Rule Library

Sigma Rules

916 rules found for "Microsoft"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Potential CVE-2021-40444 Exploitation Attempt

Detects potential exploitation of CVE-2021-40444 via suspicious process patterns seen in in-the-wild exploitations

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpretercve.2021-40444detection.emerging-threats
Florian Roth (Nextron Systems)Wed Sep 082021
Emerging Threathightest

Potential Exploitation Attempt From Office Application

Detects Office applications executing a child process that includes directory traversal patterns. This could be an attempt to exploit CVE-2022-30190 (MSDT RCE) or CVE-2021-40444 (MSHTML RCE)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasioncve.2021-40444detection.emerging-threats
Christian Burkard (Nextron Systems)+1Thu Jun 022021
Emerging Threatcriticaltest

Potential CVE-2021-41379 Exploitation Attempt

Detects potential exploitation attempts of CVE-2021-41379 (InstallerFileTakeOver), a local privilege escalation (LPE) vulnerability where the attacker spawns a "cmd.exe" process as a child of Microsoft Edge elevation service "elevation_service" with "LOCAL_SYSTEM" rights

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationcve.2021-41379detection.emerging-threats
Florian Roth (Nextron Systems)Mon Nov 222021
Emerging Threathightest

Possible Exploitation of Exchange RCE CVE-2021-42321

Detects log entries that appear in exploitation attempts against MS Exchange RCE CVE-2021-42321

Windowsmsexchange-management
TA0008 · Lateral MovementT1210 · Exploitation of Remote Servicesdetection.emerging-threats
Florian Roth (Nextron Systems)Thu Nov 182021
Emerging Threathightest

Potential Conti Ransomware Database Dumping Activity Via SQLCmd

Detects a command used by conti to dump database

WindowsProcess Creation
TA0009 · CollectionT1005 · Data from Local Systemdetection.emerging-threats
François HubautMon Aug 162021
Emerging Threathightest

Potential Devil Bait Related Indicator

Detects the creation of ".xml" and ".txt" files in folders of the "\AppData\Roaming\Microsoft" directory by uncommon processes. This behavior was seen common across different Devil Bait samples and stages as described by the NCSC

WindowsFile Event
TA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Mon May 152021
Emerging Threatcriticaltest

FoggyWeb Backdoor DLL Loading

Detects DLL hijacking technique used by NOBELIUM in their FoggyWeb backdoor. Which loads a malicious version of the expected "version.dll" dll

WindowsImage Load (DLL)
TA0042 · Resource DevelopmentT1587 · Develop Capabilitiesdetection.emerging-threats
Florian Roth (Nextron Systems)Mon Sep 272021
Emerging Threatcriticaltest

HAFNIUM Exchange Exploitation Activity

Detects activity observed by different researchers to be HAFNIUM group activity (or related) on Exchange servers

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1546 · Event Triggered Execution+3
Florian Roth (Nextron Systems)Tue Mar 092021
Emerging Threathightest

Exchange Exploitation Used by HAFNIUM

Detects exploitation attempts in Exchange server logs as described in blog posts reporting on HAFNIUM group activity

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationG0125 · HAFNIUMdetection.emerging-threats
Florian Roth (Nextron Systems)Wed Mar 032021
Emerging Threathightest

SOURGUM Actor Behaviours

Suspicious behaviours related to an actor tracked by Microsoft as SOURGUM

WindowsProcess Creation
T1546 · Event Triggered ExecutionT1546.015 · Component Object Model HijackingTA0003 · PersistenceTA0004 · Privilege Escalation+1
MSTIC+1Tue Jun 152021
Emerging Threatlowtest

Potential Exploitation of CVE-2022-21919 or CVE-2021-34484 for LPE

Detects potential exploitation attempts of CVE-2022-21919 or CVE-2021-34484 leading to local privilege escalation via the User Profile Service. During exploitation of this vulnerability, two logs (Provider_Name: Microsoft-Windows-User Profiles Service) with EventID 1511 and 1515 are created (EventID 1515 may generate many false positives). Additionally, the directory \Users\TEMP may be created during exploitation. This behavior was observed on Windows Server 2008.

