Rule Library

Sigma Rules

801 rules found for "privilege-escalation"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Potentially Suspicious Child Process of KeyScrambler.exe

Detects potentially suspicious child processes of KeyScrambler.exe

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege Escalation+2
Swachchhanda Shrawan PoudelMon May 13windows
Detectionhightest

Mavinject Inject DLL Into Running Process

Detects process injection using the signed Windows tool "Mavinject" via the "INJECTRUNNING" flag

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library InjectionT1218.013 · Mavinject
François Hubaut+1Mon Jul 12windows
Detectionhightest

Using SettingSyncHost.exe as LOLBin

Detects using SettingSyncHost.exe to run hijacked binary

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense Evasion+1
Anton Kutepov+1Wed Feb 05windows
Detectionmediumtest

Suspicious Driver Install by pnputil.exe

Detects when a possible suspicious driver is being installed via pnputil.exe lolbin

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
Hai Vaknin+2Thu Sep 30windows
Detectionhightest

Suspicious GrpConv Execution

Detects the suspicious execution of a utility to convert Windows 3.x .grp files or for persistence purposes by malicious software or actors

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
Florian Roth (Nextron Systems)Thu May 19windows
Detectionmediumtest

Potential DLL Injection Or Execution Using Tracker.exe

Detects potential DLL injection and execution using "Tracker.exe"

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.001 · Dynamic-link Library Injection
Avneet Singh+1Sun Oct 18windows
Detectionmediumexperimental

Windows Default Domain GPO Modification via GPME

Detects the use of the Group Policy Management Editor (GPME) to modify Default Domain or Default Domain Controllers Group Policy Objects (GPOs). Adversaries may leverage GPME to make stealthy changes in these default GPOs to deploy malicious GPOs configurations across the domain without raising suspicion.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
TropChaudSat Nov 22windows
Detectionhightest

Potential Mpclient.DLL Sideloading Via Defender Binaries

Detects potential sideloading of "mpclient.dll" by Windows Defender processes ("MpCmdRun" and "NisSrv") from their non-default directory.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Bhabesh RajMon Aug 01windows
Detectionhightest

Potential Process Injection Via Msra.EXE

Detects potential process injection via Microsoft Remote Asssistance (Msra.exe) by looking at suspicious child processes spawned from the aforementioned process. It has been a target used by many threat actors and used for discovery and persistence tactics

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Alexander McDonaldFri Jun 24windows
Detectionhightest

Suspicious Child Process Of SQL Server

Detects suspicious child processes of the SQLServer process. This could indicate potential RCE or SQL Injection.

WindowsProcess Creation
T1505.003 · Web ShellT1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessTA0003 · Persistence+1
FPT.EagleEye Team+1Fri Dec 11windows
Detectioncriticaltest

Suspicious Child Process Of Veeam Dabatase

Detects suspicious child processes of the Veeam service process. This could indicate potential RCE or SQL Injection.

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu May 04windows
Detectionmediumtest

Password Provided In Command Line Of Net.EXE

Detects a when net.exe is called with a password in the command line

WindowsProcess Creation
TA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation+3
Tim Shelton (HAWK.IO)Thu Dec 09windows
Detectionmediumtest

Potential Persistence Via Netsh Helper DLL

Detects the execution of netsh with "add helper" flag in order to add a custom helper DLL. This technique can be abused to add a malicious helper DLL that can be used as a persistence proxy that gets called when netsh.exe is executed.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.007 · Netsh Helper DLLS0108 · S0108
Victor Sergeev+1Fri Oct 25windows
Detectionlowtest

New Service Creation Using PowerShell

Detects the creation of a new service using powershell.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Timur Zinniatullin+2Mon Feb 20windows
Detectionmediumtest

Suspicious Reconnaissance Activity Using Get-LocalGroupMember Cmdlet

Detects suspicious reconnaissance command line activity on Windows systems using the PowerShell Get-LocalGroupMember Cmdlet

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local Account
Nasreddine Bencherchali (Nextron Systems)Mon Oct 10windows
Detectionhightest

