Rule Library

Sigma Rules

557 rules found for "Red Canary"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Potential File Extension Spoofing Using Right-to-Left Override

Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.

WindowsFile Event
TA0002 · ExecutionTA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Jonathan Peters (Nextron Systems)+2Sun Nov 17windows
Detectionhightest

Suspicious Startup Folder Persistence

Detects the creation of potentially malicious script and executable files in Windows startup folders, which is a common persistence technique used by threat actors. These files (.ps1, .vbs, .js, .bat, etc.) are automatically executed when a user logs in, making the Startup folder an attractive target for attackers. This technique is frequently observed in malvertising campaigns and malware distribution where attackers attempt to maintain long-term access to compromised systems.

WindowsFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionT1204.002 · Malicious FileTA0003 · Persistence+1
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 10windows
Detectionmediumtest

Windows Terminal Profile Settings Modification By Uncommon Process

Detects the creation or modification of the Windows Terminal Profile settings file "settings.json" by an uncommon process.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.015 · Login Items
François Hubaut+1Sat Jul 22windows
Detectionhightest

LSASS Process Memory Dump Creation Via Taskmgr.EXE

Detects the creation of an "lsass.dmp" file by the taskmgr process. This indicates a manual dumping of the LSASS.exe process memory using Windows Task Manager.

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan PoudelThu Oct 19windows
Detectionmediumtest

VHD Image Download Via Browser

Detects creation of ".vhd"/".vhdx" files by browser processes. Malware can use mountable Virtual Hard Disk ".vhd" files to encapsulate payloads and evade security controls.

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malware
François Hubaut+2Mon Oct 25windows
Detectionmediumtest

Writing Local Admin Share

Aversaries may use to interact with a remote network share using Server Message Block (SMB). This technique is used by post-exploitation frameworks.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0008 · Lateral MovementT1546.002 · Screensaver
François HubautSat Jan 01windows
Detectionmediumtest

CredUI.DLL Loaded By Uncommon Process

Detects loading of "credui.dll" and related DLLs by an uncommon process. Attackers might leverage this DLL for potential use of "CredUIPromptForCredentials" or "CredUnPackAuthenticationBufferW".

WindowsImage Load (DLL)
TA0006 · Credential AccessTA0009 · CollectionT1056.002 · GUI Input Capture
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectionhightest

Network Connection Initiated By IMEWDBLD.EXE

Detects a network connection initiated by IMEWDBLD.EXE. This might indicate potential abuse of the utility as a LOLBIN in order to download arbitrary files or additional payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSat Jan 22windows
Detectionmediumtest

Python Initiated Connection

Detects a Python process initiating a network connection. While this often relates to package installation, it can also indicate a potential malicious script communicating with a C&C server.

WindowsNetwork Connection
TA0007 · DiscoveryT1046 · Network Service Discovery
François HubautFri Dec 10windows
Detectionmediumexperimental

Remote Access Tool - AnyDesk Incoming Connection

Detects incoming connections to AnyDesk. This could indicate a potential remote attacker trying to connect to a listening instance of AnyDesk and use it as potential command and control channel.

WindowsNetwork Connection
TA0003 · PersistenceTA0011 · Command and Controlattack.t1219.002
Mon Sep 02windows
Detectionhightest

Suspicious Network Connection Binary No CommandLine

Detects suspicious network connections made by a well-known Windows binary run with no command line parameters

WindowsNetwork Connection
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Sun Jul 03windows
Detectionmediumtest

Microsoft Sync Center Suspicious Network Connections

Detects suspicious connections from Microsoft Sync Center to non-private IPs.

WindowsNetwork Connection
TA0004 · Privilege EscalationT1055 · Process InjectionT1218 · System Binary Proxy ExecutionTA0002 · Execution+1
elhoimThu Apr 28windows
Detectionmediumtest

Suspicious Outbound SMTP Connections

Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.

