Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

HTML Help HH.EXE Suspicious Child Process

Detects a suspicious child process of a Microsoft HTML Help (HH.exe)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0001 · Initial AccessT1047 · Windows Management Instrumentation+10
Maxim Pavlunin+1Wed Apr 01windows
Detectionhightest

Suspicious HH.EXE Execution

Detects a suspicious execution of a Microsoft HTML Help (HH.exe)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0001 · Initial AccessT1047 · Windows Management Instrumentation+10
Maxim PavluninWed Apr 01windows
Detectionhightest

HackTool - ADCSPwn Execution

Detects command line parameters used by ADCSPwn, a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Sat Jul 31windows
Detectionhightest

HackTool - Bloodhound/Sharphound Execution

Detects command line parameters used by Bloodhound and Sharphound hack tools

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain AccountT1482 · Domain Trust Discovery+4
Florian Roth (Nextron Systems)Fri Dec 20windows
Detectioncriticaltest

HackTool - F-Secure C3 Load by Rundll32

F-Secure C3 produces DLLs with a default exported StartNodeRelay function.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Alfie Champion (ajpc500)Wed Jun 02windows
Detectionhightest

HackTool - Certify Execution

Detects Certify a tool for Active Directory certificate abuse based on PE metadata characteristics and common command line arguments.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Martin MuellerMon Apr 17windows
Detectionhightest

HackTool - Certipy Execution

Detects Certipy execution, a tool for Active Directory Certificate Services enumeration and abuse based on PE metadata characteristics and common command line arguments.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Martin Mueller+1Mon Apr 17windows
Detectionhightest

Operator Bloopers Cobalt Strike Commands

Detects use of Cobalt Strike commands accidentally entered in the CMD shell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shellstp.1u
_pete_0+1Fri May 06windows
Detectionhightest

Operator Bloopers Cobalt Strike Modules

Detects Cobalt Strike module/commands accidentally entered in CMD shell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
_pete_0+1Fri May 06windows
Detectionhightest

CobaltStrike Load by Rundll32

Rundll32 can be use by Cobalt Strike with StartW function to load DLLs from the command line.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Wojciech LesickiTue Jun 01windows
Detectionhightest

Potential CobaltStrike Process Patterns

Detects potential process patterns related to Cobalt Strike beacon activity

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Jul 27windows
Detectionhightest

HackTool - CoercedPotato Execution

Detects the use of CoercedPotato, a tool for privilege escalation

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Wed Oct 11windows
Detectionhightest

HackTool - Covenant PowerShell Launcher

Detects suspicious command lines used in Covenant luanchers

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.001 · PowerShellT1564.003 · Hidden Window
Florian Roth (Nextron Systems)+2Thu Jun 04windows
Detectionhightest

HackTool - CrackMapExec Execution

This rule detect common flag combinations used by CrackMapExec in order to detect its use even if the binary has been replaced.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential Access+7
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionhightest

HackTool - CrackMapExec Process Patterns

Detects suspicious process patterns found in logs when CrackMapExec is used

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Sat Mar 12windows
Detectionhightest

HackTool - CrackMapExec PowerShell Obfuscation

The CrachMapExec pentesting framework implements a PowerShell obfuscation with some static strings detected by this rule.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027.005 · Indicator Removal from Tools
Thomas PatzkeFri May 22windows
Detectionhightest

HackTool - CreateMiniDump Execution

Detects the use of CreateMiniDump hack tool used to dump the LSASS process memory for credential extraction on the attacker's machine

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Sun Dec 22windows
Detectioncriticaltest

HackTool - DInjector PowerShell Cradle Execution

Detects the use of the Dinject PowerShell cradle based on the specific flags

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)Tue Dec 07windows
Detectioncriticaltest

HackTool - Dumpert Process Dumper Execution

Detects the use of Dumpert process dumper, which dumps the lsass.exe process memory

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Tue Feb 04windows
Detectionhightest

HackTool - EDRSilencer Execution

Detects the execution of EDRSilencer, a tool that leverages Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server based on PE metadata information.

WindowsProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defenses
@gott_cyberTue Jan 02windows
Detectionhightest

HackTool - Empire PowerShell Launch Parameters

Detects suspicious powershell command line parameters used in Empire

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sat Apr 20windows
Detectionmediumtest

HackTool - WinRM Access Via Evil-WinRM

Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.006 · Windows Remote Management
François HubautFri Jan 07windows
Detectioncriticaltest

Hacktool Execution - Imphash

Detects the execution of different Windows based hacktools via their import hash (imphash) even if the files have been renamed

WindowsProcess Creation
TA0006 · Credential AccessTA0042 · Resource DevelopmentT1588.002 · ToolT1003 · OS Credential Dumping
Florian Roth (Nextron Systems)Fri Mar 04windows
Detectionhightest

Hacktool Execution - PE Metadata

Detects the execution of different Windows based hacktools via PE metadata (company, product, etc.) even if the files have been renamed

WindowsProcess Creation
TA0006 · Credential AccessTA0042 · Resource DevelopmentT1588.002 · ToolT1003 · OS Credential Dumping
Florian Roth (Nextron Systems)Wed Apr 27windows
Detectionhightest

HackTool - GMER Rootkit Detector and Remover Execution

Detects the execution GMER tool based on image and hash fields.

