Rule Library

Sigma Rules

2,824 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Microsoft Office DLL Sideload

Detects DLL sideloading of DLLs that are part of Microsoft Office from non standard location

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 17windows
Detectionmediumtest

Potential Python DLL SideLoading

Detects potential DLL sideloading of Python DLL files.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Swachchhanda Shrawan PoudelSun Oct 06windows
Detectionhightest

Potential Rcdll.DLL Sideloading

Detects potential DLL sideloading of rcdll.dll

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Mon Mar 13windows
Detectionmediumtest

Potential RjvPlatform.DLL Sideloading From Default Location

Detects loading of "RjvPlatform.dll" by the "SystemResetPlatform.exe" binary which can be abused as a method of DLL side loading since the "$SysReset" directory isn't created by default.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionhightest

Potential RjvPlatform.DLL Sideloading From Non-Default Location

Detects potential DLL sideloading of "RjvPlatform.dll" by "SystemResetPlatform.exe" located in a non-default location.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionmediumtest

Potential RoboForm.DLL Sideloading

Detects potential DLL sideloading of "roboform.dll", a DLL used by RoboForm Password Manager

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)+1Sun May 14windows
Detectionhightest

DLL Sideloading Of ShellChromeAPI.DLL

Detects processes loading the non-existent DLL "ShellChromeAPI". One known example is the "DeviceEnroller" binary in combination with the "PhoneDeepLink" flag tries to load this DLL. Adversaries can drop their own renamed DLL and execute it via DeviceEnroller.exe using this parameter

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Thu Dec 01windows
Detectionmediumtest

Potential ShellDispatch.DLL Sideloading

Detects potential DLL sideloading of "ShellDispatch.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Tue Jun 20windows
Detectionhightest

Potential SmadHook.DLL Sideloading

Detects potential DLL sideloading of "SmadHook.dll", a DLL used by SmadAV antivirus

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Jun 01windows
Detectionmediumtest

Potential SolidPDFCreator.DLL Sideloading

Detects potential DLL sideloading of "SolidPDFCreator.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Sun May 07windows
Detectionmediumtest

Third Party Software DLL Sideloading

Detects DLL sideloading of DLLs that are part of third party software (zoom, discord....etc)

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 17windows
Detectionhightest

Fax Service DLL Search Order Hijack

The Fax service attempts to load ualapi.dll, which is non-existent. An attacker can then (side)load their own malicious DLL using this service.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
NVISOMon May 04windows
Detectionmediumtest

Potential Vivaldi_elf.DLL Sideloading

Detects potential DLL sideloading of "vivaldi_elf.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Aug 03windows
Detectionmediumtest

VMGuestLib DLL Sideload

Detects DLL sideloading of VMGuestLib.dll by the WmiApSrv service.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Thu Dec 01windows
Detectionmediumtest

VMMap Signed Dbghelp.DLL Potential Sideloading

Detects potential DLL sideloading of a signed dbghelp.dll by the Sysinternals VMMap.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Tue Sep 05windows
Detectionhightest

VMMap Unsigned Dbghelp.DLL Potential Sideloading

Detects potential DLL sideloading of an unsigned dbghelp.dll by the Sysinternals VMMap.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Fri Jul 28windows
Detectionhightest

Potential DLL Sideloading Via VMware Xfer

Detects loading of a DLL by the VMware Xfer utility from the non-default directory which may be an attempt to sideload arbitrary DLL

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionhightest

Potential Waveedit.DLL Sideloading

Detects potential DLL sideloading of "waveedit.dll", which is part of the Nero WaveEditor audio editing software.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Wed Jun 14windows
Detectionmediumtest

Potential Wazuh Security Platform DLL Sideloading

Detects potential DLL side loading of DLLs that are part of the Wazuh security platform

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Mon Mar 13windows
Detectionhightest

Potential Mpclient.DLL Sideloading

Detects potential sideloading of "mpclient.dll" by Windows Defender processes ("MpCmdRun" and "NisSrv") from their non-default directory.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Bhabesh RajTue Aug 02windows
Detectionmediumtest

Potential WWlib.DLL Sideloading

Detects potential DLL sideloading of "wwlib.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu May 18windows
Detectionhighexperimental

