Rule Library

Sigma Rules

274 rules found for "discovery"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

User Discovery And Export Via Get-ADUser Cmdlet

Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Fri Sep 09windows
Detectionhightest

PUA - Suspicious ActiveDirectory Enumeration Via AdFind.EXE

Detects active directory enumeration activity using known AdFind CLI flags

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain Account
François HubautMon Dec 13windows
Detectionmediumexperimental

PUA - AdFind.EXE Execution

Detects execution of Adfind.exe utility, which can be used for reconnaissance in an Active Directory environment

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain Account
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 26windows
Detectionhightest

PUA - AdFind Suspicious Execution

Detects AdFind execution with common flags seen used during attacks

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System DiscoveryT1087.002 · Domain AccountT1482 · Domain Trust Discovery+2
Janantha Marasinghe+3Tue Feb 02windows
Detectionmediumtest

PUA - Advanced IP Scanner Execution

Detects the use of Advanced IP Scanner. Seems to be a popular tool for ransomware groups.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service DiscoveryT1135 · Network Share Discovery
Nasreddine Bencherchali (Nextron Systems)Tue May 12windows
Detectionmediumtest

PUA - Advanced Port Scanner Execution

Detects the use of Advanced Port Scanner.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service DiscoveryT1135 · Network Share Discovery
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionhightest

PUA - Crassus Execution

Detects Crassus, a Windows privilege escalation discovery tool, based on PE metadata characteristics.

WindowsProcess Creation
TA0007 · DiscoveryTA0043 · ReconnaissanceT1590.001 · Domain Properties
Martin MuellerMon Apr 17windows
Detectionmediumtest

PUA - SoftPerfect Netscan Execution

Detects usage of SoftPerfect's "netscan.exe". An application for scanning networks. It is actively used in-the-wild by threat actors to inspect and understand the network architecture of a victim.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Thu Apr 25windows
Detectionmediumtest

PUA - NimScan Execution

Detects usage of NimScan, a portscanner utility. In early 2025, adversaries were observed using this utility to scan for open ports on remote hosts in a compromised environment. This rule identifies the execution of NimScan based on the process image name and specific hash values associated with different versions of the tool.

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionmediumtest

PUA - Nmap/Zenmap Execution

Detects usage of namp/zenmap. Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation

WindowsProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
François HubautFri Dec 10windows
Detectionmediumtest

PUA - Process Hacker Execution

Detects the execution of Process Hacker based on binary metadata information (Image, Hash, Imphash, etc). Process Hacker is a tool to view and manipulate processes, kernel options and other low level options. Threat actors abused older vulnerable versions to manipulate system processes.

WindowsProcess Creation
TA0005 · Defense EvasionTA0007 · DiscoveryTA0003 · PersistenceTA0004 · Privilege Escalation+3
Florian Roth (Nextron Systems)Mon Oct 10windows
Detectionhightest

PUA - Seatbelt Execution

Detects the execution of the PUA/Recon tool Seatbelt via PE information of command line parameters

WindowsProcess Creation
TA0007 · DiscoveryT1526 · Cloud Service DiscoveryT1087 · Account DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Oct 18windows
Detectionmediumtest

PUA - System Informer Execution

Detects the execution of System Informer, a task manager tool to view and manipulate processes, kernel options and other low level operations

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationTA0007 · DiscoveryTA0005 · Defense Evasion+3
Florian Roth (Nextron Systems)Mon May 08windows
Detectionmediumexperimental

PUA - TruffleHog Execution

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1083 · File and Directory DiscoveryT1552.001 · Credentials In Files
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24windows
Detectionlowtest

PUA - Adidnsdump Execution

This tool enables enumeration and exporting of all DNS records in the zone for recon purposes of internal networks Python 3 and python.exe must be installed, Usee to Query/modify DNS records for Active Directory integrated DNS via LDAP

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System Discovery
François HubautSat Jan 01windows
Detectionhightest

Exports Critical Registry Keys To a File

Detects the export of a crital Registry key to a file.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1012 · Query Registry
Oddvar Moe+2Mon Oct 12windows
Detectionlowtest

Exports Registry Key To a File

Detects the export of the target Registry key to a file.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1012 · Query Registry
Oddvar Moe+2Wed Oct 07windows
Detectionmediumtest

Windows Recall Feature Enabled Via Reg.EXE

Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by deleting the existing "DisableAIDataAnalysis" value, or setting it to 0. Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.

WindowsProcess Creation
TA0009 · CollectionT1113 · Screen Capture
Sajid Nawaz KhanSun Jun 02windows
Detectionlowtest

Suspicious Query of MachineGUID

Use of reg to get MachineGuid information

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
François HubautSat Jan 01windows
Detectionmediumtest

Potential Configuration And Service Reconnaissance Via Reg.EXE

Detects the usage of "reg.exe" in order to query reconnaissance information from the registry. Adversaries may interact with the Windows registry to gather information about credentials, the system, configuration, and installed software.

WindowsProcess Creation
TA0007 · DiscoveryT1012 · Query RegistryT1007 · System Service Discovery
Timur Zinniatullin+1Mon Oct 21windows
Detectionmediumtest

Detected Windows Software Discovery

Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable.

WindowsProcess Creation
TA0007 · DiscoveryT1518 · Software Discovery
Nikita Nazarov+1Fri Oct 16windows
Detectionmediumexperimental

System Language Discovery via Reg.Exe

Detects the usage of Reg.Exe to query system language settings. Attackers may discover the system language to determine the geographic location of victims, customize payloads for specific regions, or avoid targeting certain locales to evade detection.

WindowsProcess Creation
TA0007 · DiscoveryT1614.001 · System Language Discovery
Marco Pedrinazzi (InTheCyber)Fri Jan 09windows
Detectionlowtest

Discovery of a System Time

Identifies use of various commands to query a systems time. This technique may be used before executing a scheduled task or to discover the time zone of a target system.

WindowsProcess Creation
TA0007 · DiscoveryT1124 · System Time Discovery
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhightest

Renamed AdFind Execution

Detects the use of a renamed Adfind.exe. AdFind continues to be seen across majority of breaches. It is used to domain trust discovery to plan out subsequent steps in the attack chain.

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System DiscoveryT1087.002 · Domain AccountT1482 · Domain Trust Discovery+1
Florian Roth (Nextron Systems)Sun Aug 21windows
Detectionmediumtest

Renamed Remote Utilities RAT (RURAT) Execution

Detects execution of renamed Remote Utilities (RURAT) via Product PE header field

WindowsProcess Creation
TA0005 · Defense EvasionTA0009 · CollectionTA0011 · Command and ControlTA0007 · Discovery+1
Nasreddine Bencherchali (Nextron Systems)Mon Sep 19windows
Detectioncriticaltest

Renamed Whoami Execution

Detects the execution of whoami that has been renamed to a different name to avoid detection

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Thu Aug 12windows
Detectionmediumtest

Potential Suspicious Activity Using SeCEdit

Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy

WindowsProcess Creation
TA0009 · CollectionTA0007 · DiscoveryTA0003 · PersistenceTA0005 · Defense Evasion+16
Janantha MarasingheFri Nov 18windows
Detectionmediumtest

Potentially Suspicious EventLog Recon Activity Using Log Query Utilities

Detects execution of different log query utilities and commands to search and dump the content of specific event logs or look for specific event IDs. This technique is used by threat actors in order to extract sensitive information from events logs such as usernames, IP addresses, hostnames, etc.

