Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Suspicious Start-Process PassThru

Powershell use PassThru option to start in background

WindowsPowerShell Script
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
François HubautSat Jan 15windows
Detectionmediumtest

Suspicious Unblock-File

Remove the Zone.Identifier alternate data stream which identifies the file as downloaded from the internet.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.005 · Mark-of-the-Web Bypass
François HubautTue Feb 01windows
Detectionlowtest

Replace Desktop Wallpaper by Powershell

An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users. This may take the form of modifications to internal websites, or directly to user systems with the replacement of the desktop wallpaper

WindowsPowerShell Script
TA0040 · ImpactT1491.001 · Internal Defacement
François HubautSun Dec 26windows
Detectionlowtest

Powershell Suspicious Win32_PnPEntity

Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.

WindowsPowerShell Script
TA0007 · DiscoveryT1120 · Peripheral Device Discovery
François HubautMon Aug 23windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell - PS Script

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsPowerShell Script
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows
Detectionmediumtest

Suspicious PowerShell WindowStyle Option

Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.003 · Hidden Window
François Hubaut+1Wed Oct 20windows
Detectionmediumtest

PowerShell Write-EventLog Usage

Detects usage of the "Write-EventLog" cmdlet with 'RawData' flag. The cmdlet can be levreage to write malicious payloads to the EventLog and then retrieve them later for later use

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Aug 16windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Script

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Script
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionmediumtest

SyncAppvPublishingServer Execution to Bypass Powershell Restriction

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+1Mon Oct 05windows
Detectionhightest

Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging

Detects attempts to remove Windows Defender configuration using the 'MpPreference' cmdlet

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Tamper Windows Defender - ScriptBlockLogging

Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+5Sun Jan 16windows
Detectionmediumtest

Testing Usage of Uncommonly Used Port

Adversaries may communicate using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443.

WindowsPowerShell Script
TA0011 · Command and ControlT1571 · Non-Standard Port
François HubautSun Jan 23windows
Detectionmediumtest

Powershell Timestomp

Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.006 · Timestomp
François HubautTue Aug 03windows
Detectionmediumtest

User Discovery And Export Via Get-ADUser Cmdlet - PowerShell

Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 17windows
Detectionmediumtest

Potential Persistence Via PowerShell User Profile Using Add-Content

Detects calls to "Add-Content" cmdlet in order to modify the content of the user profile and potentially adding suspicious commands for persistence

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
François Hubaut+1Wed Aug 18windows
Detectionhightest

Abuse of Service Permissions to Hide Services Via Set-Service - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionhightest

Veeam Backup Servers Credential Dumping Script Execution

Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.

WindowsPowerShell Script
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Thu May 04windows
Detectionmediumtest

Usage Of Web Request Commands And Cmdlets - ScriptBlock

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via PowerShell scriptblock logs

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
James PembertonThu Oct 24windows
Detectionmediumtest

Potentially Suspicious Call To Win32_NTEventlogFile Class - PSScript

Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 13windows
Detectionmediumtest

PowerShell WMI Win32_Product Install MSI

Detects the execution of an MSI file using PowerShell and the WMI Win32_Product class

WindowsPowerShell Script
TA0005 · Defense EvasionT1218.007 · Msiexec
François HubautSun Apr 24windows
Detectionhightest

Potential WinAPI Calls Via PowerShell Scripts

Detects use of WinAPI functions in PowerShell scripts

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellT1106 · Native API
Nasreddine Bencherchali (Nextron Systems)+2Tue Oct 06windows
Detectionmediumtest

Windows Defender Exclusions Added - PowerShell

Detects modifications to the Windows Defender configuration settings using PowerShell to add exclusions

WindowsPowerShell Script
TA0005 · Defense EvasionT1562 · Impair DefensesTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+1Fri Sep 16windows
Detectionmediumtest

Windows Firewall Profile Disabled

Detects when a user disables the Windows Firewall via a Profile to help evade defense.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerTue Oct 12windows
Detectionmediumtest

Winlogon Helper DLL

Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[Wow6432Node]Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.004 · Winlogon Helper DLL
Timur Zinniatullin+1Mon Oct 21windows
Detectionmediumtest

Powershell WMI Persistence

Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription.

