Rule Library

Sigma Rules

3,116 rules found for "sigma"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious Service DACL Modification Via Set-Service Cmdlet - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionlowtest

Potential PowerShell Obfuscation Using Alias Cmdlets

Detects Set-Alias or New-Alias cmdlet usage. Which can be use as a mean to obfuscate PowerShell scripts

WindowsPowerShell Script
TA0005 · Defense EvasionTA0002 · ExecutionT1027 · Obfuscated Files or InformationT1059.001 · PowerShell
François HubautSun Jan 08windows
Detectionlowtest

Suspicious Get Information for SMB Share

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network.

WindowsPowerShell Script
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionlowtest

Suspicious SSL Connection

Adversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol.

WindowsPowerShell Script
TA0011 · Command and ControlT1573 · Encrypted Channel
François HubautSun Jan 23windows
Detectionmediumtest

Suspicious Start-Process PassThru

Powershell use PassThru option to start in background

WindowsPowerShell Script
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
François HubautSat Jan 15windows
Detectionmediumtest

Suspicious Unblock-File

Remove the Zone.Identifier alternate data stream which identifies the file as downloaded from the internet.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.005 · Mark-of-the-Web Bypass
François HubautTue Feb 01windows
Detectionlowtest

Replace Desktop Wallpaper by Powershell

An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users. This may take the form of modifications to internal websites, or directly to user systems with the replacement of the desktop wallpaper

WindowsPowerShell Script
TA0040 · ImpactT1491.001 · Internal Defacement
François HubautSun Dec 26windows
Detectionlowtest

Powershell Suspicious Win32_PnPEntity

Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.

WindowsPowerShell Script
TA0007 · DiscoveryT1120 · Peripheral Device Discovery
François HubautMon Aug 23windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell - PS Script

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsPowerShell Script
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows
Detectionmediumtest

Suspicious PowerShell WindowStyle Option

Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.003 · Hidden Window
François Hubaut+1Wed Oct 20windows
Detectionmediumtest

PowerShell Write-EventLog Usage

Detects usage of the "Write-EventLog" cmdlet with 'RawData' flag. The cmdlet can be levreage to write malicious payloads to the EventLog and then retrieve them later for later use

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Aug 16windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Script

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Script
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionmediumtest

SyncAppvPublishingServer Execution to Bypass Powershell Restriction

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+1Mon Oct 05windows
Detectionhightest

Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging

Detects attempts to remove Windows Defender configuration using the 'MpPreference' cmdlet

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Tamper Windows Defender - ScriptBlockLogging

Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+5Sun Jan 16windows
Detectionmediumtest

Testing Usage of Uncommonly Used Port

Adversaries may communicate using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443.

WindowsPowerShell Script
TA0011 · Command and ControlT1571 · Non-Standard Port
François HubautSun Jan 23windows
Detectionmediumtest

Powershell Timestomp

Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.006 · Timestomp
François HubautTue Aug 03windows
Detectionmediumtest

User Discovery And Export Via Get-ADUser Cmdlet - PowerShell

Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 17windows
Detectionmediumtest

Potential Persistence Via PowerShell User Profile Using Add-Content

Detects calls to "Add-Content" cmdlet in order to modify the content of the user profile and potentially adding suspicious commands for persistence

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
François Hubaut+1Wed Aug 18windows
Detectionhightest

Abuse of Service Permissions to Hide Services Via Set-Service - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionmediumexperimental

Registry Modification Attempt Via VBScript - PowerShell

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods embedded within PowerShell scripts or commands. Threat actors commonly embed VBScript code within PowerShell to perform registry modifications, attempting to evade detection that monitors for direct registry access through traditional tools. This technique can be used for persistence, defense evasion, and privilege escalation by modifying registry keys without using regedit.exe, reg.exe, or PowerShell's native registry cmdlets.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionhightest

Veeam Backup Servers Credential Dumping Script Execution

Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.

WindowsPowerShell Script
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Thu May 04windows
Detectionmediumtest

Usage Of Web Request Commands And Cmdlets - ScriptBlock

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via PowerShell scriptblock logs

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
James PembertonThu Oct 24windows
Detectionmediumtest

Potentially Suspicious Call To Win32_NTEventlogFile Class - PSScript

Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 13windows
Detectionmediumtest

PowerShell WMI Win32_Product Install MSI

Detects the execution of an MSI file using PowerShell and the WMI Win32_Product class

WindowsPowerShell Script
TA0005 · Defense EvasionT1218.007 · Msiexec
François HubautSun Apr 24windows
Detectionhightest

Potential WinAPI Calls Via PowerShell Scripts

Detects use of WinAPI functions in PowerShell scripts

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellT1106 · Native API
Nasreddine Bencherchali (Nextron Systems)+2Tue Oct 06windows
Detectionmediumtest

Windows Defender Exclusions Added - PowerShell

Detects modifications to the Windows Defender configuration settings using PowerShell to add exclusions

WindowsPowerShell Script
TA0005 · Defense EvasionT1562 · Impair DefensesTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Tim Rauch+1Fri Sep 16windows
Detectionmediumtest

Windows Firewall Profile Disabled

Detects when a user disables the Windows Firewall via a Profile to help evade defense.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerTue Oct 12windows
Detectionmediumtest

Winlogon Helper DLL

Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[Wow6432Node]Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.004 · Winlogon Helper DLL
Timur Zinniatullin+1Mon Oct 21windows
Detectionmediumtest

Powershell WMI Persistence

Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription.

