Rule Library

Sigma Rules

2,824 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Powershell Sensitive File Discovery

Detect adversaries enumerate sensitive files

WindowsPowerShell Script
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautFri Sep 16windows
Detectionlowtest

PowerShell Script Change Permission Via Set-Acl - PsScript

Detects PowerShell scripts set ACL to of a file or a folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionhightest

PowerShell Set-Acl On Windows Folder - PsScript

Detects PowerShell scripts to set the ACL to a file in the Windows folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionmediumtest

Change PowerShell Policies to an Insecure Level - PowerShell

Detects changing the PowerShell script execution policy to a potentially insecure level using the "Set-ExecutionPolicy" cmdlet.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautWed Oct 20windows
Detectionhightest

PowerShell ShellCode

Detects Base64 encoded Shellcode

WindowsPowerShell Script
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process InjectionTA0002 · Execution+1
David Ledbetter (shellcode)+1Sat Nov 17windows
Detectionhightest

Malicious ShellIntel PowerShell Commandlets

Detects Commandlet names from ShellIntel exploitation scripts.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Max Altgelt (Nextron Systems)+1Mon Aug 09windows
Detectionmediumtest

Detected Windows Software Discovery - PowerShell

Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable.

WindowsPowerShell Script
TA0007 · DiscoveryT1518 · Software Discovery
Nikita Nazarov+1Fri Oct 16windows
Detectionmediumtest

Powershell Store File In Alternate Data Stream

Storing files in Alternate Data Stream (ADS) similar to Astaroth malware.

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautThu Sep 02windows
Detectionhightest

Potential Persistence Via Security Descriptors - ScriptBlock

Detects usage of certain functions and keywords that are used to manipulate security descriptors in order to potentially set a backdoor. As seen used in the DAMP project.

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Jan 05windows
Detectionlowtest

AD Groups Or Users Enumeration Using PowerShell - ScriptBlock

Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.

WindowsPowerShell Script
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionlowtest

Potential PowerShell Obfuscation Using Character Join

Detects specific techniques often seen used inside of PowerShell scripts to obfscuate Alias creation

WindowsPowerShell Script
TA0005 · Defense EvasionTA0002 · ExecutionT1027 · Obfuscated Files or InformationT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Mon Jan 09windows
Detectionmediumtest

Suspicious Eventlog Clear

Detects usage of known powershell cmdlets such as "Clear-EventLog" to clear the Windows event logs

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 12windows
Detectionmediumtest

Powershell Directory Enumeration

Detects technique used by MAZE ransomware to enumerate directories using Powershell

WindowsPowerShell Script
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautThu Mar 17windows
Detectionmediumtest

Suspicious PowerShell Download - Powershell Script

Detects suspicious PowerShell download command

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 05windows
Detectionmediumtest

Powershell Execute Batch Script

Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](https://attack.mitre.org/software/S0106)) is the primary command prompt on Windows systems. The Windows command prompt can be used to control almost any aspect of a system, with various permission levels required for different subsets of commands. Batch files (ex: .bat or .cmd) also provide the shell with a list of sequential commands to run, as well as normal scripting operations such as conditionals and loops. Common uses of batch files include long or repetitive tasks, or the need to run the same set of commands on multiple system

WindowsPowerShell Script
TA0002 · ExecutionT1059.003 · Windows Command Shell
François HubautSun Jan 02windows
Detectionmediumtest

Extracting Information with PowerShell

Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files containing passwords for a system or service, or source code/binary files containing embedded passwords.

WindowsPowerShell Script
TA0006 · Credential AccessT1552.001 · Credentials In Files
François HubautSun Dec 19windows
Detectionmediumtest

Troubleshooting Pack Cmdlet Execution

Detects execution of "TroubleshootingPack" cmdlets to leverage CVE-2022-30190 or action similar to "msdt" lolbin (as described in LOLBAS)

WindowsPowerShell Script
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jun 21windows
Detectionlowtest

Password Policy Discovery With Get-AdDefaultDomainPasswordPolicy

Detetcts PowerShell activity in which Get-Addefaultdomainpasswordpolicy is used to get the default password policy for an Active Directory domain.

WindowsPowerShell Script
TA0007 · DiscoveryT1201 · Password Policy Discovery
François HubautThu Mar 17windows
Detectionlowtest

Suspicious PowerShell Get Current User

Detects the use of PowerShell to identify the current logged user.

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
François HubautMon Apr 04windows
Detectionlowtest

Suspicious GPO Discovery With Get-GPO

Detect use of Get-GPO to get one GPO or all the GPOs in a domain.

WindowsPowerShell Script
TA0007 · DiscoveryT1615 · Group Policy Discovery
François HubautSat Jun 04windows
Detectionlowtest

Suspicious Process Discovery With Get-Process

Get the processes that are running on the local computer.

WindowsPowerShell Script
TA0007 · DiscoveryT1057 · Process Discovery
François HubautThu Mar 17windows
Detectionhightest

PowerShell Get-Process LSASS in ScriptBlock

Detects a Get-Process command on lsass process, which is in almost all cases a sign of malicious activity

WindowsPowerShell Script
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Fri Apr 23windows
Detectionmediumtest

Suspicious GetTypeFromCLSID ShellExecute

Detects suspicious Powershell code that execute COM Objects

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
François HubautSat Apr 02windows
Detectionmediumtest

Suspicious Hyper-V Cmdlets

Adversaries may carry out malicious operations using a virtual instance to avoid detection

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.006 · Run Virtual Instance
François HubautSat Apr 09windows
Detectionhightest

Suspicious PowerShell Invocations - Generic

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 12windows
Detectionhightest

Suspicious PowerShell Invocations - Specific

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Sun Mar 05windows
Detectionmediumtest

Change User Agents with WebRequest

Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server.

WindowsPowerShell Script
TA0011 · Command and ControlT1071.001 · Web Protocols
François HubautSun Jan 23windows
Detectionmediumtest

Suspicious IO.FileStream

Open a handle on the drive volume via the \\.\ DOS device path specifier and perform direct access read of the first few bytes of the volume.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.003 · Clear Command History
François HubautSun Jan 09windows
Detectionmediumtest

Potential Keylogger Activity

Detects PowerShell scripts that contains reference to keystroke capturing functions

WindowsPowerShell Script
TA0009 · CollectionTA0006 · Credential AccessT1056.001 · Keylogging
Nasreddine Bencherchali (Nextron Systems)Wed Jan 04windows
Detectionmediumtest

Potential Suspicious PowerShell Keywords

Detects potentially suspicious keywords that could indicate the use of a PowerShell exploitation framework

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Mon Feb 11windows
Detectionlowtest

Suspicious Get Local Groups Information - PowerShell

Detects the use of PowerShell modules and cmdlets to gather local group information. Adversaries may use local system permission groups to determine which groups exist and which users belong to a particular group such as the local administrators group.

WindowsPowerShell Script
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautSun Dec 12windows
Detectionmediumtest

Powershell Local Email Collection

Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a users local system, such as Outlook storage or cache files.

WindowsPowerShell Script
TA0009 · CollectionT1114.001 · Local Email Collection
François HubautWed Jul 21windows
Detectionlowtest

Suspicious Mount-DiskImage

Adversaries may abuse container files such as disk image (.iso, .vhd) file formats to deliver malicious payloads that may not be tagged with MOTW.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.005 · Mark-of-the-Web Bypass
François HubautTue Feb 01windows
Detectionmediumtest

PowerShell Deleted Mounted Share

Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.005 · Network Share Connection Removal
oscd.community+1Thu Oct 08windows
Detectionlowtest

Suspicious Connection to Remote Account

Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the password for an account, an adversary may opt to systematically guess the password using a repetitive or iterative mechanism

WindowsPowerShell Script
TA0006 · Credential AccessT1110.001 · Password Guessing
François HubautMon Dec 27windows
Detectionmediumtest

Suspicious New-PSDrive to Admin Share

Adversaries may use to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user.

WindowsPowerShell Script
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
François HubautSat Aug 13windows
Detectionmediumtest

Suspicious TCP Tunnel Via PowerShell Script

Detects powershell scripts that creates sockets/listeners which could be indicative of tunneling activity

WindowsPowerShell Script
TA0011 · Command and ControlT1090 · Proxy
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectionmediumtest

Recon Information for Export with PowerShell

Once established within a system or network, an adversary may use automated techniques for collecting internal data

WindowsPowerShell Script
TA0009 · CollectionT1119 · Automated Collection
François HubautFri Jul 30windows
Detectionmediumtest

Remove Account From Domain Admin Group

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts.

WindowsPowerShell Script
TA0040 · ImpactT1531 · Account Access Removal
François HubautSun Dec 26windows
Detectionhightest

Suspicious Service DACL Modification Via Set-Service Cmdlet - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionlowtest

Potential PowerShell Obfuscation Using Alias Cmdlets

Detects Set-Alias or New-Alias cmdlet usage. Which can be use as a mean to obfuscate PowerShell scripts

WindowsPowerShell Script
TA0005 · Defense EvasionTA0002 · ExecutionT1027 · Obfuscated Files or InformationT1059.001 · PowerShell
François HubautSun Jan 08windows
Detectionlowtest

Suspicious Get Information for SMB Share

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network.

WindowsPowerShell Script
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionlowtest

Suspicious SSL Connection

Adversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol.

WindowsPowerShell Script
TA0011 · Command and ControlT1573 · Encrypted Channel
François HubautSun Jan 23windows
Detectionmediumtest

Suspicious Start-Process PassThru

Powershell use PassThru option to start in background

WindowsPowerShell Script
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
François HubautSat Jan 15windows
Detectionmediumtest

Suspicious Unblock-File

Remove the Zone.Identifier alternate data stream which identifies the file as downloaded from the internet.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.005 · Mark-of-the-Web Bypass
François HubautTue Feb 01windows
Detectionlowtest

Replace Desktop Wallpaper by Powershell

An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users. This may take the form of modifications to internal websites, or directly to user systems with the replacement of the desktop wallpaper

WindowsPowerShell Script
TA0040 · ImpactT1491.001 · Internal Defacement
François HubautSun Dec 26windows
Detectionlowtest

Powershell Suspicious Win32_PnPEntity

Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.

WindowsPowerShell Script
TA0007 · DiscoveryT1120 · Peripheral Device Discovery
François HubautMon Aug 23windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell - PS Script

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsPowerShell Script
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows