Rule Library

Sigma Rules

1,585 rules found for "defense-evasion"

3,707Total
3,116Detection
451Emerging
137Hunting
Threat Huntlowtest

Access To Windows Outlook Mail Files By Uncommon Applications

Detects file access requests to Windows Outlook Mail by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1070.008 · Clear Mailbox DataTA0005 · Defense Evasiondetection.threat-hunting
François HubautFri May 10windows
Threat Huntlowtest

Access To .Reg/.Hive Files By Uncommon Applications

Detects file access requests to files ending with either the ".hive"/".reg" extension, usually associated with Windows Registry backups.

Windowsfile_access
T1112 · Modify RegistryTA0005 · Defense EvasionTA0003 · Persistencedetection.threat-hunting
François HubautFri Sep 15windows
Threat Huntlowtest

File Creation Date Changed to Another Year

Detects when the file creation time is changed to a year before 2020. Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system. Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity. In order to use this rule in production, it is recommended first baseline normal behavior in your environment and then tune the rule accordingly. Hunting Recommendation: Focus on files with creation times set to years significantly before the current date, especially those in user-writable directories. Correlate with process execution logs to identify the source of the modification and investigate any unsigned or suspicious binaries involved.

WindowsFile Change
T1070.006 · TimestompTA0005 · Defense Evasiondetection.threat-hunting
François Hubaut+1Fri Aug 12windows
Threat Huntlowtest

ADS Zone.Identifier Deleted

Detects the deletion of the "Zone.Identifier" ADS. Attackers can leverage this in order to bypass security restrictions that make use of the ADS such as Microsoft Office apps.

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletiondetection.threat-hunting
François HubautMon Sep 04windows
Threat Huntlowtest

DMP/HDMP File Creation

Detects the creation of a file with the ".dmp"/".hdmp" extension. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.

WindowsFile Event
TA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Sep 07windows
Threat Huntmediumexperimental

WDAC Policy File Creation In CodeIntegrity Folder

Attackers can craft a custom Windows Defender Application Control (WDAC) policy that blocks Endpoint Detection and Response (EDR) components while allowing their own malicious code. The policy is placed in the privileged Windows Code Integrity folder (C:\Windows\System32\CodeIntegrity\). Upon reboot, the policy prevents EDR drivers from loading, effectively bypassing security measures and may further enable undetected lateral movement within an Active Directory environment.

WindowsFile Event
TA0005 · Defense EvasionT1562.001 · Disable or Modify Toolsdetection.threat-hunting
Andreas Braathen (mnemonic.io)Thu Jan 30windows
Threat Huntmediumtest

Non-DLL Extension File Renamed With DLL Extension

Detects rename operations of files with non-DLL extensions to files with a DLL extension. This is often performed by malware in order to avoid initial detections based on extensions.

WindowsFile Rename
TA0005 · Defense EvasionT1036.008 · Masquerade File Typedetection.threat-hunting
François HubautSat Feb 19windows
Threat Huntlowtest

Amsi.DLL Load By Uncommon Process

Detects loading of Amsi.dll by uncommon processes

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0040 · ImpactT1490 · Inhibit System Recoverydetection.threat-hunting
François HubautSun Mar 12windows
Threat Huntlowexperimental

BITS Client BitsProxy DLL Loaded By Uncommon Process

Detects an uncommon process loading the "BitsProxy.dll". This DLL is used when the BITS COM instance or API is used. This detection can be used to hunt for uncommon processes loading this DLL in your environment. Which may indicate potential suspicious activity occurring.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobsdetection.threat-hunting
UnicornOfHuntWed Jun 04windows
Threat Huntmediumexperimental

WerFaultSecure Loading DbgCore or DbgHelp - EDR-Freeze

Detects the loading of dbgcore.dll or dbghelp.dll by WerFaultSecure.exe, which has been observed in EDR-Freeze attacks to suspend processes and evade detection. However, this behavior has also been observed during normal software installations, so further investigation is required to confirm malicious activity. When threat hunting, look for this activity in conjunction with other suspicious processes starting, network connections, or file modifications that occur shortly after the DLL load. Pay special attention to timing - if other malicious activities occur during or immediately after this library loading, it may indicate EDR evasion attempts. Also correlate with any EDR/AV process suspension events or gaps in security monitoring during the timeframe.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1562.001 · Disable or Modify Toolsdetection.threat-hunting
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Threat Huntmediumtest

