Rule Library

Sigma Rules

171 rules found for "impact"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

MSI Installation From Suspicious Locations

Detects MSI package installation from suspicious locations

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Aug 31windows
Detectionmediumexperimental

MSSQL Destructive Query

Detects the invocation of MS SQL transactions that are destructive towards table or database data, such as "DROP TABLE" or "DROP DATABASE".

Windowsapplication
TA0010 · ExfiltrationTA0040 · ImpactT1485 · Data Destruction
Daniel DegasperiWed Jun 04windows
Detectionmediumtest

Potential Secure Deletion with SDelete

Detects files that have extensions commonly seen while SDelete is used to wipe files.

Windowssecurity
TA0040 · ImpactTA0005 · Defense EvasionT1070.004 · File DeletionT1027.005 · Indicator Removal from Tools+3
Thomas PatzkeWed Jun 14windows
Detectioninformationaltest

User Logoff Event

Detects a user log-off activity. Could be used for example to correlate information during forensic investigations

Windowssecurity
TA0040 · ImpactT1531 · Account Access Removal
François HubautFri Oct 14windows
Detectioninformationalstable

Locked Workstation

Detects locked workstation session events that occur automatically after a standard period of inactivity.

Windowssecurity
TA0040 · Impact
Alexandr Yampolskyi+1Tue Mar 26windows
Detectionmediumexperimental

ISATAP Router Address Was Set

Detects the configuration of a new ISATAP router on a Windows host. While ISATAP is a legitimate Microsoft technology for IPv6 transition, unexpected or unauthorized ISATAP router configurations could indicate a potential IPv6 DNS Takeover attack using tools like mitm6. In such attacks, adversaries advertise themselves as DHCPv6 servers and set malicious ISATAP routers to intercept traffic. This detection should be correlated with network baselines and known legitimate ISATAP deployments in your environment.

Windowssystem
TA0040 · ImpactTA0006 · Credential AccessTA0009 · CollectionTA0001 · Initial Access+4
hamidSun Oct 19windows
Detectioninformationalstable

Windows Update Error

Detects Windows update errors including installation failures and connection issues. Defenders should observe this in case critical update KBs aren't installed.

Windowssystem
TA0040 · ImpactTA0042 · Resource DevelopmentT1584 · Compromise Infrastructure
François HubautSat Dec 04windows
Detectionhightest

NTFS Vulnerability Exploitation

This the exploitation of a NTFS vulnerability as reported without many details via Twitter

Windowssystem
TA0040 · ImpactT1499.001 · OS Exhaustion Flood
Florian Roth (Nextron Systems)Mon Jan 11windows
Detectionhightest

Important Scheduled Task Deleted

Detects when adversaries try to stop system services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities

Windowstaskscheduler
TA0040 · ImpactT1489 · Service Stop
François HubautFri Jan 13windows
Detectionmediumtest

Backup Files Deleted

Detects deletion of files with extensions often used for backup files. Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery.

WindowsFile Delete
TA0040 · ImpactT1490 · Inhibit System Recovery
François HubautSun Jan 02windows
Detectionhightest

Suspicious Creation TXT File in User Desktop

Ransomware create txt file in the user Desktop

WindowsFile Event
TA0040 · ImpactT1486 · Data Encrypted for Impact
François HubautSun Dec 26windows
Detectionmediumtest

Suspicious Appended Extension

Detects file renames where the target filename uses an uncommon double extension. Could indicate potential ransomware activity renaming files and adding a custom extension to the encrypted files, such as ".jpg.crypted", ".docx.locky", etc.

WindowsFile Rename
TA0040 · ImpactT1486 · Data Encrypted for Impact
François HubautSat Jul 16windows
Detectionhightest

Load Of RstrtMgr.DLL By A Suspicious Process

Detects the load of RstrtMgr DLL (Restart Manager) by a suspicious process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows. It could also be used for anti-analysis purposes by shut downing specific processes.