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Oct 05windows
Detectionhightest

HackTool - HandleKatz LSASS Dumper Execution

Detects the use of HandleKatz, a tool that demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Thu Aug 18windows
Detectionhightest

HackTool - Hashcat Password Cracker Execution

Execute Hashcat.exe with provided SAM file from registry of Windows and Password list to crack against

WindowsProcess Creation
TA0006 · Credential AccessT1110.002 · Password Cracking
François HubautMon Dec 27windows
Detectionhightest

HackTool - Htran/NATBypass Execution

Detects executable names or flags used by Htran or Htran-like tools (e.g. NATBypass)

WindowsProcess Creation
TA0011 · Command and ControlT1090 · ProxyS0040 · S0040
Florian Roth (Nextron Systems)Tue Dec 27windows
Detectionhightest

HackTool - Hydra Password Bruteforce Execution

Detects command line parameters used by Hydra password guessing hack tool

WindowsProcess Creation
TA0006 · Credential AccessT1110 · Brute ForceT1110.001 · Password Guessing
Vasiliy BurovMon Oct 05windows
Detectionhightest

HackTool - Impacket Tools Execution

Detects the execution of different compiled Windows binaries of the impacket toolset (based on names or part of their names - could lead to false positives)

WindowsProcess Creation
TA0009 · CollectionTA0002 · ExecutionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Sat Jul 24windows
Detectionmediumtest

HackTool - Impersonate Execution

Detects execution of the Impersonate tool. Which can be used to manipulate tokens on a Windows computers remotely (PsExec/WmiExec) or interactively

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1134.001 · Token Impersonation/TheftT1134.003 · Make and Impersonate Token
Sai Prashanth PulisettiWed Dec 21windows
Detectioncriticaltest

HackTool - Inveigh Execution

Detects the use of Inveigh a cross-platform .NET IPv4/IPv6 machine-in-the-middle tool

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionhightest

Invoke-Obfuscation CLIP+ Launcher

Detects Obfuscated use of Clip.exe to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Tue Oct 13windows
Detectionhightest

Invoke-Obfuscation Obfuscated IEX Invocation

Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Daniel Bohannon ( / )+1Fri Nov 08windows
Detectionhightest

Invoke-Obfuscation STDIN+ Launcher

Detects Obfuscated use of stdin to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionhightest

Invoke-Obfuscation VAR+ Launcher

Detects Obfuscated use of Environment Variables to execute PowerShell

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionmediumtest

Invoke-Obfuscation COMPRESS OBFUSCATION

Detects Obfuscated Powershell via COMPRESS OBFUSCATION

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionhightest

Invoke-Obfuscation Via Stdin

Detects Obfuscated Powershell via Stdin in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Mon Oct 12windows
Detectionhightest

Invoke-Obfuscation Via Use Clip

Detects Obfuscated Powershell via use Clip.exe in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Fri Oct 09windows
Detectionhightest

Invoke-Obfuscation Via Use MSHTA

Detects Obfuscated Powershell via use MSHTA in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Thu Oct 08windows
Detectionhightest

Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION

Detects Obfuscated Powershell via VAR++ LAUNCHER

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Tue Oct 13windows
Detectionmediumtest

HackTool - Jlaive In-Memory Assembly Execution

Detects the use of Jlaive to execute assemblies in a copied PowerShell

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
Jose Luis Sanchez MartinezTue May 24windows
Detectionhightest

HackTool - Koadic Execution

Detects command line parameters used by Koadic hack tool

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellT1059.005 · Visual BasicT1059.007 · JavaScript
wagga+2Sun Jan 12windows
Detectionhightest

HackTool - KrbRelay Execution

Detects the use of KrbRelay, a Kerberos relaying tool

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Florian Roth (Nextron Systems)Wed Apr 27windows
Detectionhightest

HackTool - RemoteKrbRelay Execution

Detects the use of RemoteKrbRelay, a Kerberos relaying tool via CommandLine flags and PE metadata.

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Nasreddine Bencherchali (Nextron Systems)Thu Jun 27windows
Detectionhightest

HackTool - KrbRelayUp Execution

Detects KrbRelayUp used to perform a universal no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1558.003 · KerberoastingTA0008 · Lateral Movement+1
Florian Roth (Nextron Systems)Tue Apr 26windows
Detectionhightest

HackTool - LocalPotato Execution

Detects the execution of the LocalPotato POC based on basic PE metadata information and default CLI examples

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalationcve.2023-21746
Nasreddine Bencherchali (Nextron Systems)Tue Feb 14windows
Detectionhightest

Potential Meterpreter/CobaltStrike Activity

Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service starting

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.001 · Token Impersonation/TheftT1134.002 · Create Process with Token
Teymur Kheirkhabarov+2Sat Oct 26windows