Dllhost.EXE Initiated Network Connection To Non-Local IP Address

Detects Dllhost.EXE initiating a network connection to a non-local IP address. Aside from Microsoft own IP range that needs to be excluded. Network communication from Dllhost will depend entirely on the hosted DLL. An initial baseline is recommended before deployment.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · ExecutionT1559.001 · Component Object Model+1
bartblazeMon Jul 13windows
Threat Huntmediumtest

HH.EXE Initiated HTTP Network Connection

Detects a network connection initiated by the "hh.exe" process to HTTP destination ports, which could indicate the execution/download of remotely hosted .chm files.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.001 · Compiled HTML Filedetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Oct 05windows
Threat Huntlowtest

Msiexec.EXE Initiated Network Connection Over HTTP

Detects a network connection initiated by an "Msiexec.exe" process over port 80 or 443. Adversaries might abuse "msiexec.exe" to install and execute remotely hosted packages. Use this rule to hunt for potentially anomalous or suspicious communications.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.007 · Msiexecdetection.threat-hunting
François HubautSun Jan 16windows
Threat Huntmediumexperimental

Mail Forwarding/Redirecting Activity Via ExchangePowerShell Cmdlet

Detects email forwarding or redirecting activity via ExchangePowerShell Cmdlet

WindowsPowerShell Script
TA0009 · CollectionT1114.003 · Email Forwarding RuleTA0005 · Defense EvasionT1564.008 · Email Hiding Rules+3
Nasreddine Bencherchali (Nextron Systems)+1Sun Mar 01windows
Threat Huntmediumexperimental

Inbox Rules Creation Or Update Activity Via ExchangePowerShell Cmdlet

Detects inbox rule creation or update via ExchangePowerShell cmdlet, a technique commonly observed in Business Email Compromise (BEC) attacks to hide emails. The usage of inbox rules can be a sign of a compromised mailbox, where an attacker is attempting to evade detections by suppressing or redirecting incoming emails. Analysts should review these rules in context, validate whether they reflect normal user behavior, and correlate with other indicators such as unusual login activity or recent mailbox rule modifications.

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.008 · Email Hiding RulesTA0010 · ExfiltrationTA0009 · Collection+2
Marco Pedrinazzi (InTheCyber)Tue Feb 10windows
Threat Huntmediumtest

Windows Mail App Mailbox Access Via PowerShell Script

Detects PowerShell scripts that try to access the default Windows MailApp MailBox. This indicates manipulation of or access to the stored emails of a user. E.g. this could be used by an attacker to exfiltrate or delete the content of the emails.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.008 · Clear Mailbox Datadetection.threat-hunting
François HubautSat Jul 08windows
Threat Huntlowtest

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock

Detects when a powershell script contains calls to the "New-NetFirewallRule" cmdlet in order to add a new firewall rule with an "Allow" action.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautFri May 10windows
Threat Huntlowtest

Use Of Remove-Item to Delete File - ScriptBlock

PowerShell Remove-Item with -Path to delete a file or a folder with "-Recurse"

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.004 · File Deletiondetection.threat-hunting
François HubautSat Jan 15windows
Threat Huntmediumtest

Powershell Token Obfuscation - Powershell

Detects TOKEN OBFUSCATION technique from Invoke-Obfuscation in Powershell scripts. Use this rule as a threat-hunting baseline to find obfuscated scripts in your environment. Once tested and tuned, consider deploying a production detection rule based on this hunting rule.

WindowsPowerShell Script
TA0005 · Defense EvasionT1027.009 · Embedded Payloadsdetection.threat-hunting
François HubautTue Dec 27windows
Threat Huntmediumtest

Potential Shellcode Injection

Detects potential shellcode injection as seen used by tools such as Metasploit's migrate and Empire's psinject.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
Bhabesh RajFri Mar 11windows
Threat Huntlowtest

Set Files as System Files Using Attrib.EXE

Detects the execution of "attrib" with the "+s" flag to mark files as system files

WindowsProcess Creation
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directoriesdetection.threat-hunting
François HubautFri Feb 04windows
Threat Huntinformationaltest

Potential BOINC Software Execution (UC-Berkeley Signature)

Detects the use of software that is related to the University of California, Berkeley via metadata information. This indicates it may be related to BOINC software and can be used maliciously if unauthorized.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1553 · Subvert Trust Controlsdetection.threat-hunting
Matt Anderson (Huntress)Tue Jul 23windows
Threat Huntlowtest

