Rule Library

Sigma Rules

190 rules found for "lateral-movement"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

PUA - CSExec Default Named Pipe

Detects default CSExec pipe creation

WindowsNamed Pipe Created
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesTA0002 · ExecutionT1569.002 · Service Execution
Nikita Nazarov+2Mon Aug 07windows
Detectionmediumtest

PUA - RemCom Default Named Pipe

Detects default RemCom pipe creation

WindowsNamed Pipe Created
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesTA0002 · ExecutionT1569.002 · Service Execution
Nikita Nazarov+2Mon Aug 07windows
Detectionlowtest

Remote PowerShell Session (PS Classic)

Detects remote PowerShell sessions

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShellTA0008 · Lateral MovementT1021.006 · Windows Remote Management
Roberto Rodriguez (Cyb3rWard0g)Sat Aug 10windows
Detectionmediumtest

Suspicious Non PowerShell WSMAN COM Provider

Detects suspicious use of the WSMAN provider without PowerShell.exe as the host application.

Windowspowershell-classic
TA0002 · ExecutionT1059.001 · PowerShellTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Roberto Rodriguez (Cyb3rWard0g)+1Wed Jun 24windows
Detectionhightest

HackTool - Evil-WinRm Execution - PowerShell Module

Detects the execution of Evil-WinRM via PowerShell Module logs by leveraging the hardcoded strings inside the utility.

WindowsPowerShell Module
TA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Sun Feb 25windows
Detectionhightest

Remote PowerShell Session (PS Module)

Detects remote PowerShell sessions

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShellTA0008 · Lateral MovementT1021.006 · Windows Remote Management
Roberto Rodriguez (Cyb3rWard0g)+1Sat Aug 10windows
Detectionlowtest

Suspicious Get Information for SMB Share - PowerShell Module

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network.

WindowsPowerShell Module
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionmediumtest

Enable Windows Remote Management

Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.

WindowsPowerShell Script
TA0008 · Lateral MovementT1021.006 · Windows Remote Management
François HubautFri Jan 07windows
Detectionhightest

HackTool - Rubeus Execution - ScriptBlock

Detects the execution of the hacktool Rubeus using specific command line flags

WindowsPowerShell Script
TA0005 · Defense EvasionTA0006 · Credential AccessT1003 · OS Credential DumpingT1558.003 · Kerberoasting+2
Christian Burkard (Nextron Systems)+1Thu Apr 27windows
Detectionmediumtest

Execute Invoke-command on Remote Host

Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.

WindowsPowerShell Script
TA0008 · Lateral MovementT1021.006 · Windows Remote Management
François HubautFri Jan 07windows
Detectionmediumtest

Suspicious New-PSDrive to Admin Share

Adversaries may use to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user.

WindowsPowerShell Script
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
François HubautSat Aug 13windows
Detectionlowtest

Suspicious Get Information for SMB Share

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network.

WindowsPowerShell Script
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionhighstable

Remote LSASS Process Access Through Windows Remote Management

Detects remote access to the LSASS process via WinRM. This could be a sign of credential dumping from tools like mimikatz.

WindowsProcess Access
TA0006 · Credential AccessTA0002 · ExecutionT1003.001 · LSASS MemoryT1059.001 · PowerShell+3
Patryk Prauze - ING TechMon May 20windows
Detectionhighexperimental

Suspicious BitLocker Access Agent Update Utility Execution

Detects the execution of the BitLocker Access Agent Update Utility (baaupdate.exe) which is not a common parent process for other processes. Suspicious child processes spawned by baaupdate.exe could indicate an attempt at lateral movement via BitLocker DCOM & COM Hijacking.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
andrewdanis+1Sat Oct 18windows
Detectionmediumexperimental

OpenEDR Spawning Command Shell

Detects the OpenEDR ssh-shellhost.exe spawning a command shell (cmd.exe) or PowerShell with PTY (pseudo-terminal) capabilities. This may indicate remote command execution through OpenEDR's remote management features, which could be legitimate administrative activity or potential abuse of the remote access tool. Threat actors may leverage OpenEDR's remote shell capabilities to execute commands on compromised systems, facilitating lateral movement or other command-and-control operations.

