Rule Library

Sigma Rules

2,824 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectioncriticaltest

Win Susp Computer Name Containing Samtheadmin

Detects suspicious computer name samtheadmin-{1..100}$ generated by hacktool

Windowssecurity
TA0001 · Initial AccessTA0005 · Defense Evasioncve.2021-42278cve.2021-42287+3
elhoimFri Sep 09windows
Detectionhighstable

Password Change on Directory Service Restore Mode (DSRM) Account

Detects potential attempts made to set the Directory Services Restore Mode administrator password. The Directory Service Restore Mode (DSRM) account is a local administrator account on Domain Controllers. Attackers may change the password in order to obtain persistence.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Thomas PatzkeSun Feb 19windows
Detectionmediumtest

Account Tampering - Suspicious Failed Logon Reasons

This method uses uncommon error codes on failed logons to determine suspicious activity and tampering with accounts that have been disabled or somehow restricted.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0001 · Initial Access+1
Florian Roth (Nextron Systems)Sun Feb 19windows
Detectionmediumtest

Group Policy Abuse for Privilege Addition

Detects the first occurrence of a modification to Group Policy Object Attributes to add privileges to user accounts or use them to add users as local admins.

Windowssecurity
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
Elastic Security+2Wed Sep 04windows
Detectionmediumtest

Startup/Logon Script Added to Group Policy Object

Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification+1
Elastic Security+2Fri Sep 06windows
Detectionhightest

Kerberos Manipulation

Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.

Windowssecurity
TA0006 · Credential AccessT1212 · Exploitation for Credential Access
Florian Roth (Nextron Systems)Fri Feb 10windows
Detectionhightest

Suspicious LDAP-Attributes Used

Detects the usage of particular AttributeLDAPDisplayNames, which are known for data exchange via LDAP by the tool LDAPFragger and are additionally not commonly used in companies.

Windowssecurity
T1001.003 · Protocol ImpersonationTA0011 · Command and Control
xknowSun Mar 24windows
Detectionhightest

Suspicious Windows ANONYMOUS LOGON Local Account Created

Detects the creation of suspicious accounts similar to ANONYMOUS LOGON, such as using additional spaces. Created as an covering detection for exclusion of Logon Type 3 from ANONYMOUS LOGON accounts.

Windowssecurity
TA0003 · PersistenceT1136.001 · Local AccountT1136.002 · Domain Account
James PembertonThu Oct 31windows
Detectionmediumtest

Suspicious Remote Logon with Explicit Credentials

Detects suspicious processes logging on with explicit credentials

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+2
oscd.community+3Mon Oct 05windows
Detectionhightest

Password Dumper Activity on LSASS

Detects process handle on LSASS process with certain access mask and object type SAM_DOMAIN

Windowssecurity
TA0006 · Credential AccessT1003.001 · LSASS Memory
sigmaSun Feb 12windows
Detectionmediumtest

Potentially Suspicious AccessMask Requested From LSASS

Detects process handle on LSASS process with certain access mask

Windowssecurity
TA0006 · Credential Access2019-04-004 · CAR 2019-04-004T1003.001 · LSASS Memory
Roberto Rodriguez (Cyb3rWard0g)+5Fri Nov 01windows
Detectionhightest

Reconnaissance Activity

Detects activity as "net user administrator /domain" and "net group domain admins /domain"

Windowssecurity
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsS0039 · S0039
Florian Roth (Nextron Systems)+3Tue Mar 07windows
Detectionmediumtest

Password Protected ZIP File Opened

Detects the extraction of password protected ZIP archives. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Mon May 09windows
Detectionhightest

Password Protected ZIP File Opened (Suspicious Filenames)

Detects the extraction of password protected ZIP archives with suspicious file names. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0011 · Command and ControlTA0005 · Defense EvasionT1027 · Obfuscated Files or InformationT1105 · Ingress Tool Transfer+1
Florian Roth (Nextron Systems)Mon May 09windows
Detectionhightest

Password Protected ZIP File Opened (Email Attachment)

Detects the extraction of password protected ZIP archives. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0005 · Defense EvasionTA0001 · Initial AccessT1027 · Obfuscated Files or InformationT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)Mon May 09windows
Detectionmediumtest

Uncommon Outbound Kerberos Connection - Security

Detects uncommon outbound network activity via Kerberos default port indicating possible lateral movement or first stage PrivEsc via delegation.

