA0005 · Defense EvasionTA0002 · ExecutionT1204.002 · Malicious FileT1553.005 · Mark-of-the-Web Bypass
Michael Haag+1Mon Nov 03windows
Detectionmediumtest

Suspicious Digital Signature Of AppX Package

Detects execution of AppX packages with known suspicious or malicious signature

Windowsappxpackaging-om
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionmediumtest

BITS Transfer Job Downloading File Potential Suspicious Extension

Detects new BITS transfer job saving local files with potential suspicious extensions

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionmediumtest

BITS Transfer Job With Uncommon Or Suspicious Remote TLD

Detects a suspicious download using the BITS client from a FQDN that is unusual. Adversaries may abuse BITS jobs to persistently execute or clean up after malicious payloads.

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Fri Jun 10windows
Detectionmediumtest

Certificate Private Key Acquired

Detects when an application acquires a certificate private key

Windowscapi2
TA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Zach MathisSat May 13windows
Detectionmediumtest

Certificate Exported From Local Certificate Store

Detects when an application exports a certificate (and potentially the private key as well) from the local Windows certificate store.

Windowscertificateservicesclient-lifecycle-system
TA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Zach MathisSat May 13windows
Detectionmediumtest

DNS Query To MEGA Hosting Website - DNS Client

Detects DNS queries for subdomains related to MEGA sharing website

Windowsdns-client
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionmediumtest

DNS Query To Put.io - DNS Client

Detects DNS queries for subdomains related to "Put.io" sharing website.

Windowsdns-client
TA0011 · Command and Control
Omar KhaledFri Aug 23windows
Detectionmediumtest

Failed DNS Zone Transfer

Detects when a DNS zone transfer failed.

Windowsdns-server
TA0043 · ReconnaissanceT1590.002 · DNS
Zach MathisWed May 24windows
Detectionmediumtest

Uncommon New Firewall Rule Added In Windows Firewall Exception List

Detects when a rule has been added to the Windows Firewall exception list

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionmediumtest

New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE

Detects the addition of a new "Allow" firewall rule by the WMI process (WmiPrvSE.EXE). This can occur if an attacker leverages PowerShell cmdlets such as "New-NetFirewallRule", or directly uses WMI CIM classes such as "MSFT_NetFirewallRule".

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François Hubaut+1Fri May 10windows
Detectionmediumtest

A Rule Has Been Deleted From The Windows Firewall Exception List

Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionmediumtest

ETW Logging/Processing Option Disabled On IIS Server

Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François Hubaut+1Sun Oct 06windows
Detectionmediumtest

New Module Module Added To IIS Server

Detects the addition of a new module to an IIS server.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François HubautSun Oct 06windows
Detectionmediumtest

Potential Active Directory Reconnaissance/Enumeration Via LDAP

Detects potential Active Directory enumeration via LDAP

Windowsldap
TA0007 · DiscoveryT1069.002 · Domain GroupsT1087.002 · Domain AccountT1482 · Domain Trust Discovery
Adeem MawaniTue Jun 22windows
Detectionmediumtest

Standard User In High Privileged Group

Detect standard users login that are part of high privileged groups such as the Administrator group

Windowslsa-server
TA0006 · Credential AccessTA0004 · Privilege Escalation
François HubautFri Jan 13windows
Detectionmediumtest

MSExchange Transport Agent Installation - Builtin

Detects the Installation of a Exchange Transport Agent

Windowsmsexchange-management
TA0003 · PersistenceT1505.002 · Transport Agent
Tobias MichalskiTue Jun 08windows
Detectionmediumtest

NTLM Brute Force

Detects common NTLM brute force device names

Windowsntlm
TA0006 · Credential AccessT1110 · Brute Force
Jerry ShockleyWed Feb 02windows
Detectionmediumtest

Potential Remote Desktop Connection to Non-Domain Host

Detects logons using NTLM to hosts that are potentially not part of the domain.

Windowsntlm
TA0011 · Command and Controlattack.t1219.002
James PembertonFri May 22windows
Detectionmediumtest

OpenSSH Server Listening On Socket

Detects scenarios where an attacker enables the OpenSSH server and server starts to listening on SSH socket.

Windowsopenssh
TA0008 · Lateral MovementT1021.004 · SSH
mdecrevoisierTue Oct 25windows
Detectionmediumtest

Potential Access Token Abuse

Detects potential token impersonation and theft. Example, when using "DuplicateToken(Ex)" and "ImpersonateLoggedOnUser" with the "LOGON32_LOGON_NEW_CREDENTIALS flag".

Windowssecurity
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.001 · Token Impersonation/Theftstp.4u
Michaela Adams+1Sun Nov 06windows
Detectionmediumstable

Pass the Hash Activity 2

Detects the attack technique pass the hash which is used to move laterally inside the network

Windowssecurity
TA0005 · Defense EvasionTA0008 · Lateral MovementT1550.002 · Pass the Hash
Dave Kennedy+1Fri Jun 14windows
Detectionmediumtest

External Remote RDP Logon from Public IP

Detects successful logon from public IP address via RDP. This can indicate a publicly-exposed RDP port.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
Micah Babinski+1Thu Jan 19windows
Detectionmediumtest

Failed Logon From Public IP

Detects a failed logon attempt from a public IP. A login from a public IP can indicate a misconfigured firewall or network boundary.