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
François HubautThu Aug 19windows
Detectionmediumtest

WMIC Unquoted Services Path Lookup - PowerShell

Detects known WMI recon method to look for unquoted service paths, often used by pentest inside of powershell scripts attackers enum scripts

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

WMImplant Hack Tool

Detects parameters used by WMImplant

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management InstrumentationT1059.001 · PowerShell
NVISOThu Mar 26windows
Detectionmediumtest

Suspicious X509Enrollment - Ps Script

Detect use of X509Enrollment

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
François HubautFri Dec 23windows
Detectionmediumtest

Powershell XML Execute Command

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautWed Jan 19windows
Detectionhighstable

CMSTP Execution Process Access

Detects various indicators of Microsoft Connection Manager Profile Installer execution

WindowsProcess Access
TA0005 · Defense EvasionT1218.003 · CMSTPTA0002 · ExecutionT1559.001 · Component Object Model+3
Nik SeetharamanMon Jul 16windows
Detectionhightest

HackTool - CobaltStrike BOF Injection Pattern

Detects a typical pattern of a CobaltStrike BOF which inject into other processes

WindowsProcess Access
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christian Burkard (Nextron Systems)Wed Aug 04windows
Detectionhightest

HackTool - Generic Process Access

Detects process access requests from hacktool processes based on their default image name

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Nasreddine Bencherchali (Nextron Systems)+1Mon Nov 27windows
Detectionhightest

HackTool - HandleKatz Duplicating LSASS Handle

Detects HandleKatz opening LSASS to duplicate its handle to later dump the memory without opening any new handles

WindowsProcess Access
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1003.001 · LSASS Memory+1
Bhabesh RajMon Jun 27windows
Detectionhightest

HackTool - LittleCorporal Generated Maldoc Injection

Detects the process injection of a LittleCorporal generated Maldoc.

WindowsProcess Access
TA0005 · Defense EvasionTA0002 · ExecutionTA0004 · Privilege EscalationT1204.002 · Malicious File+1
Christian Burkard (Nextron Systems)Mon Aug 09windows
Detectionhightest

HackTool - SysmonEnte Execution

Detects the use of SysmonEnte, a tool to attack the integrity of Sysmon

WindowsProcess Access
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
Florian Roth (Nextron Systems)Wed Sep 07windows
Detectionhightest

Lsass Memory Dump via Comsvcs DLL

Detects adversaries leveraging the MiniDump export function from comsvcs.dll via rundll32 to perform a memory dump from lsass.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS Memory
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectionhightest

LSASS Memory Access by Tool With Dump Keyword In Name

Detects LSASS process access requests from a source process with the "dump" keyword in its image name.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)Thu Feb 10windows
Detectionmediumtest

Potential Credential Dumping Activity Via LSASS

Detects process access requests to the LSASS process with specific call trace calls and access masks. This behaviour is expressed by many credential dumping tools such as Mimikatz, NanoDump, Invoke-Mimikatz, Procdump and even the Taskmgr dumping feature.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Samir Bousseaden+1Wed Apr 03windows
Detectionhighstable

Credential Dumping Activity By Python Based Tool

Detects LSASS process access for potential credential dumping by a Python-like tool such as LaZagne or Pypykatz.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0349 · S0349
Bhabesh Raj+1Mon Nov 27windows
Detectionhighstable

Remote LSASS Process Access Through Windows Remote Management

Detects remote access to the LSASS process via WinRM. This could be a sign of credential dumping from tools like mimikatz.

WindowsProcess Access
TA0006 · Credential AccessTA0002 · ExecutionT1003.001 · LSASS MemoryT1059.001 · PowerShell+3
Patryk Prauze - ING TechMon May 20windows
Detectionhightest

Suspicious LSASS Access Via MalSecLogon

Detects suspicious access to LSASS handle via a call trace to "seclogon.dll" with a suspicious access right.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS Memory
Samir Bousseaden (original elastic rule)+1Wed Jun 29windows
Detectionmediumtest

Potentially Suspicious GrantedAccess Flags On LSASS

Detects process access requests to LSASS process with potentially suspicious access flags

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)+9Mon Nov 22windows
Detectionhightest

Credential Dumping Attempt Via WerFault

Detects process LSASS memory dump using Mimikatz, NanoDump, Invoke-Mimikatz, Procdump or Taskmgr based on the CallTrace pointing to ntdll.dll, dbghelp.dll or dbgcore.dll for win10, server2016 and up.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)Wed Jun 27windows