Rule Library

Sigma Rules

801 rules found for "privilege-escalation"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Lazarus APT DLL Sideloading Activity

Detects sideloading of trojanized DLLs used in Lazarus APT campaign in the case of a Spanish aerospace company

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · PersistenceT1574.001 · DLL Search Order Hijacking+2
Thurein Oo+1Wed Oct 182023
Emerging Threathightest

Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection

Detects potential exploitation attempts of CVE-2024-3400 - an OS command injection in Palo Alto GlobalProtect. This detection looks for suspicious strings that indicate a potential directory traversal attempt or command injection.

paloaltoapplianceglobalprotect
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+2
Nasreddine Bencherchali (Nextron Systems)Thu Apr 182024
Emerging Threatmediumexperimental

Potential CVE-2024-35250 Exploitation Activity

Detects potentially suspicious loading of "ksproxy.ax", which may indicate an attempt to exploit CVE-2024-35250.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationcve.2024-35250detection.emerging-threats
Isaac FernandesWed Feb 192024
Emerging Threathightest

Potential KamiKakaBot Activity - Winlogon Shell Persistence

Detects changes to the "Winlogon" registry key where a process will set the value of the "Shell" to a value that was observed being used by KamiKakaBot samples in order to achieve persistence.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Mar 222024
Emerging Threathightest

Kapeka Backdoor Persistence Activity

Detects Kapeka backdoor persistence activity. Depending on the process privileges, the Kapeka dropper then sets persistence for the backdoor either as a scheduled task (if admin or SYSTEM) or autorun registry (if not). For the scheduled task, it creates a scheduled task called "Sens Api" via schtasks command, which is set to run upon system startup as SYSTEM. To establish persistence through the autorun utility, it adds an autorun entry called "Sens Api" under HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run via the "reg add" command. Both persistence mechanisms are set to launch the binary by calling rundll32 and passing the backdoor's first export ordinal (#1) without any additional argument.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Kapeka Backdoor Autorun Persistence

Detects the setting of a new value in the Autorun key that is used by the Kapeka backdoor for persistence.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Kapeka Backdoor Scheduled Task Creation

Detects Kapeka backdoor scheduled task creation based on attributes such as paths, commands line flags, etc.

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathighexperimental

Lummac Stealer Activity - Execution Of More.com And Vbc.exe

Detects the execution of more.com and vbc.exe in the process tree. This behavior was observed by a set of samples related to Lummac Stealer. The Lummac payload is injected into the vbc.exe process.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injectiondetection.emerging-threats
Joseliyo SanchezThu Dec 192024
Emerging Threathightest

Potential Raspberry Robin Aclui Dll SideLoading

Detects potential sideloading of malicious "aclui.dll" by OleView.This behavior was observed in Raspberry-Robin variants reported by chekpoint research on Feburary 2024.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking+1
Swachchhanda Shrawan PoudelWed Jul 312024
Emerging Threathightest

Forest Blizzard APT - Custom Protocol Handler Creation

Detects the setting of a custom protocol handler with the name "rogue". Seen being created by Forest Blizzard APT as reported by MSFT.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathightest

Forest Blizzard APT - Custom Protocol Handler DLL Registry Set

Detects the setting of the DLL that handles the custom protocol handler. Seen being created by Forest Blizzard APT as reported by MSFT.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathighexperimental

Non-Standard Nsswitch.Conf Creation - Potential CVE-2025-32463 Exploitation

Detects the creation of nsswitch.conf files in non-standard directories, which may indicate exploitation of CVE-2025-32463. This vulnerability requires an attacker to create a nsswitch.conf in a directory that will be used during sudo chroot operations. When sudo executes, it loads malicious shared libraries from user-controlled locations within the chroot environment, potentially leading to arbitrary code execution and privilege escalation.