WindowsImage Load (DLL)
TA0040 · ImpactTA0005 · Defense EvasionT1486 · Data Encrypted for ImpactT1562.001 · Disable or Modify Tools
Luc GénauxTue Nov 28windows
Detectionlowtest

Load Of RstrtMgr.DLL By An Uncommon Process

Detects the load of RstrtMgr DLL (Restart Manager) by an uncommon process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows. It could also be used for anti-analysis purposes by shut downing specific processes.

WindowsImage Load (DLL)
TA0040 · ImpactTA0005 · Defense EvasionT1486 · Data Encrypted for ImpactT1562.001 · Disable or Modify Tools
Luc GénauxTue Nov 28windows
Detectionhightest

Suspicious Volume Shadow Copy Vssapi.dll Load

Detects the image load of VSS DLL by uncommon executables

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0040 · ImpactT1490 · Inhibit System Recovery
François HubautMon Oct 31windows
Detectionmediumtest

Potentially Suspicious Volume Shadow Copy Vsstrace.dll Load

Detects the image load of VSS DLL by uncommon executables

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0040 · ImpactT1490 · Inhibit System Recovery
François HubautFri Feb 17windows
Detectionhightest

Suspicious Volume Shadow Copy VSS_PS.dll Load

Detects the image load of vss_ps.dll by uncommon executables. This DLL is used by the Volume Shadow Copy Service (VSS) to manage shadow copies of files and volumes. It is often abused by attackers to delete or manipulate shadow copies, which can hinder forensic investigations and data recovery efforts. The fact that it is loaded by processes that are not typically associated with VSS operations can indicate suspicious activity.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0040 · ImpactT1490 · Inhibit System Recovery
Markus NeisWed Jul 07windows
Detectionhighstable

Network Communication With Crypto Mining Pool

Detects initiated network connections to crypto mining pools

WindowsNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)+1Tue Oct 26windows
Detectionhighstable

Delete Volume Shadow Copies Via WMI With PowerShell

Shadow Copies deletion using operating systems utilities via PowerShell

WindowsPowerShell Classic
TA0040 · ImpactT1490 · Inhibit System Recovery
François HubautThu Jun 03windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - PsModule

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsPowerShell Module
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
Nasreddine Bencherchali (Nextron Systems)+1Sun Jan 22windows
Detectionhightest

AADInternals PowerShell Cmdlets Execution - PsScript

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

WindowsPowerShell Script
TA0002 · ExecutionTA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential Access+1
Austin Songer+2Fri Dec 23windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - PsScript

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsPowerShell Script
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
François Hubaut+1Sun Jan 22windows
Detectionhightest

Powershell Add Name Resolution Policy Table Rule

Detects powershell scripts that adds a Name Resolution Policy Table (NRPT) rule for the specified namespace. This will bypass the default DNS server and uses a specified server for answering the query.

WindowsPowerShell Script
TA0040 · ImpactT1565 · Data Manipulation
Borna TalebiTue Sep 14windows
Detectioncriticaltest

Silence.EDA Detection

Detects Silence EmpireDNSAgent as described in the Group-IP report

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellTA0011 · Command and ControlT1071.004 · DNS+5
Alina Stepchenkova+2Fri Nov 01windows
Detectionmediumtest

Remove Account From Domain Admin Group

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts.

WindowsPowerShell Script
TA0040 · ImpactT1531 · Account Access Removal
François HubautSun Dec 26windows
Detectionlowtest

Replace Desktop Wallpaper by Powershell

An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users. This may take the form of modifications to internal websites, or directly to user systems with the replacement of the desktop wallpaper

WindowsPowerShell Script
TA0040 · ImpactT1491.001 · Internal Defacement
François HubautSun Dec 26windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell - PS Script

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsPowerShell Script
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows
Detectionhighstable

Boot Configuration Tampering Via Bcdedit.EXE

Detects the use of the bcdedit command to tamper with the boot configuration data. This technique is often times used by malware or attackers as a destructive way before launching ransomware.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionmediumtest

Deleted Data Overwritten Via Cipher.EXE

Detects usage of the "cipher" built-in utility in order to overwrite deleted data from disk. Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives

WindowsProcess Creation
TA0040 · ImpactT1485 · Data Destruction
François HubautSun Dec 26windows
Detectionhightest

Copy From VolumeShadowCopy Via Cmd.EXE

Detects the execution of the builtin "copy" command that targets a shadow copy (sometimes used to copy registry hives that are in use)

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Max Altgelt (Nextron Systems)+1Mon Aug 09windows
Detectionmediumtest

Dism Remove Online Package

Deployment Image Servicing and Management tool. DISM is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautSun Jan 16windows
Detectionhighstable

Fsutil Suspicious Invocation

Detects suspicious parameters of fsutil (deleting USN journal, configuring it with small size, etc). Might be used by ransomwares during the attack (seen by NotPetya and others).

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1070 · Indicator RemovalT1485 · Data Destruction
Ecco+2Thu Sep 26windows
Detectionmediumtest

Portable Gpg.EXE Execution

Detects the execution of "gpg.exe" from uncommon location. Often used by ransomware and loaders to decrypt/encrypt data.

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impact
François Hubaut+1Sun Aug 06windows
Detectionlowtest

Stop Windows Service Via Net.EXE

Detects the stopping of a Windows service via the "net" utility.

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Jakob Weinzettl+2Sun Mar 05windows
Detectionhightest

AADInternals PowerShell Cmdlets Execution - ProccessCreation

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

WindowsProcess Creation
TA0002 · ExecutionTA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential Access+1
Austin Songer+2Fri Dec 23windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - ProcCreation

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsProcess Creation
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
François HubautSun Jan 22windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows
Detectionlowtest

Stop Windows Service Via PowerShell Stop-Service

Detects the stopping of a Windows service via the PowerShell Cmdlet "Stop-Service"

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Jakob Weinzettl+2Sun Mar 05windows
Detectionmediumexperimental

Windows Recovery Environment Disabled Via Reagentc

Detects attempts to disable windows recovery environment using Reagentc. ReAgentc.exe is a command-line tool in Windows used to manage the Windows Recovery Environment (WinRE). It allows users to enable, disable, and configure WinRE, which is used for troubleshooting and repairing common boot issues.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Daniel Koifman (KoifSec)+1Thu Jul 31windows
Detectionhightest

Suspicious Reg Add BitLocker

Detects suspicious addition to BitLocker related registry keys via the reg.exe utility

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impact
François HubautMon Nov 15windows
Detectionmediumtest

Potentially Suspicious Desktop Background Change Using Reg.EXE

Detects the execution of "reg.exe" to alter registry keys that would replace the user's desktop background. This is a common technique used by malware to change the desktop background to a ransom note or other image.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0040 · ImpactT1112 · Modify Registry+1
Stephen Lincoln (AttackIQ)Thu Dec 21windows
Detectionhightest

Renamed Gpg.EXE Execution

Detects the execution of a renamed "gpg.exe". Often used by ransomware and loaders to decrypt/encrypt data.

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impact
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 09windows
Detectionhightest

Renamed Sysinternals Sdelete Execution

Detects the use of a renamed SysInternals Sdelete, which is something an administrator shouldn't do (the renaming)

WindowsProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Florian Roth (Nextron Systems)Tue Sep 06windows
Detectionhightest

Delete Important Scheduled Task

Detects when adversaries stop services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

Delete All Scheduled Tasks

Detects the usage of schtasks with the delete flag and the asterisk symbol to delete all tasks from the schedule of the local computer, including tasks scheduled by other users.

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

Disable Important Scheduled Task

Detects when adversaries stop services or processes by disabling their respective scheduled tasks in order to conduct data destructive activities

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
François Hubaut+2Sun Dec 26windows
Detectionlowtest

Stop Windows Service Via Sc.EXE

Detects the stopping of a Windows service via the "sc.exe" utility

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Jakob Weinzettl+2Sun Mar 05windows
Detectionmediumtest

Suspicious Execution of Shutdown

Use of the commandline to shutdown or reboot windows

WindowsProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
François HubautSat Jan 01windows