Windowssecurity
TA0008 · Lateral MovementTA0006 · Credential AccessT1558.003 · Kerberoasting
Ilyas Ochkov+1Thu Oct 24windows
Detectionhightest

Possible Shadow Credentials Added

Detects possible addition of shadow credentials to an active directory object.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556 · Modify Authentication Process
Nasreddine Bencherchali (Nextron Systems)+1Mon Oct 17windows
Detectionhightest

Suspicious PsExec Execution

detects execution of psexec or paexec with renamed service name, this rule helps to filter out the noise if psexec is used for legit purposes or if attacker uses a different psexec client other than sysinternal one

Windowssecurity
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Samir BousseadenWed Apr 03windows
Detectionmediumtest

Suspicious Access to Sensitive File Extensions

Detects known sensitive file extensions accessed on a network share

Windowssecurity
TA0009 · CollectionT1039 · Data from Network Shared Drive
Samir BousseadenWed Apr 03windows
Detectionmediumtest

Suspicious Kerberos RC4 Ticket Encryption

Detects service ticket requests using RC4 encryption type

Windowssecurity
TA0006 · Credential AccessT1558.003 · Kerberoasting
Florian Roth (Nextron Systems)Mon Feb 06windows
Detectionhightest

Suspicious Scheduled Task Creation

Detects suspicious scheduled task creation events. Based on attributes such as paths, commands line flags, etc.

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Dec 05windows
Detectionhightest

Important Scheduled Task Deleted/Disabled

Detects when adversaries stop services or processes by deleting or disabling their respective scheduled tasks in order to conduct data destructive activities

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Dec 05windows
Detectionhightest

Suspicious Scheduled Task Update

Detects update to a scheduled task event that contain suspicious keywords.

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Dec 05windows
Detectionlowtest

Unauthorized System Time Modification

Detect scenarios where a potentially unauthorized application or user is modifying the system time.

Windowssecurity
TA0005 · Defense EvasionT1070.006 · Timestomp
@neu5ronTue Feb 05windows
Detectionmediumtest

Remote Service Activity via SVCCTL Named Pipe

Detects remote service activity via remote access to the svcctl named pipe

Windowssecurity
TA0008 · Lateral MovementTA0003 · PersistenceT1021.002 · SMB/Windows Admin Shares
Samir BousseadenWed Apr 03windows
Detectionhightest

SysKey Registry Keys Access

Detects handle requests and access operations to specific registry keys to calculate the SysKey

Windowssecurity
TA0007 · DiscoveryT1012 · Query Registry
Roberto Rodriguez (Cyb3rWard0g)Mon Aug 12windows
Detectionhightest

Sysmon Channel Reference Deletion

Potential threat actor tampering with Sysmon manifest and eventually disabling it

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Tue Jul 14windows
Detectionlowtest

Tap Driver Installation - Security

Detects the installation of a well-known TAP driver service. This could be a sign of potential preparation for data exfiltration using tunnelling techniques.

Windowssecurity
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Daniil Yugoslavskiy+2Thu Oct 24windows
Detectionhightest

Suspicious Teams Application Related ObjectAcess Event

Detects an access to authentication tokens and accounts of Microsoft Teams desktop application.

Windowssecurity
TA0006 · Credential AccessT1528 · Steal Application Access Token
@serkinvaleryFri Sep 16windows
Detectionmediumtest

Transferring Files with Credential Data via Network Shares

Transferring files with well-known filenames (sensitive files with credential data) using network shares

Windowssecurity
TA0006 · Credential AccessT1003.002 · Security Account ManagerT1003.001 · LSASS MemoryT1003.003 · NTDS
Teymur Kheirkhabarov+1Tue Oct 22windows
Detectionmediumstable

User Added to Local Administrator Group

Detects the addition of a new member to the local administrator group, which could be legitimate activity or a sign of privilege escalation activity

Windowssecurity
TA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationT1078 · Valid Accounts+2
Florian Roth (Nextron Systems)Tue Mar 14windows
Detectionhightest

User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'

The 'LsaRegisterLogonProcess' function verifies that the application making the function call is a logon process by checking that it has the SeTcbPrivilege privilege set. Possible Rubeus tries to get a handle to LSA.