Potential File Override/Append Via SET Command

Detects the use of the "SET" internal command of Cmd.EXE with the /p flag followed directly by an "=" sign. Attackers used this technique along with an append redirection operator ">>" in order to update the content of a file indirectly. Ex: cmd /c >> example.txt set /p="test data". This will append "test data" to contents of "example.txt". The typical use case of the "set /p=" command is to prompt the user for input.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)+1Thu Aug 22windows
Threat Huntmediumtest

Headless Process Launched Via Conhost.EXE

Detects the launch of a child process via "conhost.exe" with the "--headless" flag. The "--headless" flag hides the windows from the user upon execution.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shell+1
Nasreddine Bencherchali (Nextron Systems)Tue Jul 23windows
Threat Huntmediumtest

Dynamic .NET Compilation Via Csc.EXE - Hunting

Detects execution of "csc.exe" to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Deliverydetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Aug 02windows
Threat Huntmediumtest

ClickOnce Deployment Execution - Dfsvc.EXE Child Process

Detects child processes of "dfsvc" which indicates a ClickOnce deployment execution.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Huntmediumtest

Diskshadow Child Process Spawned

Detects any child process spawning from "Diskshadow.exe". This could be due to executing Diskshadow in interpreter mode or script mode and using the "exec" flag to launch other applications.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Harjot SinghFri Sep 15windows
Threat Huntmediumtest

Diskshadow Script Mode Execution

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag. Attackers often abuse "diskshadow" to execute scripts that deleted the shadow copies on the systems. Investigate the content of the scripts and its location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Ivan Dyachkov+1Wed Oct 07windows
Threat Huntlowtest

Potential Proxy Execution Via Explorer.EXE From Shell Process

Detects the creation of a child "explorer.exe" process from a shell like process such as "cmd.exe" or "powershell.exe". Attackers can use "explorer.exe" for evading defense mechanisms by proxying the execution through the latter. While this is often a legitimate action, this rule can be use to hunt for anomalies. Muddy Waters threat actor was seeing using this technique.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Furkan CALISKAN+1Mon Oct 05windows
Threat Huntmediumtest

Potential DLL Sideloading Activity Via ExtExport.EXE

Detects the execution of "Extexport.exe".A utility that is part of the Internet Explorer browser and is used to export and import various settings and data, particularly when switching between Internet Explorer and other web browsers like Firefox. It allows users to transfer bookmarks, browsing history, and other preferences from Internet Explorer to Firefox or vice versa. It can be abused as a tool to side load any DLL. If a folder is provided in the command line it'll load any DLL with one of the following names "mozcrt19.dll", "mozsqlite3.dll", or "sqlite.dll". Arbitrary DLLs can also be loaded if a specific number of flags was provided.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
François Hubaut+1Fri Nov 26windows
Threat Huntmediumtest

New Self Extracting Package Created Via IExpress.EXE

Detects the "iexpress.exe" utility creating self-extracting packages. Attackers where seen leveraging "iexpress" to compile packages on the fly via ".sed" files. Investigate the command line options provided to "iexpress" and in case of a ".sed" file, check the contents and legitimacy of it.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Joseliyo SanchezMon Feb 05windows
Threat Huntmediumtest

Microsoft Workflow Compiler Execution

Detects the execution of Microsoft Workflow Compiler, which may permit the execution of arbitrary unsigned code.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1218 · System Binary Proxy Execution+1
Nik Seetharaman+1Wed Jan 16windows
Threat Huntlowtest

CodePage Modification Via MODE.COM

Detects a CodePage modification using the "mode.com" utility. This behavior has been used by threat actors behind Dharma ransomware.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masqueradingdetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)+1Fri Jan 19windows
Threat Huntmediumtest

Suspicious New Instance Of An Office COM Object

Detects an svchost process spawning an instance of an office application. This happens when the initial word application creates an instance of one of the Office COM objects such as 'Word.Application', 'Excel.Application', etc. This can be used by malicious actors to create malicious Office documents with macros on the fly. (See vba2clr project in the references)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Oct 13windows
Threat Huntmediumtest

Invocation Of Crypto-Classes From The "Cryptography" PowerShell Namespace

Detects the invocation of PowerShell commands with references to classes from the "System.Security.Cryptography" namespace. The PowerShell namespace "System.Security.Cryptography" provides classes for on-the-fly encryption and decryption. These can be used for example in decrypting malicious payload for defense evasion.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1027.010 · Command Obfuscation+1
Andreas Braathen (mnemonic.io)Fri Dec 01windows
Threat Huntlowtest