BaaUpdate.exe Suspicious DLL Load

Detects BitLocker Access Agent Update Utility (baaupdate.exe) loading DLLs from suspicious locations that are publicly writable which could indicate an attempt to lateral movement via BitLocker DCOM & COM Hijacking. This technique abuses COM Classes configured as INTERACTIVE USER to spawn processes in the context of the logged-on user's session. Specifically, it targets the BDEUILauncher Class (CLSID ab93b6f1-be76-4185-a488-a9001b105b94) which can launch BaaUpdate.exe, which is vulnerable to COM Hijacking when started with input parameters. This allows attackers to execute code in the user's context without needing to steal credentials or use additional techniques to compromise the account.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Swachchhanda Shrawan Poudel (Nextron Systems)Sat Oct 18windows
Detectionmediumtest

Unsigned Module Loaded by ClickOnce Application

Detects unsigned module load by ClickOnce application.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.001 · DLL Search Order Hijacking
@serkinvaleryThu Jun 08windows
Detectionmediumtest

DLL Load By System Process From Suspicious Locations

Detects when a system process (i.e. located in system32, syswow64, etc.) loads a DLL from a suspicious location or a location with permissive permissions such as "C:\Users\Public"

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1070 · Indicator Removal
Nasreddine Bencherchali (Nextron Systems)Sun Jul 17windows
Detectionlowtest

Python Image Load By Non-Python Process

Detects the image load of "Python Core" by a non-Python process. This might be indicative of a execution of executable that has been bundled from Python code. Various tools like Py2Exe, PyInstaller, and cx_Freeze are used to bundle Python code into standalone executables. Threat actors often use these tools to bundle malicious Python scripts into executables, sometimes to obfuscate the code or to bypass security measures.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1027.002 · Software Packing
Patrick St. John+1Sun May 03windows
Detectionhightest

DotNet CLR DLL Loaded By Scripting Applications

Detects .NET CLR DLLs being loaded by scripting applications such as wscript or cscript. This could be an indication of potential suspicious execution.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0002 · ExecutionTA0004 · Privilege EscalationT1055 · Process Injection
omkar72+1Wed Oct 14windows
Detectionmediumtest

Unsigned DLL Loaded by Windows Utility

Detects windows utilities loading an unsigned or untrusted DLL. Adversaries often abuse those programs to proxy execution of malicious code.

WindowsImage Load (DLL)
T1218.011 · Rundll32T1218.010 · Regsvr32TA0005 · Defense Evasion
Swachchhanda Shrawan PoudelWed Feb 28windows
Detectionhighstable

Suspicious Unsigned Thor Scanner Execution

Detects loading and execution of an unsigned thor scanner binary.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Sun Oct 29windows
Detectionhightest

UAC Bypass Using Iscsicpl - ImageLoad

Detects the "iscsicpl.exe" UAC bypass technique that leverages a DLL Search Order hijacking technique to load a custom DLL's from temp or a any user controlled location in the users %PATH%

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Nasreddine Bencherchali (Nextron Systems)Sun Jul 17windows
Detectionhightest

UAC Bypass With Fake DLL

Attempts to load dismcore.dll after dropping it

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control+1
oscd.community+1Tue Oct 06windows
Detectionmediumexperimental

MMC Loading Script Engines DLLs

Detects when the Microsoft Management Console (MMC) loads the DLL libraries like vbscript, jscript etc which might indicate an attempt to execute malicious scripts within a trusted system process for bypassing application whitelisting or defense evasion.

WindowsImage Load (DLL)
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1218.014 · MMC
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionhighexperimental

Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location

Detects loading of dbgcore.dll or dbghelp.dll from uncommon locations such as user directories. These DLLs contain the MiniDumpWriteDump function, which can be abused for credential dumping purposes or in some cases for evading EDR/AV detection by suspending processes.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003 · OS Credential DumpingTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionhighexperimental

Trusted Path Bypass via Windows Directory Spoofing

Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g "C:\Windows \System32") which can bypass Windows trusted path verification. This technique tricks Windows into treating the path as trusted, allowing malicious DLLs to load with high integrity privileges bypassing UAC.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.007 · Path Interception by PATH Environment Variable+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jun 17windows
Detectionhightest

WMI Persistence - Command Line Event Consumer

Detects WMI command line event consumers

WindowsImage Load (DLL)
TA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event SubscriptionTA0003 · Persistence
Thomas PatzkeWed Mar 07windows
Detectionmediumtest

WMIC Loading Scripting Libraries

Detects threat actors proxy executing code and bypassing application controls by leveraging wmic and the `/FORMAT` argument switch to download and execute an XSL file (i.e js, vbs, etc). It could be an indicator of SquiblyTwo technique, which uses Windows Management Instrumentation (WMI) to execute malicious code.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1220 · XSL Script Processing
Roberto Rodriguez (Cyb3rWard0g)+1Sat Oct 17windows
Detectionhightest

Wmiprvse Wbemcomn DLL Hijack

Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory over the network and loading it for a WMI DLL Hijack scenario.

