Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious Scheduled Task Creation Involving Temp Folder

Detects the creation of scheduled tasks that involves a temporary folder and runs only once

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Thu Mar 11windows
Detectionhightest

Delete Important Scheduled Task

Detects when adversaries stop services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

Delete All Scheduled Tasks

Detects the usage of schtasks with the delete flag and the asterisk symbol to delete all tasks from the schedule of the local computer, including tasks scheduled by other users.

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

Disable Important Scheduled Task

Detects when adversaries stop services or processes by disabling their respective scheduled tasks in order to conduct data destructive activities

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stop
François Hubaut+2Sun Dec 26windows
Detectionmediumtest

Schedule Task Creation From Env Variable Or Potentially Suspicious Path Via Schtasks.EXE

Detects Schtask creations that point to a suspicious folder or an environment variable often used by malware

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Mon Feb 21windows
Detectionhightest

Schtasks From Suspicious Folders

Detects scheduled task creations that have suspicious action command and folder combinations

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Fri Apr 15windows
Detectionmediumtest

Suspicious Scheduled Task Name As GUID

Detects creation of a scheduled task with a GUID like name

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Oct 31windows
Detectionhightest

Uncommon One Time Only Scheduled Task At 00:00

Detects scheduled task creation events that include suspicious actions, and is run once at 00:00

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task
Martin MuellerFri Jul 15windows
Detectionmediumtest

Potential Persistence Via Microsoft Compatibility Appraiser

Detects manual execution of the "Microsoft Compatibility Appraiser" task via schtasks. In order to trigger persistence stored in the "\AppCompatFlags\TelemetryController" registry key.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
SreemanTue Sep 29windows
Detectionhightest

Potential Persistence Via Powershell Search Order Hijacking - Task

Detects suspicious powershell execution via a schedule task where the command ends with an suspicious flags to hide the powershell instance instead of executeing scripts or commands. This could be a sign of persistence via PowerShell "Get-Variable" technique as seen being used in Colibri Loader

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+1Fri Apr 08windows
Detectionmediumtest

Scheduled Task Executing Payload from Registry

Detects the creation of a schtasks that potentially executes a payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
X__Junior (Nextron Systems)+1Tue Jul 18windows
Detectionhightest

Scheduled Task Executing Encoded Payload from Registry

Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+3Sat Feb 12windows
Detectionhightest

Suspicious Schtasks Schedule Types

Detects scheduled task creations or modification on a suspicious schedule type

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionmediumtest

Suspicious Schtasks Schedule Type With High Privileges

Detects scheduled task creations or modification to be run with high privileges on a suspicious schedule type

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Wed Aug 31windows
Detectionmediumtest

Suspicious Scheduled Task Creation via Masqueraded XML File

Detects the creation of a scheduled task using the "-XML" flag with a file without the '.xml' extension. This behavior could be indicative of potential defense evasion attempt during persistence

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0005 · Defense EvasionTA0003 · Persistence+2
Swachchhanda Shrawan Poudel+1Thu Apr 20windows
Detectionhightest

Suspicious Command Patterns In Scheduled Task Creation

Detects scheduled task creation using "schtasks" that contain potentially suspicious or uncommon commands

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053.005 · Scheduled Task
Florian Roth (Nextron Systems)Wed Feb 23windows
Detectionhightest

Schtasks Creation Or Modification With SYSTEM Privileges

Detects the creation or update of a scheduled task to run with "NT AUTHORITY\SYSTEM" privileges

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Thu Jul 28windows
Detectionhightest

Script Event Consumer Spawning Process

Detects a suspicious child process of Script Event Consumer (scrcons.exe).

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Sittikorn SMon Jun 21windows
Detectionmediumtest

Potential Shim Database Persistence via Sdbinst.EXE

Detects installation of a new shim using sdbinst.exe. Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.011 · Application Shimming
Markus NeisWed Jan 16windows
Detectionmediumtest

Uncommon Extension Shim Database Installation Via Sdbinst.EXE

Detects installation of a potentially suspicious new shim with an uncommon extension using sdbinst.exe. Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.011 · Application Shimming
Nasreddine Bencherchali (Nextron Systems)Tue Aug 01windows
Detectionmediumtest

Sdclt Child Processes

A General detection for sdclt spawning new processes. This could be an indicator of sdclt being used for bypass UAC techniques.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Sdiagnhost Calling Suspicious Child Process

Detects sdiagnhost.exe calling a suspicious child process (e.g. used in exploits for Follina / CVE-2022-30190)

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1218 · System Binary Proxy Execution
kostastsaleWed Jun 01windows
Detectionmediumtest

Potential Suspicious Activity Using SeCEdit

Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy

WindowsProcess Creation
TA0009 · CollectionTA0007 · DiscoveryTA0003 · PersistenceTA0005 · Defense Evasion+16
Janantha MarasingheFri Nov 18windows
Detectionhightest

Suspicious Serv-U Process Pattern

Detects a suspicious process pattern which could be a sign of an exploited Serv-U service

WindowsProcess Creation
TA0006 · Credential AccessT1555 · Credentials from Password Storescve.2021-35211
Florian Roth (Nextron Systems)Wed Jul 14windows
Detectionhightest

Uncommon Child Process Of Setres.EXE

Detects uncommon child process of Setres.EXE. Setres.EXE is a Windows server only process and tool that can be used to set the screen resolution. It can potentially be abused in order to launch any arbitrary file with a name containing the word "choice" from the current execution path.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
@gott_cyber+1Sun Dec 11windows
Detectionmediumtest

Potential SPN Enumeration Via Setspn.EXE

Detects service principal name (SPN) enumeration used for Kerberoasting

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Markus Neis+1Wed Nov 14windows
Detectionmediumtest

Setup16.EXE Execution With Custom .Lst File

Detects the execution of "Setup16.EXE" and old installation utility with a custom ".lst" file. These ".lst" file can contain references to external program that "Setup16.EXE" will execute. Attackers and adversaries might leverage this as a living of the land utility.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.005 · Executable Installer File Permissions Weakness
François HubautSun Dec 01windows
Detectionmediumtest

Suspicious Execution of Shutdown

Use of the commandline to shutdown or reboot windows

WindowsProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
François HubautSat Jan 01windows
Detectionmediumtest

Suspicious Execution of Shutdown to Log Out

Detects the rare use of the command line tool shutdown to logoff a user

WindowsProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
François HubautSat Oct 01windows
Detectionmediumtest

Uncommon Sigverif.EXE Child Process

Detects uncommon child processes spawning from "sigverif.exe", which could indicate potential abuse of the latter as a living of the land binary in order to proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

Uncommon Child Processes Of SndVol.exe

Detects potentially uncommon child processes of SndVol.exe (the Windows volume mixer)

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionmediumtest

Audio Capture via SoundRecorder

Detect attacker collecting audio via SoundRecorder application.

WindowsProcess Creation
TA0009 · CollectionT1123 · Audio Capture
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhightest

Suspicious Splwow64 Without Params

Detects suspicious Splwow64.exe process without any command line parameters

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)Mon Aug 23windows
Detectionhightest

Suspicious Spool Service Child Process

Detects suspicious print spool service (spoolsv.exe) child processes.

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Justin C.+1Sun Jul 11windows
Detectionmediumtest

Veeam Backup Database Suspicious Query

Detects potentially suspicious SQL queries using SQLCmd targeting the Veeam backup databases in order to steal information.

WindowsProcess Creation
TA0009 · CollectionT1005 · Data from Local System
Nasreddine Bencherchali (Nextron Systems)Thu May 04windows
Detectionhightest

VeeamBackup Database Credentials Dump Via Sqlcmd.EXE

Detects dump of credentials in VeeamBackup dbo

WindowsProcess Creation
TA0009 · CollectionT1005 · Data from Local System
François HubautMon Dec 20windows
Detectionhightest

SQLite Chromium Profile Data DB Access

Detect usage of the "sqlite" binary to query databases in Chromium-based browsers for potential data stealing.

WindowsProcess Creation
TA0006 · Credential AccessT1539 · Steal Web Session CookieT1555.003 · Credentials from Web BrowsersTA0009 · Collection+1
TropChaudMon Dec 19windows
Detectionhightest

SQLite Firefox Profile Data DB Access

Detect usage of the "sqlite" binary to query databases in Firefox and other Gecko-based browsers for potential data stealing.

WindowsProcess Creation
TA0006 · Credential AccessT1539 · Steal Web Session CookieTA0009 · CollectionT1005 · Data from Local System
François HubautFri Apr 08windows
Detectionmediumtest

Arbitrary File Download Via Squirrel.EXE

Detects the usage of the "Squirrel.exe" to download arbitrary files. This binary is part of multiple Electron based software installations (Slack, Teams, Discord, etc.)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+3Thu Jun 09windows
Detectionmediumtest

Process Proxy Execution Via Squirrel.EXE

Detects the usage of the "Squirrel.exe" binary to execute arbitrary processes. This binary is part of multiple Electron based software installations (Slack, Teams, Discord, etc.)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+3Thu Jun 09windows
Detectionmediumtest

Port Forwarding Activity Via SSH.EXE

Detects port forwarding activity via SSH.exe

WindowsProcess Creation
TA0011 · Command and ControlTA0008 · Lateral MovementT1572 · Protocol TunnelingT1021.001 · Remote Desktop Protocol+1
Nasreddine Bencherchali (Nextron Systems)Wed Oct 12windows
Detectionmediumtest

Program Executed Using Proxy/Local Command Via SSH.EXE

Detect usage of the "ssh.exe" binary as a proxy to launch other programs.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Thu Dec 29windows
Detectionhightest

Potential RDP Tunneling Via SSH

Execution of ssh.exe to perform data exfiltration and tunneling through RDP

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed Oct 12windows
Detectionmediumtest

Potential Amazon SSM Agent Hijacking

Detects potential Amazon SSM agent hijack attempts as outlined in the Mitiga research report.

WindowsProcess Creation
TA0011 · Command and ControlTA0003 · Persistenceattack.t1219.002
Muhammad FaisalWed Aug 02windows
Detectionhightest

Execution via stordiag.exe

Detects the use of stordiag.exe to execute schtasks.exe systeminfo.exe and fltmc.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Austin SongerThu Oct 21windows
Detectionmediumtest

Start of NT Virtual DOS Machine

Ntvdm.exe allows the execution of 16-bit Windows applications on 32-bit Windows operating systems, as well as the execution of both 16-bit and 32-bit DOS applications

WindowsProcess Creation
TA0005 · Defense Evasion
François HubautSat Jul 16windows
Detectionhightest

Abused Debug Privilege by Arbitrary Parent Processes

Detection of unusual child processes by different system processes

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Semanur Guneysu+1Wed Oct 28windows
Detectionmediumtest

User Added to Local Administrators Group

Detects addition of users to the local administrator group via "Net" or "Add-LocalGroupMember".

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Florian Roth (Nextron Systems)+1Fri Aug 12windows