Windowssecurity
TA0006 · Credential AccessTA0008 · Lateral MovementTA0004 · Privilege EscalationT1558.003 · Kerberoasting
Roberto Rodriguez (Cyb3rWard0g)+2Thu Oct 24windows
Detectionlowtest

Local User Creation

Detects local user creation on Windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your Windows server logs and not on your DC logs.

Windowssecurity
TA0003 · PersistenceT1136.001 · Local Account
Patrick BareissThu Apr 18windows
Detectionmediumtest

Potential Privileged System Service Operation - SeLoadDriverPrivilege

Detects the usage of the 'SeLoadDriverPrivilege' privilege. This privilege is required to load or unload a device driver. With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers. This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
xknow+1Mon Apr 08windows
Detectioninformationaltest

User Logoff Event

Detects a user log-off activity. Could be used for example to correlate information during forensic investigations

Windowssecurity
TA0040 · ImpactT1531 · Account Access Removal
François HubautFri Oct 14windows
Detectioninformationaltest

VSSAudit Security Event Source Registration

Detects the registration of the security event source VSSAudit. It would usually trigger when volume shadow copy operations happen.

Windowssecurity
TA0006 · Credential AccessT1003.002 · Security Account Manager
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectionmediumtest

Windows Defender Exclusion List Modified

Detects modifications to the Windows Defender exclusion registry key. This could indicate a potentially suspicious or even malicious activity by an attacker trying to add a new exclusion in order to bypass security.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
@barryshooshoogaSat Oct 26windows
Detectionmediumtest

Windows Defender Exclusion Registry Key - Write Access Requested

Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
@barryshooshooga+1Sat Oct 26windows
Detectionhightest

T1047 Wmiprvse Wbemcomn DLL Hijack

Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory over the network for a WMI DLL Hijack scenario.

Windowssecurity
TA0002 · ExecutionT1047 · Windows Management InstrumentationTA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Roberto Rodriguez (Cyb3rWard0g)+1Mon Oct 12windows
Detectionmediumtest

WMI Persistence - Security

Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs.

Windowssecurity
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)+2Tue Aug 22windows
Detectioninformationalstable

Locked Workstation

Detects locked workstation session events that occur automatically after a standard period of inactivity.

Windowssecurity
TA0040 · Impact
Alexandr Yampolskyi+1Tue Mar 26windows
Detectionhightest

Microsoft Defender Blocked from Loading Unsigned DLL

Detects Code Integrity (CI) engine blocking Microsoft Defender's processes (MpCmdRun and NisSrv) from loading unsigned DLLs which may be an attempt to sideload arbitrary DLL

Windowssecurity-mitigations
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Bhabesh RajTue Aug 02windows
Detectionhightest

Unsigned Binary Loaded From Suspicious Location

Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations

Windowssecurity-mitigations
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Wed Aug 03windows
Detectionhightest

HybridConnectionManager Service Running

Rule to detect the Hybrid Connection Manager service running on an endpoint.

Windowsmicrosoft-servicebus-client
TA0003 · PersistenceT1554 · Compromise Host Software Binary
Roberto Rodriguez (Cyb3rWard0g)+1Mon Apr 12windows
Detectionmediumtest

Suspicious Application Installed

Detects suspicious application installed by looking at the added shortcut to the app resolver cache

Windowsshell-core
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Sun Aug 14windows
Detectionmediumtest

Suspicious Rejected SMB Guest Logon From IP

Detect Attempt PrintNightmare (CVE-2021-1675) Remote code execution in Windows Spooler Service

Windowssmbclient-security
TA0006 · Credential AccessT1110.001 · Password Guessing
Florian Roth (Nextron Systems)+2Wed Jun 30windows
Detectionmediumexperimental

Unsigned or Unencrypted SMB Connection to Share Established

Detects SMB server connections to shares without signing or encryption enabled. This could indicate potential lateral movement activity using unsecured SMB shares.

Windowssmbserver-connectivity
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Mohamed AbdelghaniSun Oct 19windows
Detectionhightest

Sysmon Application Crashed

Detects application popup reporting a failure of the Sysmon service

Windowssystem
TA0005 · Defense EvasionT1562 · Impair Defenses
Tim SheltonTue Apr 26windows