Windowssecurity
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+3
NVISOWed May 06windows
Detectionmediumtest

Azure AD Health Monitoring Agent Registry Keys Access

This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent. This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object HKLM\SOFTWARE\Microsoft\Microsoft Online\Reporting\MonitoringAgent.

Windowssecurity
TA0007 · DiscoveryT1012 · Query Registry
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26windows
Detectionmediumtest

Azure AD Health Service Agents Registry Keys Access

This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Azure AD Health service agents (e.g AD FS). Information from AD Health service agents can be used to potentially abuse some of the features provided by those services in the cloud (e.g. Federation). This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object: HKLM:\SOFTWARE\Microsoft\ADHealthAgent. Make sure you set the SACL to propagate to its sub-keys.

Windowssecurity
TA0007 · DiscoveryT1012 · Query Registry
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26windows
Detectionmediumtest

Potential AD User Enumeration From Non-Machine Account

Detects read access to a domain user from a non-machine account

Windowssecurity
TA0007 · DiscoveryT1087.002 · Domain Account
Maxime ThiebautMon Mar 30windows
Detectionmediumtest

Remote Task Creation via ATSVC Named Pipe

Detects remote task creation via at.exe or API interacting with ATSVC namedpipe

Windowssecurity
TA0004 · Privilege EscalationTA0002 · ExecutionTA0008 · Lateral MovementTA0003 · Persistence+3
Samir BousseadenWed Apr 03windows
Detectionmediumtest

Processes Accessing the Microphone and Webcam

Potential adversaries accessing the microphone and webcam in an endpoint.

Windowssecurity
TA0009 · CollectionT1123 · Audio Capture
Roberto Rodriguez (Cyb3rWard0g)+1Sun Jun 07windows
Detectionmediumtest

DCERPC SMB Spoolss Named Pipe

Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.

Windowssecurity
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
OTR (Open Threat Research)Wed Nov 28windows
Detectionmediumexperimental

Windows Default Domain GPO Modification

Detects modifications to Default Domain or Default Domain Controllers Group Policy Objects (GPOs). Adversaries may modify these default GPOs to deploy malicious configurations across the domain.

Windowssecurity
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
Swachchhanda Shrawan Poudel (Nextron Systems)Sat Nov 22windows
Detectionmediumtest

Device Installation Blocked

Detects an installation of a device that is forbidden by the system policy

Windowssecurity
TA0001 · Initial AccessT1200 · Hardware Additions
François HubautFri Oct 14windows
Detectionmediumtest

DPAPI Domain Master Key Backup Attempt

Detects anyone attempting a backup for the DPAPI Master Key. This events gets generated at the source and not the Domain Controller.

Windowssecurity
TA0006 · Credential AccessT1003.004 · LSA Secrets
Roberto Rodriguez (Cyb3rWard0g)Sat Aug 10windows
Detectionmediumtest

Invoke-Obfuscation COMPRESS OBFUSCATION - Security

Detects Obfuscated Powershell via COMPRESS OBFUSCATION

Windowssecurity
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionmediumtest

Invoke-Obfuscation RUNDLL LAUNCHER - Security

Detects Obfuscated Powershell via RUNDLL LAUNCHER

Windowssecurity
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionmediumtest

ISO Image Mounted

Detects the mount of an ISO image on an endpoint

Windowssecurity
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Syed HasanSat May 29windows
Detectionmediumtest

Kerberoasting Activity - Initial Query

This rule will collect the data needed to start looking into possible kerberoasting activity. Further analysis or computation within the query is needed focusing on requests from one specific host/IP towards multiple service names within a time period of 5 seconds. You can then set a threshold for the number of requests and time between the requests to turn this into an alert.

Windowssecurity
TA0006 · Credential AccessT1558.003 · Kerberoasting
kostastsaleFri Jan 21windows
Detectionmediumexperimental

Potential AS-REP Roasting via Kerberos TGT Requests

Detects suspicious Kerberos TGT requests with pre-authentication disabled (Pre-Authentication Type = 0) and Ticket Encryption Type (0x17) i.e, RC4-HMAC. This may indicate an AS-REP Roasting attack, where attackers request AS-REP messages for accounts without pre-authentication and attempt to crack the encrypted ticket offline to recover user passwords.

Windowssecurity
ANosirThu May 22windows
Detectionmediumtest

LSASS Access From Non System Account

Detects potential mimikatz-like tools accessing LSASS from non system account

Windowssecurity
TA0006 · Credential AccessT1003.001 · LSASS Memory
Roberto Rodriguez (Cyb3rWard0g)Thu Jun 20windows