Windowsapplication
TA0002 · Executiondetection.emerging-threatscve.2022-21919cve.2021-34484
CybexTue Aug 162022
Emerging Threathightest

CVE-2022-24527 Microsoft Connected Cache LPE

Detects files created during the local privilege exploitation of CVE-2022-24527 Microsoft Connected Cache

WindowsFile Event
TA0002 · ExecutionTA0004 · Privilege EscalationT1059.001 · PowerShellcve.2022-24527+1
Florian Roth (Nextron Systems)Wed Apr 132022
Emerging Threathightest

Potential CVE-2022-26809 Exploitation Attempt

Detects suspicious remote procedure call (RPC) service anomalies based on the spawned sub processes (long shot to detect the exploitation of vulnerabilities like CVE-2022-26809)

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1569.002 · Service Execution+2
Florian Roth (Nextron Systems)Wed Apr 132022
Emerging Threathightest

Potential Nimbuspwn Exploit CVE-2022-29799 and CVE-2022-27800

Detects potential exploitation attempts of Nimbuspwn vulnerabilities CVE-2022-29799 and CVE-2022-27800 in Linux systems.

Linux
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationdetection.emerging-threatscve.2022-29799+1
Bhabesh RajWed May 042022
Emerging Threatmediumtest

Suspicious Set Value of MSDT in Registry (CVE-2022-30190)

Detects set value ms-msdt MSProtocol URI scheme in Registry that could be an attempt to exploit CVE-2022-30190.

WindowsRegistry Set
TA0005 · Defense Evasionattack.t1221detection.emerging-threats
Sittikorn SSun May 312022
Emerging Threathightest

Potential KDC RC4-HMAC Downgrade Exploit - CVE-2022-37966

Detects the exploitation of a security bypass and elevation of privilege vulnerability with Authentication Negotiation by using weak RC4-HMAC negotiation

Windowssystem
TA0004 · Privilege Escalationdetection.emerging-threatscve.2022-37966
Florian Roth (Nextron Systems)Wed Nov 092022
Emerging Threathightest

Suspicious Sysmon as Execution Parent

Detects suspicious process executions in which Sysmon itself is the parent of a process, which could be a sign of exploitation (e.g. CVE-2022-41120)

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationcve.2022-41120detection.emerging-threats
Florian Roth (Nextron Systems)+1Thu Nov 102022
Emerging Threathightest

Potential Raspberry Robin Dot Ending File

Detects commandline containing reference to files ending with a "." This scheme has been seen used by raspberry-robin

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Oct 282022
Emerging Threathightest

MSSQL Extended Stored Procedure Backdoor Maggie

This rule detects the execution of the extended storage procedure backdoor named Maggie in the context of Microsoft SQL server

Windowsapplication
TA0004 · Privilege EscalationTA0003 · PersistenceT1546 · Event Triggered Executiondetection.emerging-threats
Denis Szadkowski+1Sun Oct 092022
Emerging Threathightest

Potential ACTINIUM Persistence Activity

Detects specific process parameters as used by ACTINIUM scheduled task persistence creation.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053 · Scheduled Task/Job+2
Andreas HunkelerMon Feb 072022
Emerging Threathightest

MERCURY APT Activity

Detects suspicious command line patterns seen being used by MERCURY APT

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellG0069 · G0069detection.emerging-threats
Florian Roth (Nextron Systems)Fri Aug 262022
Emerging Threatlowtest

Outlook Task/Note Reminder Received

Detects changes to the registry values related to outlook that indicates that a reminder was triggered for a Note or Task item. This could be a sign of exploitation of CVE-2023-23397. Further investigation is required to determine the success of an exploitation.

WindowsRegistry Set
TA0003 · PersistenceT1137 · Office Application Startupcve.2023-23397detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Apr 052023
Emerging Threatmediumtest

Potential CVE-2023-23397 Exploitation Attempt - SMB

Detects (failed) outbound connection attempts to internet facing SMB servers. This could be a sign of potential exploitation attempts of CVE-2023-23397.