Abuse of Service Permissions to Hide Services Via Set-Service

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionhightest

Suspicious Service DACL Modification Via Set-Service Cmdlet

Detects suspicious DACL modifications via the "Set-Service" cmdlet using the "SecurityDescriptorSddl" flag (Only available with PowerShell 7) that can be used to hide services or make them unstopable

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Tue Oct 18windows
Detectionmediumtest

PUA - AdvancedRun Execution

Detects the execution of AdvancedRun utility

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1564.003 · Hidden Window+2
Florian Roth (Nextron Systems)Thu Jan 20windows
Detectionhightest

PUA - AdvancedRun Suspicious Execution

Detects the execution of AdvancedRun utility in the context of the TrustedInstaller, SYSTEM, Local Service or Network Service accounts

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.002 · Create Process with Token
Florian Roth (Nextron Systems)Thu Jan 20windows
Detectionhightest

PUA - Crassus Execution

Detects Crassus, a Windows privilege escalation discovery tool, based on PE metadata characteristics.

WindowsProcess Creation
TA0007 · DiscoveryTA0043 · ReconnaissanceT1590.001 · Domain Properties
Martin MuellerMon Apr 17windows
Detectionhighexperimental

PUA - Kernel Driver Utility (KDU) Execution

Detects execution of the Kernel Driver Utility (KDU) tool. KDU can be used to bypass driver signature enforcement and load unsigned or malicious drivers into the Windows kernel. Potentially allowing for privilege escalation, persistence, or evasion of security controls.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Matt Anderson+2Fri Jan 02windows
Detectionmediumtest

PUA - Process Hacker Execution

Detects the execution of Process Hacker based on binary metadata information (Image, Hash, Imphash, etc). Process Hacker is a tool to view and manipulate processes, kernel options and other low level options. Threat actors abused older vulnerable versions to manipulate system processes.

WindowsProcess Creation
TA0005 · Defense EvasionTA0007 · DiscoveryTA0003 · PersistenceTA0004 · Privilege Escalation+3
Florian Roth (Nextron Systems)Mon Oct 10windows
Detectionmediumtest

PUA - System Informer Execution

Detects the execution of System Informer, a task manager tool to view and manipulate processes, kernel options and other low level operations

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationTA0007 · DiscoveryTA0005 · Defense Evasion+3
Florian Roth (Nextron Systems)Mon May 08windows
Detectionhightest

PUA - Wsudo Suspicious Execution

Detects usage of wsudo (Windows Sudo Utility). Which is a tool that let the user execute programs with different permissions (System, Trusted Installer, Administrator...etc)

WindowsProcess Creation
TA0002 · ExecutionTA0004 · Privilege EscalationT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri Dec 02windows
Detectionmediumtest

Potential Persistence Attempt Via Run Keys Using Reg.EXE

Detects suspicious command line reg.exe tool adding key to RUN key in Registry

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)+1Mon Jun 28windows
Detectionmediumtest

Direct Autorun Keys Modification

Detects direct modification of autostart extensibility point (ASEP) in registry using reg.exe.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+3Fri Oct 25windows
Detectionmediumtest

Modify Group Policy Settings

Detect malicious GPO modifications can be used to implement many other malicious behaviors.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
François HubautFri Aug 19windows
Detectionmediumtest

Suspicious ScreenSave Change by Reg.exe

Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.002 · Screensaver
François HubautThu Aug 19windows
Detectionmediumtest

Changing Existing Service ImagePath Value Via Reg.EXE

Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Adversaries may use flaws in the permissions for registry to redirect from the originally specified executable to one that they control, in order to launch their own code at Service start. Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.011 · Services Registry Permissions Weakness
François HubautThu Dec 30windows
Detectionhightest

Reg Add Suspicious Paths

Detects when an adversary uses the reg.exe utility to add or modify new keys or subkeys

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify RegistryT1562.001 · Disable or Modify Tools
François Hubaut+1Fri Aug 19windows
Detectionhightest

Regedit as Trusted Installer

Detects a regedit started with TrustedInstaller privileges or by ProcessHacker.exe

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Florian Roth (Nextron Systems)Thu May 27windows
Detectionmediumtest

DLL Execution Via Register-cimprovider.exe

Detects using register-cimprovider.exe to execute arbitrary dll file.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574 · Hijack Execution Flow
Ivan Dyachkov+2Wed Oct 07windows
Detectionmediumtest

Enumeration for 3rd Party Creds From CLI

Detects processes that query known 3rd party registry keys that holds credentials via commandline

WindowsProcess Creation
TA0006 · Credential AccessT1552.002 · Credentials in Registry
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

Suspicious Debugger Registration Cmdline

Detects the registration of a debugger for a program that is available in the logon screen (sticky key backdoor).