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
François HubautThu Aug 19windows
Detectionmediumtest

WMIC Unquoted Services Path Lookup - PowerShell

Detects known WMI recon method to look for unquoted service paths, often used by pentest inside of powershell scripts attackers enum scripts

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

WMImplant Hack Tool

Detects parameters used by WMImplant

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management InstrumentationT1059.001 · PowerShell
NVISOThu Mar 26windows
Detectionmediumtest

Suspicious X509Enrollment - Ps Script

Detect use of X509Enrollment

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
François HubautFri Dec 23windows
Detectionmediumtest

Powershell XML Execute Command

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautWed Jan 19windows
Detectionhightest

HackTool - CobaltStrike BOF Injection Pattern

Detects a typical pattern of a CobaltStrike BOF which inject into other processes

WindowsProcess Access
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christian Burkard (Nextron Systems)Wed Aug 04windows
Detectionhightest

HackTool - Generic Process Access

Detects process access requests from hacktool processes based on their default image name

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Nasreddine Bencherchali (Nextron Systems)+1Mon Nov 27windows
Detectionhightest

HackTool - HandleKatz Duplicating LSASS Handle

Detects HandleKatz opening LSASS to duplicate its handle to later dump the memory without opening any new handles

WindowsProcess Access
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1003.001 · LSASS Memory+1
Bhabesh RajMon Jun 27windows
Detectionhightest

HackTool - LittleCorporal Generated Maldoc Injection

Detects the process injection of a LittleCorporal generated Maldoc.

WindowsProcess Access
TA0005 · Defense EvasionTA0002 · ExecutionTA0004 · Privilege EscalationT1204.002 · Malicious File+1
Christian Burkard (Nextron Systems)Mon Aug 09windows
Detectionhightest

HackTool - SysmonEnte Execution

Detects the use of SysmonEnte, a tool to attack the integrity of Sysmon

WindowsProcess Access
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
Florian Roth (Nextron Systems)Wed Sep 07windows
Detectionhightest

Lsass Memory Dump via Comsvcs DLL

Detects adversaries leveraging the MiniDump export function from comsvcs.dll via rundll32 to perform a memory dump from lsass.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS Memory
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectionhightest

LSASS Memory Access by Tool With Dump Keyword In Name

Detects LSASS process access requests from a source process with the "dump" keyword in its image name.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)Thu Feb 10windows
Detectionmediumtest

Potential Credential Dumping Activity Via LSASS

Detects process access requests to the LSASS process with specific call trace calls and access masks. This behaviour is expressed by many credential dumping tools such as Mimikatz, NanoDump, Invoke-Mimikatz, Procdump and even the Taskmgr dumping feature.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Samir Bousseaden+1Wed Apr 03windows
Detectionhightest

Suspicious LSASS Access Via MalSecLogon

Detects suspicious access to LSASS handle via a call trace to "seclogon.dll" with a suspicious access right.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS Memory
Samir Bousseaden (original elastic rule)+1Wed Jun 29windows
Detectionmediumtest

Potentially Suspicious GrantedAccess Flags On LSASS

Detects process access requests to LSASS process with potentially suspicious access flags

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)+9Mon Nov 22windows
Detectionhightest

Credential Dumping Attempt Via WerFault

Detects process LSASS memory dump using Mimikatz, NanoDump, Invoke-Mimikatz, Procdump or Taskmgr based on the CallTrace pointing to ntdll.dll, dbghelp.dll or dbgcore.dll for win10, server2016 and up.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)Wed Jun 27windows
Detectionhightest

LSASS Access From Potentially White-Listed Processes

Detects a possible process memory dump that uses a white-listed filename like TrolleyExpress.exe as a way to dump the LSASS process memory without Microsoft Defender interference

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)Thu Feb 10windows
Detectionlowtest

Uncommon Process Access Rights For Target Image

Detects process access request to uncommon target images with a "PROCESS_ALL_ACCESS" access mask.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.011 · Extra Window Memory Injection
Nasreddine Bencherchali (Nextron Systems)+1Mon May 27windows
Detectionmediumtest

Potential Direct Syscall of NtOpenProcess

Detects potential calls to NtOpenProcess directly from NTDLL.

WindowsProcess Access
TA0002 · ExecutionT1106 · Native API
Christian Burkard (Nextron Systems)+1Wed Jul 28windows
Detectionhightest

Credential Dumping Attempt Via Svchost

Detects when a process tries to access the memory of svchost to potentially dump credentials.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Florent LabouyrieFri Apr 30windows
Detectionhightest

Suspicious Svchost Process Access

Detects suspicious access to the "svchost" process such as that used by Invoke-Phantom to kill the thread of the Windows event logging service.

WindowsProcess Access
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
Tim BurrellThu Jan 02windows
Detectionmediumtest

Function Call From Undocumented COM Interface EditionUpgradeManager

Detects function calls from the EditionUpgradeManager COM interface. Which is an interface that is not used by standard executables.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
oscd.community+1Wed Oct 07windows
Detectionhightest

UAC Bypass Using WOW64 Logger DLL Hijack

Detects the pattern of UAC Bypass using a WoW64 logger DLL hijack (UACMe 30)

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionmediumtest

7Zip Compressing Dump Files

Detects execution of 7z in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
Nasreddine Bencherchali (Nextron Systems)Tue Sep 27windows