LinuxFile Event
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationcve.2025-32463detection.emerging-threats
Swachchhanda Shrawn Poudel (Nextron Systems)Thu Oct 022025
Emerging Threathighexperimental

Potential Notepad++ CVE-2025-49144 Exploitation

Detects potential exploitation of CVE-2025-49144, a local privilege escalation vulnerability in Notepad++ installers (v8.8.1 and prior) where the installer calls regsvr32.exe without specifying the full path. This allows an attacker to execute arbitrary code with elevated privileges by placing a malicious regsvr32.exe alongside this Legitimate Notepad++ installer. The vulnerability is triggered when the installer attempts to register the NppShell.dll file, which is a component of Notepad++.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.008 · Path Interception by Search Order Hijacking+2
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Jun 262025
Emerging Threathighexperimental

Potential Exploitation of CrushFTP RCE Vulnerability (CVE-2025-54309)

Detects suspicious child processes created by CrushFTP. It could be an indication of exploitation of a RCE vulnerability such as CVE-2025-54309.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1059.001 · PowerShell+5
Nisarg SutharFri Aug 012025
Emerging Threatmediumexperimental

Commvault QLogin with PublicSharingUser and GUID Password (CVE-2025-57788)

Detects a qlogin.exe command attempting to authenticate as the internal `_+_PublicSharingUser_` using a GUID as the password. This could be an indicator of an attacker exploiting CVE-2025-57788 to gain initial access using leaked credentials.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Oct 202025
Emerging Threathighexperimental

Atomic MacOS Stealer - Persistence Indicators

Detects creation of persistence artifacts placed by Atomic MacOS Stealer in macOS systems. Recent Atomic MacOS Stealer variants have been observed dropping these to maintain persistent access after compromise.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1564.001 · Hidden Files and Directories+2
Jason Phang Vern - Onn+1Sat Nov 222025
Emerging Threathighexperimental

TeamPCP LiteLLM Supply Chain Attack Persistence Indicators

Detects the creation of specific persistence files as observed in the LiteLLM PyPI supply chain attack. In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP. The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.

LinuxFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.002 · Systemd ServiceTA0001 · Initial Access+2
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Mar 302026
Emerging Threathighexperimental

LiteLLM / TeamPCP Supply Chain Attack Indicators

Detects process executions related to the backdoored versions of LiteLLM (v1.82.7 or v1.82.8). In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP. The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.

LinuxProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0009 · CollectionT1560.001 · Archive via Utility+4
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Mar 302026
Threat Huntmediumtest

Potential Remote WMI ActiveScriptEventConsumers Activity

Detect potential adversaries leveraging WMI ActiveScriptEventConsumers remotely to move laterally in a network. This event is best correlated and used as an enrichment to determine the potential lateral movement activity.

Windowssecurity
TA0008 · Lateral MovementTA0004 · Privilege Escalationdetection.threat-huntingTA0003 · Persistence+1
Roberto Rodriguez (Cyb3rWard0g)+1Wed Sep 02windows
Threat Huntlowtest

Scheduled Task Deletion

Detects scheduled task deletion events. Scheduled tasks are likely to be deleted if not used for persistence. Malicious Software often creates tasks directly under the root node e.g. \TASKNAME

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · Persistence2013-08-001 · CAR 2013-08-001+2
David Strassegger+1Fri Jan 22windows
Threat Huntmediumtest

CreateRemoteThread API and LoadLibrary

Detects potential use of CreateRemoteThread api and LoadLibrary function to inject DLL into a process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library Injectiondetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sun Aug 11windows
Threat Huntmediumtest

Remote Thread Created In Shell Application

Detects remote thread creation in command shell applications, such as "Cmd.EXE" and "PowerShell.EXE". It is a common technique used by malware, such as IcedID, to inject malicious code and execute it within legitimate processes.

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
Splunk Research TeamMon Jul 29windows
Threat Huntlowtest

Scheduled Task Created - FileCreation

Detects the creation of a scheduled task via file creation.

WindowsFile Event
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+3
Center for Threat Informed Defense (CTID) Summiting the Pyramid TeamWed Sep 27windows
Threat Huntlowtest

Task Scheduler DLL Loaded By Application Located In Potentially Suspicious Location

Detects the loading of the "taskschd.dll" module from a process that located in a potentially suspicious or uncommon directory. The loading of this DLL might indicate that the application have the capability to create a scheduled task via the "Schedule.Service" COM object. Investigation of the loading application and its behavior is required to determining if its malicious.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelMon Sep 02windows
Threat Huntmediumtest

Potential Shellcode Injection

Detects potential shellcode injection as seen used by tools such as Metasploit's migrate and Empire's psinject.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
Bhabesh RajFri Mar 11windows
Threat Huntmediumtest

Potential Password Reconnaissance Via Findstr.EXE

Detects command line usage of "findstr" to search for the "passwords" keyword in a variety of different languages

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
Josh NickelsThu May 18windows
Threat Huntlowtest

Net.EXE Execution

Detects execution of "Net.EXE".

WindowsProcess Creation
TA0007 · DiscoveryT1007 · System Service DiscoveryT1049 · System Network Connections DiscoveryT1018 · Remote System Discovery+10
Michael Haag+2Wed Jan 16windows
Threat Huntmediumtest

Scheduled Task Creation From Potential Suspicious Parent Location

Detects the execution of "schtasks.exe" from a parent that is located in a potentially suspicious location. Multiple malware strains were seen exhibiting a similar behavior in order to achieve persistence.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+1
Florian Roth (Nextron Systems)Wed Feb 23windows
Threat Huntmediumtest

Elevated System Shell Spawned

Detects when a shell program such as the Windows command prompt or PowerShell is launched with system privileges. Use this rule to hunt for potential suspicious processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter+1
Nasreddine Bencherchali (Nextron Systems)+1Thu Nov 23windows
Threat Huntlowexperimental

Potential Executable Run Itself As Sacrificial Process

Detects when an executable launches an identical instance of itself, a behavior often used to create a suspended “sacrificial” process for code injection or evasion. Investigate for indicators such as the process being started in suspended mode, rapid parent termination, memory manipulation (e.g., WriteProcessMemory, CreateRemoteThread), or unsigned binaries. Review command-line arguments, process ancestry, and network activity to confirm if this is legitimate behavior or process injection activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
François HubautFri Oct 17windows
Threat Huntlowtest

Scheduled Task Created - Registry

Detects the creation of a scheduled task via Registry keys.

WindowsRegistry Event
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationS0111 · schtasks+3
Center for Threat Informed Defense (CTID) Summiting the Pyramid TeamWed Sep 27windows
Threat Huntmediumtest

Registry Set With Crypto-Classes From The "Cryptography" PowerShell Namespace

Detects the setting of a registry inside the "\Shell\Open\Command" value with PowerShell classes from the "System.Security.Cryptography" namespace. The PowerShell namespace "System.Security.Cryptography" provides classes for on-the-fly encryption and decryption. These can be used for example in decrypting malicious payload for defense evasion.

WindowsRegistry Set
TA0005 · Defense EvasionTA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege Escalation+4
Andreas Braathen (mnemonic.io)Fri Dec 01windows
Threat Huntmediumtest

Service Binary in User Controlled Folder

Detects the setting of the "ImagePath" value of a service registry key to a path controlled by a non-administrator user such as "\AppData\" or "\ProgramData\". Attackers often use such directories for staging purposes. This rule might also trigger on badly written software, where if an attacker controls an auto starting service, they might achieve persistence or privilege escalation. Note that while ProgramData is a user controlled folder, software might apply strict ACLs which makes them only accessible to admin users. Remove such folders via filters if you experience a lot of noise.

WindowsRegistry Set
TA0005 · Defense EvasionTA0003 · PersistenceT1112 · Modify Registrydetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)+1Mon May 02windows