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.008 · Accessibility Features
Florian Roth (Nextron Systems)+2Fri Sep 06windows
Detectionhightest

Potential Persistence Via Logon Scripts - CommandLine

Detects the addition of a new LogonScript to the registry value "UserInitMprLogonScript" for potential persistence

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1037.001 · Logon Script (Windows)
Tom UeltschiSat Jan 12windows
Detectionhightest

Potential Privilege Escalation via Service Permissions Weakness

Detect modification of services configuration (ImagePath, FailureCommand and ServiceDLL) in registry by processes with Medium integrity level

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Teymur KheirkhabarovSat Oct 26windows
Detectionmediumtest

Regsvr32 DLL Execution With Uncommon Extension

Detects a "regsvr32" execution where the DLL doesn't contain a common file extension.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574 · Hijack Execution Flow+1
Florian Roth (Nextron Systems)Wed Jul 17windows
Detectionhightest

Renamed ZOHO Dctask64 Execution

Detects a renamed "dctask64.exe" execution, a signed binary by ZOHO Corporation part of ManageEngine Endpoint Central. This binary can be abused for DLL injection, arbitrary command and process execution.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1036 · MasqueradingT1055.001 · Dynamic-link Library Injection+2
Florian Roth (Nextron Systems)+1Tue Jan 28windows
Detectionhightest

Renamed Mavinject.EXE Execution

Detects the execution of a renamed version of the "Mavinject" process. Which can be abused to perform process injection using the "/INJECTRUNNING" flag

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library InjectionT1218.013 · Mavinject
François Hubaut+1Mon Dec 05windows
Detectionhighexperimental

Renamed Schtasks Execution

Detects the execution of renamed schtasks.exe binary, which is a legitimate Windows utility used for scheduling tasks. One of the very common persistence techniques is schedule malicious tasks using schtasks.exe. Since, it is heavily abused, it is also heavily monitored by security products. To evade detection, threat actors may rename the schtasks.exe binary to schedule their malicious tasks.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionhightest

Renamed Vmnat.exe Execution

Detects renamed vmnat.exe or portable version that can be used for DLL side-loading

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
elhoimFri Sep 09windows
Detectionhightest

Suspicious Rundll32 Invoking Inline VBScript

Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)Fri Mar 05windows
Detectionhightest

Suspicious NTLM Authentication on the Printer Spooler Service

Detects a privilege elevation attempt by coercing NTLM authentication on the Printer Spooler service

WindowsProcess Creation
TA0004 · Privilege EscalationTA0006 · Credential AccessT1212 · Exploitation for Credential Access
Elastic Security+1Wed May 04windows
Detectionhightest

Rundll32 Registered COM Objects

load malicious registered COM objects

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
François HubautSun Feb 13windows
Detectionhightest

Possible Privilege Escalation via Weak Service Permissions

Detection of sc.exe utility spawning by user with Medium integrity level to change service ImagePath or FailureCommand

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Teymur KheirkhabarovSat Oct 26windows
Detectionlowtest

New Service Creation Using Sc.EXE

Detects the creation of a new service using the "sc.exe" utility.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Timur Zinniatullin+2Mon Feb 20windows
Detectionmediumtest

New Kernel Driver Via SC.EXE

Detects creation of a new service (kernel driver) with the type "kernel"

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jul 14windows
Detectionhightest

Allow Service Access Using Security Descriptor Tampering Via Sc.EXE

Detects suspicious DACL modifications to allow access to a service from a suspicious trustee. This can be used to override access restrictions set by previous ACLs.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Tue Feb 28windows