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0008 · Lateral MovementT1021.004 · SSH+2
kostastsaleThu Feb 19windows
Detectionhighexperimental

Windows Credential Guard Registry Tampering Via CommandLine

Detects attempts to add, modify, or delete Windows Credential Guard related registry keys or values via command line tools such as Reg.exe or PowerShell. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation. The rule matches suspicious command lines that target DeviceGuard or LSA registry paths and manipulate keys like EnableVirtualizationBasedSecurity, RequirePlatformSecurityFeatures, or LsaCfgFlags. Such activity may indicate an attempt to disable or tamper with Credential Guard, potentially exposing sensitive credentials for misuse.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Dec 26windows
Detectionmediumtest

Suspicious Csi.exe Usage

Csi.exe is a signed binary from Microsoft that comes with Visual Studio and provides C# interactive capabilities. It can be used to run C# code from a file passed as a parameter in command line. Early version of this utility provided with Microsoft “Roslyn” Community Technology Preview was named 'rcsi.exe'

WindowsProcess Creation
TA0008 · Lateral MovementTA0002 · ExecutionT1072 · Software Deployment ToolsTA0005 · Defense Evasion+1
Konstantin Grishchenko+1Sat Oct 17windows
Detectionmediumtest

HackTool - WinRM Access Via Evil-WinRM

Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.006 · Windows Remote Management
François HubautFri Jan 07windows
Detectionhighstable

HackTool - Potential Impacket Lateral Movement Activity

Detects wmiexec/dcomexec/atexec/smbexec from Impacket framework

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management InstrumentationTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Ecco+3Tue Sep 03windows
Detectionhightest

HackTool - KrbRelayUp Execution

Detects KrbRelayUp used to perform a universal no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1558.003 · KerberoastingTA0008 · Lateral Movement+1
Florian Roth (Nextron Systems)Tue Apr 26windows
Detectioncriticalstable

HackTool - Rubeus Execution

Detects the execution of the hacktool Rubeus via PE information of command line parameters

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1003 · OS Credential DumpingT1558.003 · Kerberoasting+2
Florian Roth (Nextron Systems)Wed Dec 19windows
Detectionhightest

HackTool - SharpMove Tool Execution

Detects the execution of SharpMove, a .NET utility performing multiple tasks such as "Task Creation", "SCM" query, VBScript execution using WMI via its PE metadata and command line options.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Luca Di Bartolomeo (CrimpSec)Mon Jan 29windows
Detectionhightest

HackTool - SharpWSUS/WSUSpendu Execution

Detects the execution of SharpWSUS or WSUSpendu, utilities that allow for lateral movement through WSUS. Windows Server Update Services (WSUS) is a critical component of Windows systems and is frequently configured in a way that allows an attacker to circumvent internal networking limitations.

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1210 · Exploitation of Remote Services
kostastsale+1Fri Oct 07windows
Detectioncriticaltest

HackTool - Windows Credential Editor (WCE) Execution

Detects the use of Windows Credential Editor (WCE), a popular post-exploitation tool used to extract plaintext passwords, hash, PIN code and Kerberos tickets from memory. It is often used by threat actors for credential dumping and lateral movement within compromised networks.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0005 · S0005
Florian Roth (Nextron Systems)Tue Dec 31windows
Detectionhightest

HackTool - Wmiexec Default Powershell Command

Detects the execution of PowerShell with a specific flag sequence that is used by the Wmiexec script

WindowsProcess Creation
TA0005 · Defense EvasionTA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Wed Mar 08windows
Detectionmediumtest

Suspicious SysAidServer Child

Detects suspicious child processes of SysAidServer (as seen in MERCURY threat actor intrusions)

WindowsProcess Creation
TA0008 · Lateral MovementT1210 · Exploitation of Remote Services
Florian Roth (Nextron Systems)Fri Aug 26windows
Detectionhightest

MMC20 Lateral Movement

Detects MMC20.Application Lateral Movement; specifically looks for the spawning of the parent MMC.exe with a command line of "-Embedding" as a child of svchost.exe

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
(Security Risk Advisors) - rule; Teymur KheirkhabarovWed Mar 04windows
Detectionhightest

MMC Spawning Windows Shell

Detects a Windows command line executable started from MMC

WindowsProcess Creation
TA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Karneades+1Mon Aug 05windows
Detectionhightest

Potential MSTSC Shadowing Activity

Detects RDP session hijacking by using MSTSC shadowing

WindowsProcess Creation
TA0008 · Lateral MovementT1563.002 · RDP Hijacking
Florian Roth (Nextron Systems)Fri Jan 24windows
Detectionmediumtest

New Remote Desktop Connection Initiated Via Mstsc.EXE

Detects the usage of "mstsc.exe" with the "/v" flag to initiate a connection to a remote server. Adversaries may use valid accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol
François HubautFri Jan 07windows
Detectionhightest

Mstsc.EXE Execution From Uncommon Parent

Detects potential RDP connection via Mstsc using a local ".rdp" file located in suspicious locations.