WindowsImage Load (DLL)
TA0002 · ExecutionT1047 · Windows Management InstrumentationTA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Roberto Rodriguez (Cyb3rWard0g)+1Mon Oct 12windows
Detectionmediumtest

Suspicious WSMAN Provider Image Loads

Detects signs of potential use of the WSMAN provider from uncommon processes locally and remote execution.

WindowsImage Load (DLL)
TA0002 · ExecutionT1059.001 · PowerShellTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Roberto Rodriguez (Cyb3rWard0g)+1Wed Jun 24windows
Detectionhightest

Network Connection Initiated By AddinUtil.EXE

Detects a network connection initiated by the Add-In deployment cache updating utility "AddInutil.exe". This could indicate a potential command and control communication as this tool doesn't usually initiate network activity.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionmediumtest

Uncommon Connection to Active Directory Web Services

Detects uncommon network connections to the Active Directory Web Services (ADWS) from processes not typically associated with ADWS management.

WindowsNetwork Connection
TA0007 · DiscoveryT1087 · Account Discovery
kostastsaleFri Jan 26windows
Detectionhightest

Uncommon Network Connection Initiated By Certutil.EXE

Detects a network connection initiated by the certutil.exe utility. Attackers can abuse the utility in order to download malware or additional payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Fri Sep 02windows
Detectionhightest

Outbound Network Connection Initiated By Cmstp.EXE

Detects a network connection initiated by Cmstp.EXE Its uncommon for "cmstp.exe" to initiate an outbound network connection. Investigate the source of such requests to determine if they are malicious.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.003 · CMSTP
Nasreddine Bencherchali (Nextron Systems)Tue Aug 30windows
Detectionhightest

Outbound Network Connection Initiated By Microsoft Dialer

Detects outbound network connection initiated by Microsoft Dialer. The Microsoft Dialer, also known as Phone Dialer, is a built-in utility application included in various versions of the Microsoft Windows operating system. Its primary function is to provide users with a graphical interface for managing phone calls via a modem or a phone line connected to the computer. This is an outdated process in the current conext of it's usage and is a common target for info stealers for process injection, and is used to make C2 connections, common example is "Rhadamanthys"

WindowsNetwork Connection
TA0002 · ExecutionTA0011 · Command and ControlT1071.001 · Web Protocols
CertainlyPFri Apr 26windows
Detectionmediumtest

Network Connection Initiated To AzureWebsites.NET By Non-Browser Process

Detects an initiated network connection by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web ServiceT1102.001 · Dead Drop Resolver
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionmediumtest

Network Connection Initiated To BTunnels Domains

Detects network connections to BTunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling
Kamran SaifullahFri Sep 13windows
Detectionmediumtest

Network Connection Initiated To Cloudflared Tunnels Domains

Detects network connections to Cloudflared tunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling
Kamran Saifullah+1Mon May 27windows
Detectionhighstable

Network Communication With Crypto Mining Pool

Detects initiated network connections to crypto mining pools

WindowsNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)+1Tue Oct 26windows
Detectionhightest

New Connection Initiated To Potential Dead Drop Resolver Domain

Detects an executable, which is not an internet browser or known application, initiating network connections to legit popular websites, which were seen to be used as dead drop resolvers in previous attacks. In this context attackers leverage known websites such as "facebook", "youtube", etc. In order to pass through undetected.

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web ServiceT1102.001 · Dead Drop Resolver
Sorina Ionescu+1Wed Aug 17windows
Detectionmediumtest

Network Connection Initiated To DevTunnels Domain

Detects network connections to Devtunnels domains initiated by a process on a system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567.001 · Exfiltration to Code RepositoryT1572 · Protocol Tunneling
Kamran SaifullahMon Nov 20windows