Rule Library

Sigma Rules

889 rules found for "persistence"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Non-privileged Usage of Reg or Powershell

Search for usage of reg or Powershell by non-privileged users to modify service configuration in registry

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Teymur Kheirkhabarov+2Mon Oct 05windows
Detectionhightest

Suspicious Process Execution From Fake Recycle.Bin Folder

Detects process execution from a fake recycle bin folder, often used to avoid security solution.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasion
X__Junior (Nextron Systems)Wed Jul 12windows
Detectionmediumtest

Registry Modification of MS-settings Protocol Handler

Detects registry modifications to the 'ms-settings' protocol handler, which is frequently targeted for UAC bypass or persistence. Attackers can modify this registry to execute malicious code with elevated privileges by hijacking the command execution path.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · PersistenceT1548.002 · Bypass User Account Control+2
François Hubaut+1Mon Dec 20windows
Detectionhightest

Suspicious New Service Creation

Detects creation of a new service via "sc" command or the powershell "new-service" cmdlet with suspicious binary paths

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jul 14windows
Detectionhightest

Tasks Folder Evasion

The Tasks folder in system32 and syswow64 are globally writable paths. Adversaries can take advantage of this and load or influence any script hosts or ANY .NET Application in Tasks to load and execute a custom assembly into cscript, wscript, regsvr32, mshta, eventvwr

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0002 · Execution+1
SreemanMon Jan 13windows
Detectionhighexperimental

Suspicious Velociraptor Child Process

Detects the suspicious use of the Velociraptor DFIR tool to execute other tools or download additional payloads, as seen in a campaign where it was abused for remote access and to stage further attacks.

WindowsProcess Creation
TA0011 · Command and ControlTA0003 · PersistenceTA0005 · Defense EvasionT1219 · Remote Access Software
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Aug 29windows
Detectionmediumtest

Sysinternals PsService Execution

Detects usage of Sysinternals PsService which can be abused for service reconnaissance and tampering

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jun 16windows
Detectionmediumtest

Sysinternals PsSuspend Execution

Detects usage of Sysinternals PsSuspend which can be abused to suspend critical processes

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Mar 23windows
Detectionhighexperimental

User Shell Folders Registry Modification via CommandLine

Detects modifications to User Shell Folders registry values via reg.exe or PowerShell, which could indicate persistence attempts. Attackers may modify User Shell Folders registry values to point to malicious executables or scripts that will be executed during startup. This technique is often used to maintain persistence on a compromised system by ensuring that malicious payloads are executed automatically.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1547.001 · Registry Run Keys / Startup FolderTA0005 · Defense Evasion+1
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jan 05windows
Detectionhightest

Uncommon Userinit Child Process

Detects uncommon "userinit.exe" child processes, which could be a sign of uncommon shells or login scripts used for persistence.

WindowsProcess Creation
TA0004 · Privilege EscalationT1037.001 · Logon Script (Windows)TA0003 · Persistence
Tom Ueltschi+1Sat Jan 12windows
Detectionmediumexperimental

Registry Modification Attempt Via VBScript

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods via common LOLBINs. It could be an attempt to modify the registry for persistence without using straightforward methods like regedit.exe, reg.exe, or PowerShell. Threat Actors may use this technique to evade detection by security solutions that monitor for direct registry modifications through traditional tools.

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionmediumtest

Verclsid.exe Runs COM Object

Detects when verclsid.exe is used to run COM object via GUID

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Victor Sergeev+1Fri Oct 09windows
Detectionmediumtest

Suspicious VBoxDrvInst.exe Parameters

Detect VBoxDrvInst.exe run with parameters allowing processing INF file. This allows to create values in the registry and install drivers. For example one could use this technique to obtain persistence via modifying one of Run or RunOnce registry keys

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Konstantin Grishchenko+1Tue Oct 06windows
Detectionmediumtest

Potential Persistence Via VMwareToolBoxCmd.EXE VM State Change Script

Detects execution of the "VMwareToolBoxCmd.exe" with the "script" and "set" flag to setup a specific script to run for a specific VM state

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Jun 14windows
Detectionhightest

Suspicious Persistence Via VMwareToolBoxCmd.EXE VM State Change Script

Detects execution of the "VMwareToolBoxCmd.exe" with the "script" and "set" flag to setup a specific script that's located in a potentially suspicious location to run for a specific VM state

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Jun 14windows
Detectionhightest