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet

Detects calls to the "New-NetFirewallRule" cmdlet from PowerShell in order to add a new firewall rule with an "Allow" action.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautFri May 03windows
Threat Huntmediumtest

Regsvr32.EXE Calling of DllRegisterServer Export Function Implicitly

Detects execution of regsvr32 with the silent flag and no other flags on a DLL located in an uncommon or potentially suspicious location. When Regsvr32 is called in such a way, it implicitly calls the DLL export function 'DllRegisterServer'.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Andreas Braathen (mnemonic.io)+1Tue Oct 17windows
Threat Huntmediumstable

DLL Call by Ordinal Via Rundll32.EXE

Detects calls of DLLs exports by ordinal numbers via rundll32.dll.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.threat-hunting
Florian Roth (Nextron Systems)Tue Oct 22windows
Threat Huntmediumtest

Rundll32.EXE Calling DllRegisterServer Export Function Explicitly

Detects when the DLL export function 'DllRegisterServer' is called in the commandline by Rundll32 explicitly where the DLL is located in a non-standard path.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
Andreas Braathen (mnemonic.io)Tue Oct 17windows
Threat Huntmediumtest

Potential CommandLine Obfuscation Using Unicode Characters

Detects potential CommandLine obfuscation using unicode characters. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Informationdetection.threat-hunting
François Hubaut+1Sat Jan 15windows
Threat Huntmediumtest

Elevated System Shell Spawned

Detects when a shell program such as the Windows command prompt or PowerShell is launched with system privileges. Use this rule to hunt for potential suspicious processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter+1
Nasreddine Bencherchali (Nextron Systems)+1Thu Nov 23windows
Threat Huntlowtest

Potential Suspicious Execution From GUID Like Folder Names

Detects potential suspicious execution of a GUID like folder name located in a suspicious location such as %TEMP% as seen being used in IcedID attacks. Use this rule to hunt for potentially suspicious activity stemming from uncommon folders.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Informationdetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Threat Huntmediumtest

File or Folder Permissions Modifications

Detects a file or folder's permissions being modified or tampered with.

WindowsProcess Creation
TA0005 · Defense Evasionattack.t1222.001detection.threat-hunting
Jakob Weinzettl+2Wed Oct 23windows
Threat Huntmediumtest

Use Short Name Path in Command Line

Detects the use of short name paths (8.3 format) in command lines, which can be used to obfuscate paths or access restricted locations. Windows creates short 8.3 filenames (like PROGRA~1) for compatibility with MS-DOS-based or 16-bit Windows programs. When investigating, examine: - Commands using short paths to access sensitive directories or files - Web servers on Windows (especially Apache) where short filenames could bypass security controls - Correlation with other suspicious behaviors - baseline of short name usage in your environment and look for deviations

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributesdetection.threat-hunting
François Hubaut+1Sun Aug 07windows
Threat Huntlowexperimental

Potential Executable Run Itself As Sacrificial Process

Detects when an executable launches an identical instance of itself, a behavior often used to create a suspended “sacrificial” process for code injection or evasion. Investigate for indicators such as the process being started in suspended mode, rapid parent termination, memory manipulation (e.g., WriteProcessMemory, CreateRemoteThread), or unsigned binaries. Review command-line arguments, process ancestry, and network activity to confirm if this is legitimate behavior or process injection activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
François HubautFri Oct 17windows
Threat Huntmediumtest

Arbitrary Command Execution Using WSL

Detects potential abuse of Windows Subsystem for Linux (WSL) binary as a Living of the Land binary in order to execute arbitrary Linux or Windows commands.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution+1
oscd.community+2Mon Oct 05windows
Threat Huntmediumtest

Microsoft Office Trusted Location Updated

Detects changes to the registry keys related to "Trusted Location" of Microsoft Office. Attackers might add additional trusted locations to avoid macro security restrictions.

WindowsRegistry Set
TA0005 · Defense EvasionTA0003 · PersistenceT1112 · Modify Registrydetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Jun 21windows
Threat Huntmediumtest

Registry Set With Crypto-Classes From The "Cryptography" PowerShell Namespace

Detects the setting of a registry inside the "\Shell\Open\Command" value with PowerShell classes from the "System.Security.Cryptography" namespace. The PowerShell namespace "System.Security.Cryptography" provides classes for on-the-fly encryption and decryption. These can be used for example in decrypting malicious payload for defense evasion.

WindowsRegistry Set
TA0005 · Defense EvasionTA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege Escalation+4
Andreas Braathen (mnemonic.io)Fri Dec 01windows