WindowsNetwork Connection
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
François HubautFri Jan 07windows
Detectionmediumtest

Local Network Connection Initiated By Script Interpreter

Detects a script interpreter (Wscript/Cscript) initiating a local network connection to download or execute a script hosted on a shared folder.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSun Aug 28windows
Detectionhightest

Outbound Network Connection Initiated By Script Interpreter

Detects a script interpreter wscript/cscript opening a network connection to a non-local network. Adversaries may use script to download malicious payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Sun Aug 28windows
Detectioncriticaltest

CobaltStrike Named Pipe

Detects the creation of a named pipe as used by CobaltStrike

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+1Tue May 25windows
Detectionhighstable

Delete Volume Shadow Copies Via WMI With PowerShell

Shadow Copies deletion using operating systems utilities via PowerShell

WindowsPowerShell Classic
TA0040 · ImpactT1490 · Inhibit System Recovery
François HubautThu Jun 03windows
Detectionmediumtest

Netcat The Powershell Version

Adversaries may use a non-application layer protocol for communication between host and C2 server or among infected hosts within a network

WindowsPowerShell Classic
TA0011 · Command and ControlT1095 · Non-Application Layer Protocol
François HubautWed Jul 21windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

Windowspowershell-classic
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Tue Jul 13windows
Detectionlowtest

Use Get-NetTCPConnection

Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.

WindowsPowerShell Classic
TA0007 · DiscoveryT1049 · System Network Connections Discovery
François HubautFri Dec 10windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Windowspowershell-classic
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionhightest

Tamper Windows Defender - PSClassic

Attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

Windowsps_classic_provider_start
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+1Mon Jun 07windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell Module

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Module
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 13windows
Detectionlowtest

AD Groups Or Users Enumeration Using PowerShell - PoshModule

Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.

WindowsPowerShell Module
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionlowtest

Use Get-NetTCPConnection - PowerShell Module

Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.

WindowsPowerShell Module
TA0007 · DiscoveryT1049 · System Network Connections Discovery
François HubautFri Dec 10windows
Detectionlowtest

Suspicious Get Local Groups Information

Detects the use of PowerShell modules and cmdlets to gather local group information. Adversaries may use local system permission groups to determine which groups exist and which users belong to a particular group such as the local administrators group.

WindowsPowerShell Module
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautSun Dec 12windows
Detectionlowtest

Suspicious Get Information for SMB Share - PowerShell Module

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network.

WindowsPowerShell Module
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautWed Dec 15windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Module

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Module
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionmediumtest

Access to Browser Login Data

Adversaries may acquire credentials from web browsers by reading files specific to the target browser. Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store.

WindowsPowerShell Script
TA0006 · Credential AccessT1555.003 · Credentials from Web Browsers
François HubautSun Jan 30windows
Detectionmediumtest

Get-ADUser Enumeration Using UserAccountControl Flags

Detects AS-REP roasting is an attack that is often-overlooked. It is not very common as you have to explicitly set accounts that do not require pre-authentication.

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
François HubautThu Mar 17windows
Detectionmediumtest

Automated Collection Command PowerShell

Once established within a system or network, an adversary may use automated techniques for collecting internal data.

WindowsPowerShell Script
TA0009 · CollectionT1119 · Automated Collection
François HubautWed Jul 28windows
Detectionmediumtest

Windows Screen Capture with CopyFromScreen

Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations

WindowsPowerShell Script
TA0009 · CollectionT1113 · Screen Capture
François HubautTue Dec 28windows
Detectionmediumtest

Powershell Create Scheduled Task

Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
François HubautTue Dec 28windows
Detectionhightest

Powershell Install a DLL in System Directory

Uses PowerShell to install/copy a file into a system directory such as "System32" or "SysWOW64"

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556.002 · Password Filter DLL
François Hubaut+1Mon Dec 27windows
Detectionmediumtest

Registry-Free Process Scope COR_PROFILER

Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR. The COR_PROFILER is a .NET Framework feature which allows developers to specify an unmanaged (or external of .NET) profiling DLL to be loaded into each .NET process that loads the Common Language Runtime (CLR). These profiliers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR. (Citation: Microsoft Profiling Mar 2017) (Citation: Microsoft COR_PROFILER Feb 2013)

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.012 · COR_PROFILER
François HubautThu Dec 30windows
Detectionmediumtest

PowerShell Create Local User

Detects creation of a local user via PowerShell

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellTA0003 · PersistenceT1136.001 · Local Account
@roxpinteddySat Apr 11windows
Detectionmediumtest

Powershell Detect Virtualization Environment

Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox

WindowsPowerShell Script
TA0007 · DiscoveryTA0005 · Defense EvasionT1497.001 · System Checks
François Hubaut+1Tue Aug 03windows
Detectionmediumtest

DirectorySearcher Powershell Exploitation

Enumerates Active Directory to determine computers that are joined to the domain

WindowsPowerShell Script
TA0007 · DiscoveryT1018 · Remote System Discovery
François HubautSat Feb 12windows
Detectionmediumtest

Manipulation of User Computer or Group Security Principals Across AD

Adversaries may create a domain account to maintain access to victim systems. Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain..

WindowsPowerShell Script
TA0003 · PersistenceT1136.002 · Domain Account
François HubautTue Dec 28windows
Detectionhightest

Disable-WindowsOptionalFeature Command PowerShell

Detect built in PowerShell cmdlet Disable-WindowsOptionalFeature, Deployment Image Servicing and Management tool. Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautSat Sep 10windows
Detectionmediumtest

Dump Credentials from Windows Credential Manager With PowerShell

Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials.

WindowsPowerShell Script
TA0006 · Credential AccessT1555 · Credentials from Password Stores
François HubautMon Dec 20windows
Detectionmediumtest

Enable Windows Remote Management

Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.

WindowsPowerShell Script
TA0008 · Lateral MovementT1021.006 · Windows Remote Management
François HubautFri Jan 07windows
Detectionmediumtest

Enumerate Credentials from Windows Credential Manager With PowerShell

Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials.

WindowsPowerShell Script
TA0006 · Credential AccessT1555 · Credentials from Password Stores
François HubautMon Dec 20windows
Detectionmediumtest

Service Registry Permissions Weakness Check

Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Adversaries may use flaws in the permissions for registry to redirect from the originally specified executable to one that they control, in order to launch their own code at Service start. Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.011 · Services Registry Permissions Weakness+1
François HubautThu Dec 30windows
Detectionlowtest

Active Directory Computers Enumeration With Get-AdComputer

Detects usage of the "Get-AdComputer" to enumerate Computers or properties within Active Directory.

WindowsPowerShell Script
TA0007 · DiscoveryT1018 · Remote System DiscoveryT1087.002 · Domain Account
François HubautThu Mar 17windows
Detectionlowtest

Active Directory Group Enumeration With Get-AdGroup

Detects usage of the "Get-AdGroup" cmdlet to enumerate Groups within Active Directory

WindowsPowerShell Script
TA0007 · DiscoveryT1069.002 · Domain Groups
François HubautThu Mar 17windows
Detectionmediumtest

Suspicious Get-ADReplAccount

The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

WindowsPowerShell Script
TA0006 · Credential AccessT1003.006 · DCSync
François HubautSun Feb 06windows
Detectionlowtest

Automated Collection Bookmarks Using Get-ChildItem PowerShell

Adversaries may enumerate browser bookmarks to learn more about compromised hosts. Browser bookmarks may reveal personal information about users (ex: banking sites, interests, social media, etc.) as well as details about internal network resources such as servers, tools/dashboards, or other related infrastructure.

WindowsPowerShell Script
TA0007 · DiscoveryT1217 · Browser Information Discovery
François HubautMon Dec 13windows