Rule Library

Sigma Rules

54 rules found for "OTR (Open Threat Research)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Enabling COR Profiler Environment Variables

Detects .NET Framework CLR and .NET Core CLR "cor_enable_profiling" and "cor_profiler" variables being set and configured.

WindowsRegistry Set
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.012 · COR_PROFILER
Jose Rodriguez+2Thu Sep 10windows
Detectioninformationaltest

New Application in AppCompat

A General detection for a new application in AppCompat. This indicates an application executing for the first time on an endpoint.

WindowsRegistry Set
TA0002 · ExecutionT1204.002 · Malicious File
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Wdigest Enable UseLogonCredential

Detects potential malicious modification of the property value of UseLogonCredential from HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest to enable clear-text credentials

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Thu Sep 12windows
Threat Huntmediumtest

Potential Remote WMI ActiveScriptEventConsumers Activity

Detect potential adversaries leveraging WMI ActiveScriptEventConsumers remotely to move laterally in a network. This event is best correlated and used as an enrichment to determine the potential lateral movement activity.

Windowssecurity
TA0008 · Lateral MovementTA0004 · Privilege Escalationdetection.threat-huntingTA0003 · Persistence+1
Roberto Rodriguez (Cyb3rWard0g)+1Wed Sep 02windows
Threat Huntlowtest

PFX File Creation

Detects the creation of PFX files (Personal Information Exchange format). PFX files contain private keys and certificates bundled together, making them valuable targets for attackers seeking to: - Exfiltrate digital certificates for impersonation or signing malicious code - Establish persistent access through certificate-based authentication - Bypass security controls that rely on certificate validation Analysts should investigate PFX file creation events by examining which process created the PFX file and its parent process chain, as well as unusual locations outside standard certificate stores or development environments.

WindowsFile Event
TA0006 · Credential AccessT1552.004 · Private Keysdetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Threat Huntlowtest

System Drawing DLL Load

Detects processes loading "System.Drawing.ni.dll". This could be an indicator of potential Screen Capture.

WindowsImage Load (DLL)
TA0009 · CollectionT1113 · Screen Capturedetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows