Rule Library

Sigma Rules

274 rules found for "discovery"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Console CodePage Lookup Via CHCP

Detects use of chcp to look up the system locale value as part of host discovery

WindowsProcess Creation
TA0007 · DiscoveryT1614.001 · System Language Discovery
_pete_0+1Mon Feb 21windows
Detectionlowtest

File And SubFolder Enumeration Via Dir Command

Detects usage of the "dir" command part of Windows CMD with the "/S" command line flag in order to enumerate files in a specified directory and all subdirectories.

WindowsProcess Creation
TA0007 · DiscoveryT1217 · Browser Information Discovery
François HubautMon Dec 13windows
Detectionmediumtest

Active Directory Structure Export Via Csvde.EXE

Detects the execution of "csvde.exe" in order to export organizational Active Directory structure.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1087.002 · Domain Account
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionlowtest

DirLister Execution

Detect the usage of "DirLister.exe" a utility for quickly listing folder or drive contents. It was seen used by BlackCat ransomware to create a list of accessible directories and files.

WindowsProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautSat Aug 20windows
Detectionlowexperimental

System Information Discovery via Registry Queries

Detects attempts to query system information directly from the Windows Registry.

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
lazargThu Jun 12windows
Detectionmediumtest

Potential Discovery Activity Via Dnscmd.EXE

Detects an attempt to leverage dnscmd.exe to enumerate the DNS zones of a domain. DNS zones used to host the DNS records for a particular domain.

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · Execution
@gott_cyberSun Jul 31windows
Detectionhightest

Potential Recon Activity Using DriverQuery.EXE

Detect usage of the "driverquery" utility to perform reconnaissance on installed drivers

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Jan 19windows
Detectionmediumtest

DriverQuery.EXE Execution

Detect usage of the "driverquery" utility. Which can be used to perform reconnaissance on installed drivers

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Jan 19windows
Detectionmediumtest

Domain Trust Discovery Via Dsquery

Detects execution of "dsquery.exe" for domain trust discovery

WindowsProcess Creation
TA0007 · DiscoveryT1482 · Domain Trust Discovery
E.M. Anhaus+3Thu Oct 24windows
Detectionhightest

Suspicious Kernel Dump Using Dtrace

Detects suspicious way to dump the kernel on Windows systems using dtrace.exe, which is available on Windows systems since Windows 10 19H1

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Florian Roth (Nextron Systems)Tue Dec 28windows
Detectionhightest

File Explorer Folder Opened Using Explorer Folder Shortcut Via Shell

Detects the initial execution of "cmd.exe" which spawns "explorer.exe" with the appropriate command line arguments for opening the "My Computer" folder.

WindowsProcess Creation
TA0007 · DiscoveryT1135 · Network Share Discovery
kostastsaleThu Dec 22windows
Detectionmediumtest

Recon Command Output Piped To Findstr.EXE

Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example. Attackers often time use this technique to extract specific information they require in their reconnaissance phase.

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discovery
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 06windows
Detectionmediumtest

Security Tools Keyword Lookup Via Findstr.EXE

Detects execution of "findstr" to search for common names of security tools. Attackers often pipe the results of recon commands such as "tasklist" or "whoami" to "findstr" in order to filter out the results. This detection focuses on the keywords that the attacker might use as a filter.

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 20windows
Detectionhightest

Sysmon Discovery Via Default Driver Altitude Using Findstr.EXE

Detects usage of "findstr" with the argument "385201". Which could indicate potential discovery of an installed Sysinternals Sysmon service using the default driver altitude (even if the name is changed).

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
François HubautThu Dec 16windows
Detectionlowtest

Fsutil Drive Enumeration

Attackers may leverage fsutil to enumerated connected drives.

WindowsProcess Creation
TA0007 · DiscoveryT1120 · Peripheral Device Discovery
Christopher Peacock+1Tue Mar 29windows
Detectionmediumtest

Gpresult Display Group Policy Information

Detects cases in which a user uses the built-in Windows utility gpresult to display the Resultant Set of Policy (RSoP) information

WindowsProcess Creation
TA0007 · DiscoveryT1615 · Group Policy Discovery
François HubautSun May 01windows
Detectionhightest

HackTool - Bloodhound/Sharphound Execution

Detects command line parameters used by Bloodhound and Sharphound hack tools

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain AccountT1482 · Domain Trust Discovery+4
Florian Roth (Nextron Systems)Fri Dec 20windows
Detectionhightest

HackTool - Certify Execution

Detects Certify a tool for Active Directory certificate abuse based on PE metadata characteristics and common command line arguments.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Martin MuellerMon Apr 17windows
Detectionhightest

HackTool - Certipy Execution

Detects Certipy execution, a tool for Active Directory Certificate Services enumeration and abuse based on PE metadata characteristics and common command line arguments.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Martin Mueller+1Mon Apr 17windows
Detectionhightest

HackTool - CrackMapExec Execution

This rule detect common flag combinations used by CrackMapExec in order to detect its use even if the binary has been replaced.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential Access+7
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionhightest

HackTool - PCHunter Execution

Detects suspicious use of PCHunter, a tool like Process Hacker to view and manipulate processes, kernel options and other low level stuff

WindowsProcess Creation
TA0002 · ExecutionTA0007 · DiscoveryT1082 · System Information DiscoveryT1057 · Process Discovery+3
Florian Roth (Nextron Systems)+1Mon Oct 10windows
Detectionhightest

HackTool - SharpLdapWhoami Execution

Detects SharpLdapWhoami, a whoami alternative that queries the LDAP service on a domain controller

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Aug 29windows
Detectioncriticaltest

HackTool - SharpUp PrivEsc Tool Execution

Detects the use of SharpUp, a tool for local privilege escalation

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0007 · Discovery+4
Florian Roth (Nextron Systems)Sat Aug 20windows
Detectionhightest

HackTool - SharpView Execution

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections DiscoveryT1069.002 · Domain GroupsT1482 · Domain Trust Discovery+2
François HubautFri Dec 10windows
Detectionmediumtest

HackTool - SharpLDAPmonitor Execution

Detects execution of the SharpLDAPmonitor. Which can monitor the creation, deletion and changes to LDAP objects.

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Fri Dec 30windows
Detectionhightest

HackTool - SOAPHound Execution

Detects the execution of SOAPHound, a .NET tool for collecting Active Directory data, using specific command-line arguments that may indicate an attempt to extract sensitive AD information.

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account Discovery
kostastsaleFri Jan 26windows
Detectionhightest

HackTool - TruffleSnout Execution

Detects the use of TruffleSnout.exe an iterative AD discovery toolkit for offensive operators, situational awareness and targeted low noise enumeration.

WindowsProcess Creation
TA0007 · DiscoveryT1482 · Domain Trust Discovery
François HubautSat Aug 20windows
Detectionhightest

HackTool - winPEAS Execution

WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on book.hacktricks.xyz

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryT1082 · System Information DiscoveryT1087 · Account Discovery+1
Georg Lauenstein (sure[secure])Mon Sep 19windows
Detectionhightest

HackTool - WinPwn Execution

Detects commandline keywords indicative of potential usge of the tool WinPwn. A tool for Windows and Active Directory reconnaissance and exploitation.

WindowsProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionTA0007 · DiscoveryTA0002 · Execution+9
Swachchhanda Shrawan PoudelMon Dec 04windows
Detectionlowtest

Suspicious Execution of Hostname

Use of hostname to get information

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
François HubautSat Jan 01windows
Detectionmediumtest

Potential Reconnaissance Activity Via GatherNetworkInfo.VBS

Detects execution of the built-in script located in "C:\Windows\System32\gatherNetworkInfo.vbs". Which can be used to gather information about the target machine

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1615 · Group Policy DiscoveryT1059.005 · Visual Basic
blueteamer8699Mon Jan 03windows
Detectionhightest

Potential Process Injection Via Msra.EXE

Detects potential process injection via Microsoft Remote Asssistance (Msra.exe) by looking at suspicious child processes spawned from the aforementioned process. It has been a target used by many threat actors and used for discovery and persistence tactics

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Alexander McDonaldFri Jun 24windows
Detectionlowtest

Firewall Configuration Discovery Via Netsh.EXE

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
François Hubaut+2Tue Dec 07windows
Detectionmediumtest

New Network Trace Capture Started Via Netsh.EXE

Detects the execution of netsh with the "trace" flag in order to start a network capture

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Kutepov Anton+1Thu Oct 24windows
Detectionmediumtest

Harvesting Of Wifi Credentials Via Netsh.EXE

Detect the harvesting of wifi credentials using netsh.exe

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Andreas Hunkeler+1Mon Apr 20windows
Detectionmediumtest

Suspicious Group And Account Reconnaissance Activity Using Net.EXE

Detects suspicious reconnaissance command line activity on Windows systems using Net.EXE Check if the user that executed the commands is suspicious (e.g. service accounts, LOCAL_SYSTEM)

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain Account
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionlowtest

System Network Connections Discovery Via Net.EXE

Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.

WindowsProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections Discovery
François HubautFri Dec 10windows
Detectionlowstable

Share And Session Enumeration Using Net.EXE

Detects attempts to enumerate file shares, printer shares and sessions using "net.exe" with the "view" flag.

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System Discovery
Endgame+1Tue Oct 30windows
Detectionlowtest

Nltest.EXE Execution

Detects nltest commands that can be used for information discovery

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration DiscoveryT1018 · Remote System DiscoveryT1482 · Domain Trust Discovery
Arun ChauhanFri Feb 03windows
Detectionmediumtest

Potential Recon Activity Via Nltest.EXE

Detects nltest commands that can be used for information discovery

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration DiscoveryT1482 · Domain Trust Discovery
Craig Young+2Sat Jul 24windows
Detectionlowexperimental

Notepad Password Files Discovery

Detects the execution of Notepad to open a file that has the string "password" which may indicate unauthorized access to credentials or suspicious activity.

WindowsProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
The DFIR ReportFri Feb 21windows
Detectionhightest

Network Reconnaissance Activity

Detects a set of suspicious network related commands often used in recon stages

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account DiscoveryT1082 · System Information Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Feb 07windows
Detectionmediumtest

PktMon.EXE Execution

Detects execution of PktMon, a tool that captures network packets.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
François HubautThu Mar 17windows
Detectionhightest

AADInternals PowerShell Cmdlets Execution - ProccessCreation

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

WindowsProcess Creation
TA0002 · ExecutionTA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential Access+1
Austin Songer+2Fri Dec 23windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - ProcCreation

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsProcess Creation
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
François HubautSun Jan 22windows
Detectionmediumtest

Computer Discovery And Export Via Get-ADComputer Cmdlet

Detects usage of the Get-ADComputer cmdlet to collect computer information and output it to a file

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 10windows
Detectionmediumtest

Suspicious Reconnaissance Activity Using Get-LocalGroupMember Cmdlet

Detects suspicious reconnaissance command line activity on Windows systems using the PowerShell Get-LocalGroupMember Cmdlet

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local Account
Nasreddine Bencherchali (Nextron Systems)Mon Oct 10windows
Detectionhightest

Malicious PowerShell Commandlets - ProcessCreation

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsProcess Creation
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows