Rule Library

Sigma Rules

1,585 rules found for "defense-evasion"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

CrashControl CrashDump Disabled

Detects disabling the CrashDump per registry (as used by HermeticWiper)

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1564 · Hide ArtifactsT1112 · Modify Registry
Tobias MichalskiThu Feb 24windows
Detectionhighexperimental

Security Event Logging Disabled via MiniNt Registry Key - Registry Set

Detects the addition of the 'MiniNt' key to the registry. Upon a reboot, Windows Event Log service will stop writing events. Windows Event Log is a service that collects and stores event logs from the operating system and applications. It is an important component of Windows security and auditing. Adversary may want to disable this service to disable logging of security events which could be used to detect their activities.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1562.002 · Disable Windows Event LoggingT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 09windows
Detectionhightest

Service Binary in Suspicious Folder

Detect the creation of a service with a service binary located in a suspicious directory

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Florian Roth (Nextron Systems)+1Mon May 02windows
Detectionhighexperimental

Windows Credential Guard Disabled - Registry

Detects attempts to disable Windows Credential Guard by setting registry values to 0. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Dec 26windows
Detectionhightest

Custom File Open Handler Executes PowerShell

Detects the abuse of custom file open handler, executing powershell

WindowsRegistry Set
TA0005 · Defense EvasionT1202 · Indirect Command Execution
CD_R0M_Sat Jun 11windows
Detectionmediumtest

Potential Registry Persistence Attempt Via DbgManagedDebugger

Detects the addition of the "Debugger" value to the "DbgManagedDebugger" key in order to achieve persistence. Which will get invoked when an application crashes

WindowsRegistry Set
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574 · Hijack Execution Flow
François HubautSun Aug 07windows
Detectionmediumtest

Windows Defender Exclusions Added - Registry

Detects the Setting of Windows Defender Exclusions

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christian Burkard (Nextron Systems)Tue Jul 06windows
Detectionmediumtest

Potentially Suspicious Desktop Background Change Via Registry

Detects registry value settings that would replace the user's desktop background. This is a common technique used by malware to change the desktop background to a ransom note or other image.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionTA0040 · ImpactT1112 · Modify Registry+1
Nasreddine Bencherchali (Nextron Systems)+1Thu Dec 21windows
Detectionhightest

Antivirus Filter Driver Disallowed On Dev Drive - Registry

Detects activity that indicates a user disabling the ability for Antivirus mini filter to inspect a "Dev Drive".

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
kostastsale+1Sun Nov 05windows
Detectionhightest

Windows Hypervisor Enforced Code Integrity Disabled

Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the "Enabled" value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker to load unsigned and untrusted code to be run in the kernel

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+1Tue Mar 14windows
Detectionhightest

Hypervisor Enforced Paging Translation Disabled

Detects changes to the "DisableHypervisorEnforcedPagingTranslation" registry value. Where the it is set to "1" in order to disable the Hypervisor Enforced Paging Translation feature.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Jul 05windows
Detectionhightest

DHCP Callout DLL Installation

Detects the installation of a Callout DLL via CalloutDlls and CalloutEnabled parameter in Registry, which can be used to execute code in context of the DHCP server (restart required)

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+1
Dimitrios SlamarisMon May 15windows
Detectionmediumtest

Disable Administrative Share Creation at Startup

Administrative shares are hidden network shares created by Microsoft Windows NT operating systems that grant system administrators remote access to every disk volume on a network-connected system

WindowsRegistry Set
TA0005 · Defense EvasionT1070.005 · Network Share Connection Removal
François HubautSun Jan 16windows
Detectionhightest

Potential AutoLogger Sessions Tampering

Detects tampering with autologger trace sessions which is a technique used by attackers to disable logging

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Aug 01windows
Detectionmediumtest

Disable Microsoft Defender Firewall via Registry

Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage

WindowsRegistry Set
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSun Jan 09windows
Detectionmediumtest

Disable Internal Tools or Feature in Registry

Detects registry modifications that change features of internal Windows tools (malware like Agent Tesla uses this technique)

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François Hubaut+2Fri Mar 18windows
Detectionhightest

Disable Macro Runtime Scan Scope

Detects tampering with the MacroRuntimeScanScope registry key to disable runtime scanning of enabled macros

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Oct 25windows
Detectionmediumtest

Disable Privacy Settings Experience in Registry

Detects registry modifications that disable Privacy Settings Experience

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautSun Oct 02windows
Detectionmediumtest

Disable Windows Security Center Notifications

Detect set UseActionCenterExperience to 0 to disable the Windows security center notification

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Aug 19windows
Detectionhightest

Windows Defender Service Disabled - Registry

Detects when an attacker or tool disables the Windows Defender service (WinDefend) via the registry

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+3Mon Aug 01windows
Detectionhighexperimental

Windows Event Log Access Tampering Via Registry

Detects changes to the Windows EventLog channel permission values. It focuses on changes to the Security Descriptor Definition Language (SDDL) string, as modifications to these values can restrict access to specific users or groups, potentially aiding in defense evasion by controlling who can view or modify a event log channel. Upon execution, the user shouldn't be able to access the event log channel via the event viewer or via utilities such as "Get-EventLog" or "wevtutil".

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1547.001 · Registry Run Keys / Startup Folder+1
X__JuniorThu Jan 16windows
Detectionmediumtest

Disable Windows Firewall by Registry

Detect set EnableFirewall to 0 to disable the Windows firewall

WindowsRegistry Set
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautFri Aug 19windows
Detectionhightest

Disable Windows Event Logging Via Registry

Detects tampering with the "Enabled" registry key in order to disable Windows logging of a Windows event channel

WindowsRegistry Set
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
François Hubaut+1Mon Jul 04windows
Detectionmediumtest

Disable Exploit Guard Network Protection on Windows Defender

Detects disabling Windows Defender Exploit Guard Network Protection

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin SongerWed Aug 04windows
Detectionhightest

Disabled Windows Defender Eventlog

Detects the disabling of the Windows Defender eventlog as seen in relation to Lockbit 3.0 infections

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Mon Jul 04windows
Detectionhightest

Disable PUA Protection on Windows Defender

Detects disabling Windows Defender PUA protection

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin SongerWed Aug 04windows
Detectionmediumtest

Disable Tamper Protection on Windows Defender

Detects disabling Windows Defender Tamper Protection

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin SongerWed Aug 04windows
Detectionmediumtest

Add DisallowRun Execution to Registry

Detect set DisallowRun to 1 to prevent user running specific computer program

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Aug 19windows
Detectionmediumtest

DNS-over-HTTPS Enabled by Registry

Detects when a user enables DNS-over-HTTPS. This can be used to hide internet activity or be used to hide the process of exfiltrating data. With this enabled organization will lose visibility into data such as query type, response and originating IP that are used to determine bad actors.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationT1112 · Modify Registry
Austin SongerThu Jul 22windows
Detectionhightest

New DNS ServerLevelPluginDll Installed

Detects the installation of a DNS plugin DLL via ServerLevelPluginDll parameter in registry, which can be used to execute code in context of the DNS server (restart required)

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+1
Florian Roth (Nextron Systems)Mon May 08windows
Detectionhightest

ETW Logging Disabled In .NET Processes - Sysmon Registry

Potential adversaries stopping ETW providers recording loaded .NET assemblies.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify RegistryT1562 · Impair Defenses
Roberto Rodriguez (Cyb3rWard0g)+1Fri Jun 05windows
Detectionhightest

Directory Service Restore Mode(DSRM) Registry Value Tampering

Detects changes to "DsrmAdminLogonBehavior" registry value. During a Domain Controller (DC) promotion, administrators create a Directory Services Restore Mode (DSRM) local administrator account with a password that rarely changes. The DSRM account is an “Administrator” account that logs in with the DSRM mode when the server is booting up to restore AD backups or recover the server from a failure. Attackers could abuse DSRM account to maintain their persistence and access to the organization's Active Directory. If the "DsrmAdminLogonBehavior" value is set to "0", the administrator account can only be used if the DC starts in DSRM. If the "DsrmAdminLogonBehavior" value is set to "1", the administrator account can only be used if the local AD DS service is stopped. If the "DsrmAdminLogonBehavior" value is set to "2", the administrator account can always be used.

WindowsRegistry Set
TA0005 · Defense EvasionTA0006 · Credential AccessTA0003 · PersistenceT1556 · Modify Authentication Process
Nischal KhadgiThu Jul 11windows
Detectionmediumtest

Enabling COR Profiler Environment Variables

Detects .NET Framework CLR and .NET Core CLR "cor_enable_profiling" and "cor_profiler" variables being set and configured.

WindowsRegistry Set
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.012 · COR_PROFILER
Jose Rodriguez+2Thu Sep 10windows
Detectionmediumtest

Scripted Diagnostics Turn Off Check Enabled - Registry

Detects enabling TurnOffCheck which can be used to bypass defense of MSDT Follina vulnerability

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christopher Peacock+1Wed Jun 15windows
Detectionhightest

Potential EventLog File Location Tampering

Detects tampering with EventLog service "file" key. In order to change the default location of an Evtx file. This technique is used to tamper with log collection and alerting

WindowsRegistry Set
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
D3F7A5105Mon Jan 02windows
Detectionhightest

Suspicious Application Allowed Through Exploit Guard

Detects applications being added to the "allowed applications" list of exploit guard in order to bypass controlled folder settings

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Change User Account Associated with the FAX Service

Detect change of the user account associated with the FAX service to avoid the escalation problem.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautSun Jul 17windows
Detectionhightest

Change the Fax Dll

Detect possible persistence using Fax DLL load when service restart

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautSun Jul 17windows
Detectionhightest

New File Association Using Exefile

Detects the abuse of the exefile handler in new file association. Used for bypass of security products.

WindowsRegistry Set
TA0005 · Defense Evasion
Andreas HunkelerFri Nov 19windows
Detectionmediumtest

Displaying Hidden Files Feature Disabled

Detects modifications to the "Hidden" and "ShowSuperHidden" explorer registry values in order to disable showing of hidden files and system files. This technique is abused by several malware families to hide their files from normal users.

WindowsRegistry Set
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
François HubautSat Apr 02windows
Detectionmediumtest

Registry Hide Function from User

Detects registry modifications that hide internal tools or functions from the user (malware like Agent Tesla, Hermetic Wiper uses this technique)

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Mar 18windows
Detectionhightest

Hide Schedule Task Via Index Value Tamper

Detects when the "index" value of a scheduled task is modified from the registry Which effectively hides it from any tooling such as "schtasks /query" (Read the referenced link for more information about the effects of this technique)

WindowsRegistry Set
TA0005 · Defense EvasionT1562 · Impair Defenses
Nasreddine Bencherchali (Nextron Systems)Fri Aug 26windows
Detectionhightest

Driver Added To Disallowed Images In HVCI - Registry

Detects changes to the "HVCIDisallowedImages" registry value to potentially add a driver to the list, in order to prevent it from loading.

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)+1Tue Dec 05windows
Detectionhightest

IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols

Detects changes to Internet Explorer's (IE / Windows Internet properties) ZoneMap configuration of the "HTTP" and "HTTPS" protocols to point to the "My Computer" zone. This allows downloaded files from the Internet to be granted the same level of trust as files stored locally.

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)+1Tue Sep 05windows
Detectionhightest

Uncommon Extension In Keyboard Layout IME File Registry Value

Detects usage of Windows Input Method Editor (IME) keyboard layout feature, which allows an attacker to load a DLL into the process after sending the WM_INPUTLANGCHANGEREQUEST message. Before doing this, the client needs to register the DLL in a special registry key that is assumed to implement this keyboard layout. This registry key should store a value named "Ime File" with a DLL path. IMEs are essential for languages that have more characters than can be represented on a standard keyboard, such as Chinese, Japanese, and Korean.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
X__Junior (Nextron Systems)Tue Nov 21windows
Detectionhightest

Suspicious Path In Keyboard Layout IME File Registry Value

Detects usage of Windows Input Method Editor (IME) keyboard layout feature, which allows an attacker to load a DLL into the process after sending the WM_INPUTLANGCHANGEREQUEST message. Before doing this, the client needs to register the DLL in a special registry key that is assumed to implement this keyboard layout. This registry key should store a value named "Ime File" with a DLL path. IMEs are essential for languages that have more characters than can be represented on a standard keyboard, such as Chinese, Japanese, and Korean.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
X__Junior (Nextron Systems)Tue Nov 21windows
Detectionmediumtest

Internet Explorer DisableFirstRunCustomize Enabled

Detects changes to the Internet Explorer "DisableFirstRunCustomize" value, which prevents Internet Explorer from running the first run wizard the first time a user starts the browser after installing Internet Explorer or Windows.

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue May 16windows
Detectionhightest

RestrictedAdminMode Registry Value Tampering

Detects changes to the "DisableRestrictedAdmin" registry value in order to disable or enable RestrictedAdmin mode. RestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop. This prevents your credentials from being harvested during the initial connection process if the remote server has been compromise

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Jan 13windows