Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Windows Network Access Suspicious desktop.ini Action

Detects unusual processes accessing desktop.ini remotely over network share, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
Tim Shelton (HAWK.IO)Mon Dec 06windows
Detectionmediumtest

New or Renamed User Account with '$' Character

Detects the creation of a user with the "$" character. This can be used by attackers to hide a user or trick detection systems that lack the parsing mechanisms.

Windowssecurity
TA0005 · Defense EvasionT1036 · Masquerading
Ilyas Ochkov+1Fri Oct 25windows
Detectionmediumtest

Denied Access To Remote Desktop

This event is generated when an authenticated user who is not allowed to log on remotely attempts to connect to this computer through Remote Desktop. Often, this event can be generated by attackers when searching for available windows servers in the network.

Windowssecurity
TA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol
Pushkarev DmitrySat Jun 27windows
Detectionmediumtest

Password Policy Enumerated

Detects when the password policy is enumerated.

Windowssecurity
TA0007 · DiscoveryT1201 · Password Policy Discovery
Zach MathisFri May 19windows
Detectionmediumtest

Windows Pcap Drivers

Detects Windows Pcap driver installation based on a list of associated .sys files.

Windowssecurity
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Cian HeasleyWed Jun 10windows
Detectionmediumtest

Possible DC Shadow Attack

Detects DCShadow via create new SPN

Windowssecurity
TA0006 · Credential AccessTA0005 · Defense Evasionattack.t1207
Ilyas Ochkov+3Fri Oct 25windows
Detectionmediumtest

SCM Database Handle Failure

Detects non-system users failing to get a handle of the SCM database.

Windowssecurity
TA0007 · DiscoveryT1010 · Application Window Discovery
Roberto Rodriguez (Cyb3rWard0g)Mon Aug 12windows
Detectionmediumtest

SCM Database Privileged Operation

Detects non-system users performing privileged operation os the SCM database

Windowssecurity
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Roberto Rodriguez (Cyb3rWard0g)+1Thu Aug 15windows
Detectionmediumtest

Potential Secure Deletion with SDelete

Detects files that have extensions commonly seen while SDelete is used to wipe files.

Windowssecurity
TA0040 · ImpactTA0005 · Defense EvasionT1070.004 · File DeletionT1027.005 · Indicator Removal from Tools+3
Thomas PatzkeWed Jun 14windows
Detectionmediumtest

Remote Access Tool Services Have Been Installed - Security

Detects service installation of different remote access tools software. These software are often abused by threat actors to perform

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1543.003 · Windows Service+1
Connor Martin+1Fri Dec 23windows
Detectionmediumexperimental

File Access Of Signal Desktop Sensitive Data

Detects access to Signal Desktop's sensitive data files: db.sqlite and config.json. The db.sqlite file in Signal Desktop stores all locally saved messages in an encrypted SQLite database, while the config.json contains the decryption key needed to access that data. Since the key is stored in plain text, a threat actor who gains access to both files can decrypt and read sensitive messages without needing the users credentials. Currently the rule only covers the default Signal installation path in AppData\Roaming. Signal Portable installations may use different paths based on user configuration. Additional paths can be added to the selection as needed.

Windowssecurity
TA0006 · Credential AccessT1003 · OS Credential Dumping
Andreas Braathen (mnemonic.io)Sun Oct 19windows
Detectionmediumstable

A New Trust Was Created To A Domain

Addition of domains is seldom and should be verified for legitimacy.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Thomas PatzkeTue Dec 03windows
Detectionmediumstable

Addition of SID History to Active Directory Object

An attacker can use the SID history attribute to gain additional privileges.

Windowssecurity
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1134.005 · SID-History Injection
Thomas PatzkeSun Feb 19windows
Detectionmediumtest

Account Tampering - Suspicious Failed Logon Reasons

This method uses uncommon error codes on failed logons to determine suspicious activity and tampering with accounts that have been disabled or somehow restricted.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0001 · Initial Access+1
Florian Roth (Nextron Systems)Sun Feb 19windows
Detectionmediumtest

Group Policy Abuse for Privilege Addition

Detects the first occurrence of a modification to Group Policy Object Attributes to add privileges to user accounts or use them to add users as local admins.

Windowssecurity
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
Elastic Security+2Wed Sep 04windows
Detectionmediumtest

Startup/Logon Script Added to Group Policy Object

Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification+1
Elastic Security+2Fri Sep 06windows
Detectionmediumtest

Suspicious Remote Logon with Explicit Credentials

Detects suspicious processes logging on with explicit credentials

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+2
oscd.community+3Mon Oct 05windows
Detectionmediumtest

Potentially Suspicious AccessMask Requested From LSASS

Detects process handle on LSASS process with certain access mask

Windowssecurity
TA0006 · Credential Access2019-04-004 · CAR 2019-04-004T1003.001 · LSASS Memory
Roberto Rodriguez (Cyb3rWard0g)+5Fri Nov 01windows
Detectionmediumtest

Password Protected ZIP File Opened

Detects the extraction of password protected ZIP archives. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Mon May 09windows
Detectionmediumtest

Uncommon Outbound Kerberos Connection - Security

Detects uncommon outbound network activity via Kerberos default port indicating possible lateral movement or first stage PrivEsc via delegation.

Windowssecurity
TA0008 · Lateral MovementTA0006 · Credential AccessT1558.003 · Kerberoasting
Ilyas Ochkov+1Thu Oct 24windows
Detectionmediumtest

Suspicious Access to Sensitive File Extensions

Detects known sensitive file extensions accessed on a network share

Windowssecurity
TA0009 · CollectionT1039 · Data from Network Shared Drive
Samir BousseadenWed Apr 03windows
Detectionmediumtest

Suspicious Kerberos RC4 Ticket Encryption

Detects service ticket requests using RC4 encryption type

Windowssecurity
TA0006 · Credential AccessT1558.003 · Kerberoasting
Florian Roth (Nextron Systems)Mon Feb 06windows
Detectionmediumtest

Remote Service Activity via SVCCTL Named Pipe

Detects remote service activity via remote access to the svcctl named pipe

Windowssecurity
TA0008 · Lateral MovementTA0003 · PersistenceT1021.002 · SMB/Windows Admin Shares
Samir BousseadenWed Apr 03windows
Detectionmediumtest

Transferring Files with Credential Data via Network Shares

Transferring files with well-known filenames (sensitive files with credential data) using network shares

Windowssecurity
TA0006 · Credential AccessT1003.002 · Security Account ManagerT1003.001 · LSASS MemoryT1003.003 · NTDS
Teymur Kheirkhabarov+1Tue Oct 22windows
Detectionmediumstable

User Added to Local Administrator Group

Detects the addition of a new member to the local administrator group, which could be legitimate activity or a sign of privilege escalation activity

Windowssecurity
TA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationT1078 · Valid Accounts+2
Florian Roth (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

Potential Privileged System Service Operation - SeLoadDriverPrivilege

Detects the usage of the 'SeLoadDriverPrivilege' privilege. This privilege is required to load or unload a device driver. With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers. This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
xknow+1Mon Apr 08windows
Detectionmediumtest

Windows Defender Exclusion List Modified

Detects modifications to the Windows Defender exclusion registry key. This could indicate a potentially suspicious or even malicious activity by an attacker trying to add a new exclusion in order to bypass security.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
@barryshooshoogaSat Oct 26windows
Detectionmediumtest

Windows Defender Exclusion Registry Key - Write Access Requested

Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
@barryshooshooga+1Sat Oct 26windows
Detectionmediumtest

WMI Persistence - Security

Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs.

Windowssecurity
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)+2Tue Aug 22windows
Detectionmediumtest

Suspicious Application Installed

Detects suspicious application installed by looking at the added shortcut to the app resolver cache

Windowsshell-core
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Sun Aug 14windows
Detectionmediumtest

Suspicious Rejected SMB Guest Logon From IP

Detect Attempt PrintNightmare (CVE-2021-1675) Remote code execution in Windows Spooler Service

Windowssmbclient-security
TA0006 · Credential AccessT1110.001 · Password Guessing
Florian Roth (Nextron Systems)+2Wed Jun 30windows
Detectionmediumexperimental

Unsigned or Unencrypted SMB Connection to Share Established

Detects SMB server connections to shares without signing or encryption enabled. This could indicate potential lateral movement activity using unsecured SMB shares.

Windowssmbserver-connectivity
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Mohamed AbdelghaniSun Oct 19windows
Detectionmediumtest

NTLMv1 Logon Between Client and Server

Detects the reporting of NTLMv1 being used between a client and server. NTLMv1 is insecure as the underlying encryption algorithms can be brute-forced by modern hardware.