VMToolsd Suspicious Child Process

Detects suspicious child process creations of VMware Tools process which may indicate persistence setup

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
bohops+1Fri Oct 08windows
Detectionmediumtest

Potentially Suspicious Child Process Of VsCode

Detects uncommon or suspicious child processes spawning from a VsCode "code.exe" process. This could indicate an attempt of persistence via VsCode tasks or terminal profiles.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jan 26windows
Detectionhightest

Chopper Webshell Process Pattern

Detects patterns found in process executions cause by China Chopper like tiny (ASPX) webshells

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)+1Sat Oct 01windows
Detectionhightest

Webshell Hacking Activity Patterns

Detects certain parent child patterns found in cases in which a web shell is used to perform certain credential dumping or exfiltration activities on a compromised system

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)Thu Mar 17windows
Detectionhightest

Webshell Detection With Command Line Keywords

Detects certain command line parameters often used during reconnaissance activity via web shells

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)+5Sun Jan 01windows
Detectionhightest

Suspicious Process By Web Server Process

Detects potentially suspicious processes being spawned by a web server process which could be the result of a successfully placed web shell or exploitation

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1505.003 · Web ShellT1190 · Exploit Public-Facing Application
Thomas Patzke+4Wed Jan 16windows
Detectionhightest

Webshell Tool Reconnaissance Activity

Detects processes spawned from web servers (PHP, Tomcat, IIS, etc.) that perform reconnaissance looking for the existence of popular scripting tools (perl, python, wget) on the system via the help commands

WindowsProcess Creation
TA0003 · PersistenceT1505.003 · Web Shell
Cian Heasley+1Wed Jul 22windows
Detectionmediumtest

Suspicious WindowsTerminal Child Processes

Detects suspicious children spawned via the Windows Terminal application which could be a sign of persistence via WindowsTerminal (see references section)

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Mon Jul 25windows
Detectionhightest

Suspicious Processes Spawned by WinRM

Detects suspicious processes including shells spawnd from WinRM host process

WindowsProcess Creation
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Thu May 20windows
Detectioncriticaltest

WMI Backdoor Exchange Transport Agent

Detects a WMI backdoor in Exchange Transport Agents via WMI event filters

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)Fri Oct 11windows
Detectionmediumexperimental

Password Set to Never Expire via WMI

Detects the use of wmic.exe to modify user account settings and explicitly disable password expiration.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1047 · Windows Management Instrumentation+1
Daniel Koifman (KoifSec)Wed Jul 30windows
Detectionmediumtest

WMI Persistence - Script Event Consumer

Detects WMI script event consumers

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
Thomas PatzkeWed Mar 07windows
Detectionhightest

New ActiveScriptEventConsumer Created Via Wmic.EXE

Detects WMIC executions in which an event consumer gets created. This could be used to establish persistence

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)Fri Jun 25windows
Detectionmediumexperimental

Registry Manipulation via WMI Stdregprov

Detects the usage of wmic.exe to manipulate Windows registry via the WMI StdRegProv class. This behaviour could be potentially suspicious because it uses an alternative method to modify registry keys instead of legitimate registry tools like reg.exe or regedit.exe. Attackers specifically choose this technique to evade detection and bypass security monitoring focused on traditional registry modification commands.

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense EvasionTA0007 · Discovery+3
Daniel Koifman (KoifSec)Wed Jul 30windows
Detectionhightest

UEFI Persistence Via Wpbbin - ProcessCreation

Detects execution of the binary "wpbbin" which is used as part of the UEFI based persistence method described in the reference section

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1542.001 · System Firmware
Nasreddine Bencherchali (Nextron Systems)Mon Jul 18windows
Detectionmediumtest

WSL Child Process Anomaly

Detects uncommon or suspicious child processes spawning from a WSL process. This could indicate an attempt to evade parent/child relationship detections or persistence attempts via cron using WSL

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jan 23windows
Detectionhightest

Xwizard.EXE Execution From Non-Default Location

Detects the execution of Xwizard tool from a non-default directory. When executed from a non-default directory, this utility can be abused in order to side load a custom version of "xwizards.dll".

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Christian Burkard (Nextron Systems)Mon Sep 20windows
Detectionmediumtest

Potential Persistence Via Disk Cleanup Handler - Registry

Detects when an attacker modifies values of the Disk Cleanup Handler in the registry to achieve persistence. The disk cleanup manager is part of the operating system. It displays the dialog box […] The user has the option of enabling or disabling individual handlers by selecting or clearing their check box in the disk cleanup manager's UI. Although Windows comes with a number of disk cleanup handlers, they aren't designed to handle files produced by other applications. Instead, the disk cleanup manager is designed to be flexible and extensible by enabling any developer to implement and register their own disk cleanup handler. Any developer can extend the available disk cleanup services by implementing and registering a disk cleanup handler.

WindowsRegistry Add
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionhightest

Terminal Server Client Connection History Cleared - Registry

Detects the deletion of registry keys containing the MSTSC connection history

WindowsRegistry Delete
TA0003 · PersistenceTA0005 · Defense EvasionT1070 · Indicator RemovalT1112 · Modify Registry
Christian Burkard (Nextron Systems)Tue Oct 19windows
Detectionmediumtest

Removal of Potential COM Hijacking Registry Keys

Detects any deletion of entries in ".*\shell\open\command" registry keys. These registry keys might have been used for COM hijacking activities by a threat actor or an attacker and the deletion could indicate steps to remove its tracks.

WindowsRegistry Delete
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Creation of a Local Hidden User Account by Registry

Sysmon registry detection of a local hidden user account.

WindowsRegistry Event
TA0003 · PersistenceT1136.001 · Local Account
Christian Burkard (Nextron Systems)Mon May 03windows
Detectionhightest

Disable Security Events Logging Adding Reg Key MiniNt

Detects the addition of a key 'MiniNt' to the registry. Upon a reboot, Windows Event Log service will stop writing events.

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1562.002 · Disable Windows Event LoggingT1112 · Modify Registry+1
Ilyas Ochkov+1Fri Oct 25windows
Detectionhightest

Wdigest CredGuard Registry Modification

Detects potential malicious modification of the property value of IsCredGuardEnabled from HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest to disable Cred Guard on a system. This is usually used with UseLogonCredential to manipulate the caching credentials.

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Sun Aug 25windows
Detectioncriticaltest

Registry Entries For Azorult Malware

Detects the presence of a registry key created during Azorult execution

WindowsRegistry Event
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry
Trent LiffickFri May 08windows
Detectionhightest

Potential Qakbot Registry Activity

Detects a registry key used by IceID in a campaign that distributes malicious OneNote files

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Hieu TranMon Mar 13windows
Detectionmediumtest

Path To Screensaver Binary Modified

Detects value modification of registry key containing path to binary used as screensaver.

WindowsRegistry Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.002 · Screensaver
Bartlomiej Czyz+1Sun Oct 11windows
Detectionhightest

Narrator's Feedback-Hub Persistence

Detects abusing Windows 10 Narrator's Feedback-Hub

WindowsRegistry Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Dmitriy Lifanov+1Fri Oct 25windows
Detectionhightest

NetNTLM Downgrade Attack - Registry

Detects NetNTLM downgrade attack

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1112 · Modify Registry
Florian Roth (Nextron Systems)+2Tue Mar 20windows
Detectionmediumtest

New DLL Added to AppCertDlls Registry Key

Dynamic-link libraries (DLLs) that are specified in the AppCertDLLs value in the Registry key can be abused to obtain persistence and privilege escalation by causing a malicious DLL to be loaded and run in the context of separate processes on the computer.

WindowsRegistry Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.009 · AppCert DLLs
Ilyas Ochkov+1Fri Oct 25windows
Detectionmediumtest

New DLL Added to AppInit_DLLs Registry Key

DLLs that are specified in the AppInit_DLLs value in the Registry key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows are loaded by user32.dll into every process that loads user32.dll

WindowsRegistry Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.010 · AppInit DLLs
Ilyas Ochkov+2Fri Oct 25windows
Detectionmediumtest

Office Application Startup - Office Test

Detects the addition of office test registry that allows a user to specify an arbitrary DLL that will be executed every time an Office application is started

WindowsRegistry Event
TA0003 · PersistenceT1137.002 · Office Test
omkar72Sun Oct 25windows
Detectionhightest

Registry Persistence Mechanisms in Recycle Bin

Detects persistence registry keys for Recycle Bin

WindowsRegistry Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
François HubautThu Nov 18windows
Detectionhightest

RedMimicry Winnti Playbook Registry Manipulation

Detects actions caused by the RedMimicry Winnti playbook

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Alexander RauschWed Jun 24windows