Rule Library

Sigma Rules

801 rules found for "privilege-escalation"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious SYSTEM User Process Creation

Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)

WindowsProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationT1134 · Access Token Manipulation+2
Florian Roth (Nextron Systems)+1Mon Dec 20windows
Detectionhightest

Tasks Folder Evasion

The Tasks folder in system32 and syswow64 are globally writable paths. Adversaries can take advantage of this and load or influence any script hosts or ANY .NET Application in Tasks to load and execute a custom assembly into cscript, wscript, regsvr32, mshta, eventvwr

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0002 · Execution+1
SreemanMon Jan 13windows
Detectionmediumtest

Suspicious Userinit Child Process

Detects a suspicious child process of userinit

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)+1Mon Jun 17windows
Detectionhightest

Suspect Svchost Activity

It is extremely abnormal for svchost.exe to spawn without any CLI arguments and is normally observed when a malicious process spawns the process and injects code into the process memory space.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
David BurkettSat Dec 28windows
Detectionhighexperimental

Uncommon Svchost Command Line Parameter

Detects instances of svchost.exe running with an unusual or uncommon command line parameter by excluding known legitimate or common patterns. This could point at a file masquerading as svchost, a process injection, or hollowing of a legitimate svchost instance.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1036.005 · Match Legitimate Name or LocationT1055 · Process Injection+1
Liran RavichFri Nov 14windows
Detectionmediumtest

Permission Check Via Accesschk.EXE

Detects the usage of the "Accesschk" utility, an access and privilege audit tool developed by SysInternal and often being abused by attacker to verify process privileges

WindowsProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
Teymur Kheirkhabarov+3Tue Oct 13windows
Detectionhighstable

Potential LSASS Process Dump Via Procdump

Detects potential credential harvesting attempts through LSASS memory dumps using ProcDump. This rule identifies suspicious command-line patterns that combine memory dump flags (-ma, -mm, -mp) with LSASS-related process markers. LSASS (Local Security Authority Subsystem Service) contains sensitive authentication data including plaintext passwords, NTLM hashes, and Kerberos tickets in memory. Attackers commonly dump LSASS memory to extract credentials for lateral movement and privilege escalation.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingTA0006 · Credential AccessT1003.001 · LSASS Memory+1
Florian Roth (Nextron Systems)Tue Oct 30windows
Detectionmediumtest

Sysinternals PsService Execution

Detects usage of Sysinternals PsService which can be abused for service reconnaissance and tampering

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jun 16windows
Detectionmediumtest

Sysinternals PsSuspend Execution

Detects usage of Sysinternals PsSuspend which can be abused to suspend critical processes

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Mar 23windows
Detectionhightest

Potential Privilege Escalation To LOCAL SYSTEM

Detects unknown program using commandline flags usually used by tools such as PsExec and PAExec to start programs with SYSTEM Privileges

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Sat May 22windows
Detectionhightest

Suspicious TSCON Start as SYSTEM

Detects a tscon.exe start as LOCAL SYSTEM

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sat Mar 17windows
Detectionhightest

Suspicious RDP Redirect Using TSCON

Detects a suspicious RDP session redirect using tscon.exe

WindowsProcess Creation
TA0008 · Lateral MovementT1563.002 · RDP HijackingT1021.001 · Remote Desktop Protocol2013-07-002 · CAR 2013-07-002
Florian Roth (Nextron Systems)Sat Mar 17windows
Detectionhightest

UAC Bypass Using ChangePK and SLUI

Detects an UAC bypass that uses changepk.exe and slui.exe (UACMe 61)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

UAC Bypass Using Disk Cleanup

Detects the pattern of UAC Bypass using scheduled tasks and variable expansion of cleanmgr.exe (UACMe 34)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

Bypass UAC via CMSTP

Detect commandline usage of Microsoft Connection Manager Profile Installer (cmstp.exe) to install specially formatted local .INF files

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account ControlT1218.003 · CMSTP
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhighstable

CMSTP UAC Bypass via COM Object Access

Detects UAC Bypass Attempt Using Microsoft Connection Manager Profile Installer Autoelevate-capable COM Objects (e.g. UACMe ID of 41, 43, 58 or 65)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control+3
Nik Seetharaman+1Wed Jul 31windows
Detectionhightest

UAC Bypass Tools Using ComputerDefaults

Detects tools such as UACMe used to bypass UAC with computerdefaults.exe (UACMe 59)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Tue Aug 31windows
Detectionhightest

UAC Bypass Using Consent and Comctl32 - Process

Detects the pattern of UAC Bypass using consent.exe and comctl32.dll (UACMe 22)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

UAC Bypass Using DismHost

Detects the pattern of UAC Bypass using DismHost DLL hijacking (UACMe 63)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using Event Viewer RecentViews

Detects the pattern of UAC Bypass using Event Viewer RecentViews

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Nov 22windows
Detectionhightest

Bypass UAC via Fodhelper.exe

Identifies use of Fodhelper.exe to bypass User Account Control. Adversaries use this technique to execute privileged processes.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionmediumtest

UAC Bypass via Windows Firewall Snap-In Hijack

Detects attempts to bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Tim Rauch+1Tue Sep 27windows
Detectionhightest

UAC Bypass via ICMLuaUtil

Detects the pattern of UAC Bypass using ICMLuaUtil Elevated COM interface

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Florian Roth (Nextron Systems)+1Tue Sep 13windows
Detectionhightest

UAC Bypass Using IDiagnostic Profile

Detects the "IDiagnosticProfileUAC" UAC bypass technique

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Nasreddine Bencherchali (Nextron Systems)Sun Jul 03windows
Detectionhightest

UAC Bypass Using IEInstal - Process

Detects the pattern of UAC Bypass using IEInstal.exe (UACMe 64)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using MSConfig Token Modification - Process

Detects the pattern of UAC Bypass using a msconfig GUI hack (UACMe 55)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using NTFS Reparse Point - Process

Detects the pattern of UAC Bypass using NTFS reparse point and wusa.exe DLL hijacking (UACMe 36)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using PkgMgr and DISM

Detects the pattern of UAC Bypass using pkgmgr.exe and dism.exe (UACMe 23)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionmediumtest

Potential UAC Bypass Via Sdclt.EXE

A General detection for sdclt being spawned as an elevated process. This could be an indicator of sdclt being used for bypass UAC techniques.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account Control
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectioncriticaltest

TrustedPath UAC Bypass Pattern

Detects indicators of a UAC bypass method by mocking directories

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account Control
Florian Roth (Nextron Systems)Fri Aug 27windows
Detectionhightest

UAC Bypass Abusing Winsat Path Parsing - Process

Detects the pattern of UAC Bypass using a path parsing issue in winsat.exe (UACMe 52)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 30windows
Detectionhightest

UAC Bypass Using Windows Media Player - Process

Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll (UACMe 32)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

Bypass UAC via WSReset.exe

Detects use of WSReset.exe to bypass User Account Control (UAC). Adversaries use this technique to execute privileged processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account Control
E.M. Anhaus (originally from Atomic Blue Detections+3Thu Oct 24windows
Detectionhightest

UAC Bypass WSReset

Detects the pattern of UAC Bypass via WSReset usable by default sysmon-config

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhighexperimental

User Shell Folders Registry Modification via CommandLine

Detects modifications to User Shell Folders registry values via reg.exe or PowerShell, which could indicate persistence attempts. Attackers may modify User Shell Folders registry values to point to malicious executables or scripts that will be executed during startup. This technique is often used to maintain persistence on a compromised system by ensuring that malicious payloads are executed automatically.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1547.001 · Registry Run Keys / Startup FolderTA0005 · Defense Evasion+1
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jan 05windows
Detectionhightest

Uncommon Userinit Child Process

Detects uncommon "userinit.exe" child processes, which could be a sign of uncommon shells or login scripts used for persistence.

WindowsProcess Creation
TA0004 · Privilege EscalationT1037.001 · Logon Script (Windows)TA0003 · Persistence
Tom Ueltschi+1Sat Jan 12windows
Detectionhightest

Suspicious Child Process Of Wermgr.EXE

Detects suspicious Windows Error Reporting manager (wermgr.exe) child process

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process InjectionT1036 · Masquerading
Florian Roth (Nextron Systems)Fri Oct 14windows
Detectionhightest

Whoami.EXE Execution From Privileged Process

Detects the execution of "whoami.exe" by privileged accounts that are often abused by threat actors

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryT1033 · System Owner/User Discovery
Florian Roth (Nextron Systems)+1Fri Jan 28windows
Detectionhightest

Security Privileges Enumeration Via Whoami.EXE

Detects a whoami.exe executed with the /priv command line flag instructing the tool to show all current user privileges. This is often used after a privilege escalation attempt.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryT1033 · System Owner/User Discovery
Florian Roth (Nextron Systems)Wed May 05windows
Detectionhightest

Suspicious Processes Spawned by WinRM

Detects suspicious processes including shells spawnd from WinRM host process

WindowsProcess Creation
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Thu May 20windows
Detectioncriticaltest

WMI Backdoor Exchange Transport Agent

Detects a WMI backdoor in Exchange Transport Agents via WMI event filters

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)Fri Oct 11windows
Detectionmediumexperimental

Password Set to Never Expire via WMI

Detects the use of wmic.exe to modify user account settings and explicitly disable password expiration.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1047 · Windows Management Instrumentation+1
Daniel Koifman (KoifSec)Wed Jul 30windows
Detectionmediumtest

WMI Persistence - Script Event Consumer

Detects WMI script event consumers

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
Thomas PatzkeWed Mar 07windows
Detectionhightest

New ActiveScriptEventConsumer Created Via Wmic.EXE

Detects WMIC executions in which an event consumer gets created. This could be used to establish persistence

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)Fri Jun 25windows
Detectionmediumtest

Windows Hotfix Updates Reconnaissance Via Wmic.EXE

Detects the execution of wmic with the "qfe" flag in order to obtain information about installed hotfix updates on the system. This is often used by pentester and attacker enumeration scripts

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionmediumtest

Potential Unquoted Service Path Reconnaissance Via Wmic.EXE

Detects known WMI recon method to look for unquoted service paths using wmic. Often used by pentester and attacker enumeration scripts

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionmediumtest

Service Started/Stopped Via Wmic.EXE

Detects usage of wmic to start or stop a service

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

Xwizard.EXE Execution From Non-Default Location

Detects the execution of Xwizard tool from a non-default directory. When executed from a non-default directory, this utility can be abused in order to side load a custom version of "xwizards.dll".

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Christian Burkard (Nextron Systems)Mon Sep 20windows