Windowssystem
TA0005 · Defense EvasionTA0008 · Lateral MovementT1550.002 · Pass the Hash
Tim Shelton+1Tue Apr 26windows
Detectionmediumexperimental

ISATAP Router Address Was Set

Detects the configuration of a new ISATAP router on a Windows host. While ISATAP is a legitimate Microsoft technology for IPv6 transition, unexpected or unauthorized ISATAP router configurations could indicate a potential IPv6 DNS Takeover attack using tools like mitm6. In such attacks, adversaries advertise themselves as DHCPv6 servers and set malicious ISATAP routers to intercept traffic. This detection should be correlated with network baselines and known legitimate ISATAP deployments in your environment.

Windowssystem
TA0040 · ImpactTA0006 · Credential AccessTA0009 · CollectionTA0001 · Initial Access+4
hamidSun Oct 19windows
Detectionmediumtest

Eventlog Cleared

One of the Windows Eventlogs has been cleared. e.g. caused by "wevtutil cl" command execution

Windowssystem
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs2016-04-002 · CAR 2016-04-002
Florian Roth (Nextron Systems)Tue Jan 10windows
Detectionmediumtest

Certificate Use With No Strong Mapping

Detects a user certificate that was valid but could not be mapped to a user in a strong way (such as via explicit mapping, key trust mapping, or a SID) This could be a sign of exploitation of the elevation of privilege vulnerabilities (CVE-2022-34691, CVE-2022-26931, CVE-2022-26923) that can occur when the KDC allows certificate spoofing by not requiring a strong mapping. Events where the AccountName and CN of the Subject do not match, or where the CN ends in a dollar sign indicating a machine, may indicate certificate spoofing.

Windowssystem
TA0004 · Privilege Escalation
@br4dy5Mon Oct 09windows
Detectionmediumexperimental

Crash Dump Created By Operating System

Detects "BugCheck" errors indicating the system rebooted due to a crash, capturing the bugcheck code, dump file path, and report ID.

Windowssystem
TA0006 · Credential AccessTA0009 · CollectionT1003.002 · Security Account ManagerT1005 · Data from Local System
Jason MullMon May 12windows
Detectionmediumstable

Windows Defender Threat Detection Service Disabled

Detects when the "Windows Defender Threat Protection" service is disabled.

Windowssystem
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionmediumtest

Invoke-Obfuscation COMPRESS OBFUSCATION - System

Detects Obfuscated Powershell via COMPRESS OBFUSCATION

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionmediumtest

Invoke-Obfuscation RUNDLL LAUNCHER - System

Detects Obfuscated Powershell via RUNDLL LAUNCHER

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionmediumtest

Anydesk Remote Access Software Service Installation

Detects the installation of the anydesk software service. Which could be an indication of anydesk abuse if you the software isn't already used.

Windowssystem
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)+1Thu Aug 11windows
Detectionmediumtest

CSExec Service Installation

Detects CSExec service installation and execution events

Windowssystem
TA0002 · ExecutionT1569.002 · Service Execution
Nasreddine Bencherchali (Nextron Systems)Mon Aug 07windows
Detectionmediumtest

Mesh Agent Service Installation

Detects a Mesh Agent service installation. Mesh Agent is used to remotely manage computers

Windowssystem
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Nov 28windows
Detectionmediumtest

NetSupport Manager Service Install

Detects NetSupport Manager service installation on the target system.

Windowssystem
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Mon Oct 31windows
Detectionmediumtest

PAExec Service Installation

Detects PAExec service installation

Windowssystem
TA0002 · ExecutionT1569.002 · Service Execution
Nasreddine Bencherchali (Nextron Systems)Wed Oct 26windows
Detectionmediumtest

New PDQDeploy Service - Server Side

Detects a PDQDeploy service installation which indicates that PDQDeploy was installed on the machines. PDQDeploy can be abused by attackers to remotely install packages or execute commands on target machines

Windowssystem
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Fri Jul 22windows
Detectionmediumtest

New PDQDeploy Service - Client Side

Detects PDQDeploy service installation on the target system. When a package is deployed via PDQDeploy it installs a remote service on the target machine with the name "PDQDeployRunner-X" where "X" is an integer starting from 1

Windowssystem
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Fri Jul 22windows
Detectionmediumtest

RemCom Service Installation

Detects RemCom service installation and execution events

Windowssystem
TA0002 · ExecutionT1569.002 · Service Execution
Nasreddine Bencherchali (Nextron Systems)Mon Aug 07windows