WindowsProcess Creation
TA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionmediumtest

New Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+3Tue Jan 29windows
Detectionhightest

RDP Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh to configure a port forwarding of port 3389 (RDP) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+1Tue Jan 29windows
Detectionmediumtest

Windows Admin Share Mount Via Net.EXE

Detects when an admin share is mounted using net.exe

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
oscd.community+3Mon Oct 05windows
Detectionhightest

Windows Internet Hosted WebDav Share Mount Via Net.EXE

Detects when an internet hosted webdav share is mounted using the "net.exe" utility

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Nasreddine Bencherchali (Nextron Systems)Tue Feb 21windows
Detectionlowtest

Windows Share Mount Via Net.EXE

Detects when a share is mounted using the "net.exe" utility

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Nasreddine Bencherchali (Nextron Systems)Thu Feb 02windows
Detectionmediumtest

Password Provided In Command Line Of Net.EXE

Detects a when net.exe is called with a password in the command line

WindowsProcess Creation
TA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation+3
Tim Shelton (HAWK.IO)Thu Dec 09windows
Detectionhightest

Potential Excel.EXE DCOM Lateral Movement Via ActivateMicrosoftApp

Detects suspicious child processes of Excel which could be an indicator of lateral movement leveraging the "ActivateMicrosoftApp" Excel DCOM object.

WindowsProcess Creation
T1021.003 · Distributed Component Object ModelTA0008 · Lateral Movement
Aaron StrattonMon Nov 13windows
Detectionmediumtest

PDQ Deploy Remote Adminstartion Tool Execution

Detect use of PDQ Deploy remote admin tool

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1072 · Software Deployment Tools
François HubautSat Oct 01windows
Detectionhightest

Suspicious Plink Port Forwarding

Detects suspicious Plink tunnel port forwarding to a local port

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol TunnelingTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol
Florian Roth (Nextron Systems)Tue Jan 19windows
Detectionmediumexperimental

PowerShell MSI Install via WindowsInstaller COM From Remote Location

Detects the execution of PowerShell commands that attempt to install MSI packages via the Windows Installer COM object (`WindowsInstaller.Installer`) hosted remotely. This could be indication of malicious software deployment or lateral movement attempts using Windows Installer functionality. And the usage of WindowsInstaller COM object rather than msiexec could be an attempt to bypass the detection.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+2
Meroujan Antonyan (vx3r)Thu Jun 05windows
Detectionmediumtest

PUA - Radmin Viewer Utility Execution

Detects the execution of Radmin which can be abused by an adversary to remotely control Windows machines

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1072 · Software Deployment Tools
François HubautSat Jan 22windows
Detectionmediumexperimental

RDP Enable or Disable via Win32_TerminalServiceSetting WMI Class

Detects enabling or disabling of Remote Desktop Protocol (RDP) using alternate methods such as WMIC or PowerShell. In PowerShell one-liner commands, the "SetAllowTSConnections" method of the "Win32_TerminalServiceSetting" class may be used to enable or disable RDP. In WMIC, the "rdtoggle" alias or "Win32_TerminalServiceSetting" class may be used for the same purpose.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.001 · Remote Desktop ProtocolTA0002 · ExecutionT1047 · Windows Management Instrumentation
Daniel Koifman (KoifSec)+1Sat Nov 15windows
Detectionhightest

Potential Tampering With RDP Related Registry Keys Via Reg.EXE

Detects the execution of "reg.exe" for enabling/disabling the RDP service on the host by tampering with the 'CurrentControlSet\Control\Terminal Server' values

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol+1
Martin Mueller+1Sat Feb 12windows
Detectionhightest

Rundll32 UNC Path Execution

Detects rundll32 execution where the DLL is located on a remote location (share)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares+1
Nasreddine Bencherchali (Nextron Systems)Wed Aug 10windows
Detectionhightest

Rundll32 Execution Without Parameters

Detects rundll32 execution without parameters as observed when running Metasploit windows/smb/psexec exploit module

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesT1570 · Lateral Tool TransferTA0002 · Execution+1
Bartlomiej Czyz+1Sun Jan 31windows
Detectionhighexperimental

Suspicious Speech Runtime Binary Child Process

Detects suspicious Speech Runtime Binary Execution by monitoring its child processes. Child processes spawned by SpeechRuntime.exe could indicate an attempt for lateral movement via COM & DCOM hijacking.

WindowsProcess Creation
TA0005 · Defense EvasionTA0008 · Lateral MovementT1021.003 · Distributed Component Object ModelT1218 · System Binary Proxy Execution
andrewdanisThu Oct 23windows
Detectionmediumtest

Port Forwarding Activity Via SSH.EXE

Detects port forwarding activity via SSH.exe

WindowsProcess Creation
TA0011 · Command and ControlTA0008 · Lateral MovementT1572 · Protocol TunnelingT1021.001 · Remote Desktop Protocol+1
Nasreddine Bencherchali (Nextron Systems)Wed Oct 12windows