Windowssmbclient-connectivity
TA0010 · Exfiltrationcve.2023-23397detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Apr 052023
Emerging Threatmediumtest

Potential MOVEit Transfer CVE-2023-34362 Exploitation - Dynamic Compilation Via Csc.EXE

Detects the execution of "csc.exe" via "w3wp.exe" process. MOVEit affected hosts execute "csc.exe" via the "w3wp.exe" process to dynamically compile malicious DLL files. MOVEit is affected by a critical vulnerability. Exploited hosts show evidence of dynamically compiling a DLL and writing it under C:\\Windows\\Microsoft\.NET\\Framework64\\v4\.0\.30319\\Temporary ASP\.NET Files\\root\\([a-z0-9]{5,12})\\([a-z0-9]{5,12})\\App_Web_[a-z0-9]{5,12}\.dll. Hunting Opportunity Events from IIS dynamically compiling binaries via the csc.exe on behalf of the MOVEit application, especially since May 27th should be investigated.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpretercve.2023-34362detection.emerging-threats
kostastsaleThu Jun 012023
Emerging Threatmediumtest

DarkGate - Autoit3.EXE File Creation By Uncommon Process

Detects the usage of curl.exe, KeyScramblerLogon, or other non-standard/suspicious processes used to create Autoit3.exe. This activity has been associated with DarkGate malware, which uses Autoit3.exe to execute shellcode that performs process injection and connects to the DarkGate command-and-control server. Curl, KeyScramblerLogon, and these other processes consitute non-standard and suspicious ways to retrieve the Autoit3 executable.

WindowsFile Event
TA0011 · Command and ControlTA0002 · ExecutionT1105 · Ingress Tool TransferT1059 · Command and Scripting Interpreter+1
Micah BabinskiSun Oct 152023
Emerging Threathightest

DarkGate - Autoit3.EXE Execution Parameters

Detects execution of the legitimate Autoit3 utility from a suspicious parent process. AutoIt3.exe is used within the DarkGate infection chain to execute shellcode that performs process injection and connects to the DarkGate command-and-control server.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Micah BabinskiSun Oct 152023
Emerging Threatcriticaltest

Malicious DLL Load By Compromised 3CXDesktopApp

Detects DLL load activity of known compromised DLLs used in by the compromised 3CXDesktopApp

WindowsImage Load (DLL)
TA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Mar 312023
Emerging Threathightest

Diamond Sleet APT DNS Communication Indicators

Detects DNS queries related to Diamond Sleet APT activity

WindowsDNS Query
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Diamond Sleet APT File Creation Indicators

Detects file creation activity that is related to Diamond Sleet APT activity

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Diamond Sleet APT DLL Sideloading Indicators

Detects DLL sideloading activity seen used by Diamond Sleet APT

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking+1
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Diamond Sleet APT Process Activity Indicators

Detects process creation activity indicators related to Diamond Sleet APT

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Diamond Sleet APT Scheduled Task Creation - Registry

Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability

WindowsRegistry Event
TA0005 · Defense EvasionT1562 · Impair Defensesdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threatcriticaltest

Diamond Sleet APT Scheduled Task Creation

Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task+1
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threatcriticaltest

Mint Sandstorm - AsperaFaspex Suspicious Process Execution

Detects suspicious execution from AsperaFaspex as seen used by Mint Sandstorm

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Apr 202023
Emerging Threathightest

Mint Sandstorm - Log4J Wstomcat Process Execution

Detects Log4J Wstomcat process execution as seen in Mint Sandstorm activity

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Apr 202023
Emerging Threatcriticaltest

Mint Sandstorm - ManageEngine Suspicious Process Execution

Detects suspicious execution from ManageEngine as seen used by Mint Sandstorm

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Apr 202023
Emerging Threathightest

Onyx Sleet APT File Creation Indicators

Detects file creation activity that is related to Onyx Sleet APT activity

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Potential Exploitation of CVE-2024-37085 - Suspicious Creation Of ESX Admins Group

Detects execution of the "net.exe" command in order to add a group named "ESX Admins". This could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor. VMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named "ESX Admins" to have full administrative access by default.

WindowsProcess Creation
TA0002 · Executioncve.2024-37085detection.emerging-threats
François HubautMon Jul 292024
Emerging Threathightest

Potential Exploitation of CVE-2024-37085 - Suspicious ESX Admins Group Activity

Detects any creation or modification to a windows domain group with the name "ESX Admins". This could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor. VMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named "ESX Admins" to have full administrative access by default.

Windowssecurity
TA0002 · Executioncve.2024-37085detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Jul 302024
Emerging Threatmediumtest

DarkGate - Drop DarkGate Loader In C:\Temp Directory

Detects attackers attempting to save, decrypt and execute the DarkGate Loader in C:\temp folder.

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Tomasz Dyduch+1Fri May 312024
Emerging Threathightest

Potential Kapeka Decrypted Backdoor Indicator

Detects the presence of a file that is decrypted backdoor binary dropped by the Kapeka Dropper, which disguises itself as a hidden file under a folder named "Microsoft" within "CSIDL_COMMON_APPDATA" or "CSIDL_LOCAL_APPDATA", depending on the process privileges. The file, typically 5-6 characters long with a random combination of consonants and vowels followed by a ".wll" extension to pose as a legitimate file to evade detection.

WindowsFile Event
TA0005 · Defense Evasiondetection.emerging-threats
Swachchhanda Shrawan Poudel+1Wed Jul 032024
Emerging Threathightest

Kapeka Backdoor Loaded Via Rundll32.EXE

Detects the Kapeka Backdoor binary being loaded by rundll32.exe. The Kapeka loader drops a backdoor, which is a DLL with the '.wll' extension masquerading as a Microsoft Word Add-In.

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious FileTA0005 · Defense EvasionT1218.011 · Rundll32+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Kapeka Backdoor Persistence Activity

Detects Kapeka backdoor persistence activity. Depending on the process privileges, the Kapeka dropper then sets persistence for the backdoor either as a scheduled task (if admin or SYSTEM) or autorun registry (if not). For the scheduled task, it creates a scheduled task called "Sens Api" via schtasks command, which is set to run upon system startup as SYSTEM. To establish persistence through the autorun utility, it adds an autorun entry called "Sens Api" under HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run via the "reg add" command. Both persistence mechanisms are set to launch the binary by calling rundll32 and passing the backdoor's first export ordinal (#1) without any additional argument.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Kapeka Backdoor Scheduled Task Creation

Detects Kapeka backdoor scheduled task creation based on attributes such as paths, commands line flags, etc.

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathighexperimental

Lummac Stealer Activity - Execution Of More.com And Vbc.exe

Detects the execution of more.com and vbc.exe in the process tree. This behavior was observed by a set of samples related to Lummac Stealer. The Lummac payload is injected into the vbc.exe process.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injectiondetection.emerging-threats
Joseliyo SanchezThu Dec 192024
Emerging Threatlowtest

Potential Raspberry Robin Registry Set Internet Settings ZoneMap

Detects registry modifications related to the proxy configuration of the system, potentially associated with the Raspberry Robin malware, as seen in campaigns running in Q1 2024. Raspberry Robin may alter proxy settings to circumvent security measures, ensuring unhindered connection with Command and Control servers for maintaining control over compromised systems if there are any proxy settings that are blocking connections.

WindowsRegistry Set
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasiondetection.emerging-threats
Swachchhanda Shrawan PoudelWed Jul 312024
Emerging Threathightest

Forest Blizzard APT - File Creation Activity

Detects the creation of specific files inside of ProgramData directory. These files were seen being created by Forest Blizzard as described by MSFT.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Loggingdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threatmediumtest

Forest Blizzard APT - JavaScript Constrained File Creation

Detects the creation of JavaScript files inside of the DriverStore directory. Forest Blizzard used this to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Loggingdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024