WindowsProcess Creation
TA0006 · Credential AccessTA0007 · DiscoveryT1552 · Unsecured CredentialsT1087 · Account Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Sep 09windows
Detectionhightest

Suspicious Reconnaissance Activity Via GatherNetworkInfo.VBS

Detects execution of the built-in script located in "C:\Windows\System32\gatherNetworkInfo.vbs". Which can be used to gather information about the target machine

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1615 · Group Policy DiscoveryT1059.005 · Visual Basic
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionlowtest

Local Accounts Discovery

Local accounts, System Owner/User discovery using operating systems utilities

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User DiscoveryT1087.001 · Local Account
Timur Zinniatullin+2Mon Oct 21windows
Detectionlowtest

Suspicious Network Command

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
François Hubaut+2Tue Dec 07windows
Detectionmediumtest

Suspicious Scan Loop Network

Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0007 · DiscoveryT1018 · Remote System Discovery
François HubautSat Mar 12windows
Detectionmediumtest

Potential Network Sniffing Activity Using Network Tools

Detects potential network sniffing via use of network tools such as "tshark", "windump". Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

WindowsProcess Creation
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
Timur Zinniatullin+2Mon Oct 21windows
Detectionmediumtest

Obfuscated IP Download Activity

Detects use of an encoded/obfuscated version of an IP address (hex, octal...) in an URL combined with a download command

WindowsProcess Creation
TA0007 · Discovery
Florian Roth (Nextron Systems)+1Wed Aug 03windows
Detectionmediumtest

Obfuscated IP Via CLI

Detects usage of an encoded/obfuscated version of an IP address (hex, octal, etc.) via command line

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 03windows
Detectionhightest

WhoAmI as Parameter

Detects a suspicious process command line that uses whoami as first parameter (as e.g. used by EfsPotato)

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Nov 29windows
Detectionmediumtest

Permission Check Via Accesschk.EXE

Detects the usage of the "Accesschk" utility, an access and privilege audit tool developed by SysInternal and often being abused by attacker to verify process privileges

WindowsProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
Teymur Kheirkhabarov+3Tue Oct 13windows
Detectionmediumtest

Active Directory Database Snapshot Via ADExplorer

Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionhightest

Suspicious Active Directory Database Snapshot Via ADExplorer

Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database to a suspicious directory. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

Suspicious Use of PsLogList

Detects usage of the PsLogList utility to dump event log in order to extract admin accounts and perform account discovery or delete events logs

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account DiscoveryT1087.001 · Local AccountT1087.002 · Domain Account
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionmediumtest

Sysinternals PsService Execution

Detects usage of Sysinternals PsService which can be abused for service reconnaissance and tampering

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jun 16windows
Detectionmediumtest

Sysinternals PsSuspend Execution

Detects usage of Sysinternals PsSuspend which can be abused to suspend critical processes

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Mar 23windows
Detectionlowtest

Suspicious Execution of Systeminfo

Detects usage of the "systeminfo" command to retrieve information

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
François HubautSat Jan 01windows
Detectionhightest

Use of W32tm as Timer

When configured with suitable command line arguments, w32tm can act as a delay mechanism

WindowsProcess Creation
TA0007 · DiscoveryT1124 · System Time Discovery
François HubautSun Sep 25windows
Detectionhightest

Chopper Webshell Process Pattern

Detects patterns found in process executions cause by China Chopper like tiny (ASPX) webshells

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)+1Sat Oct 01windows
Detectionhightest

Webshell Hacking Activity Patterns

Detects certain parent child patterns found in cases in which a web shell is used to perform certain credential dumping or exfiltration activities on a compromised system

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)Thu Mar 17windows
Detectionhightest

Webshell Detection With Command Line Keywords

Detects certain command line parameters often used during reconnaissance activity via web shells

WindowsProcess Creation
TA0003 · PersistenceTA0007 · DiscoveryT1505.003 · Web ShellT1018 · Remote System Discovery+2
Florian Roth (Nextron Systems)+5Sun Jan 01windows
Detectionlowtest

Suspicious Where Execution

Adversaries may enumerate browser bookmarks to learn more about compromised hosts. Browser bookmarks may reveal personal information about users (ex: banking sites, interests, social media, etc.) as well as details about internal network resources such as servers, tools/dashboards, or other related infrastructure.

WindowsProcess Creation
TA0007 · DiscoveryT1217 · Browser Information Discovery
François Hubaut+1Mon Dec 13windows