Rule Library

Sigma Rules

351 rules found for "initial-access"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

Mstsc.EXE Execution With Local RDP File

Detects potential RDP connection via Mstsc using a local ".rdp" file

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)+1Tue Apr 18windows
Detectionhightest

Suspicious Mstsc.EXE Execution With Local RDP File

Detects potential RDP connection via Mstsc using a local ".rdp" file located in suspicious locations.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionhightest

Mstsc.EXE Execution From Uncommon Parent

Detects potential RDP connection via Mstsc using a local ".rdp" file located in suspicious locations.

WindowsProcess Creation
TA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionmediumtest

Password Provided In Command Line Of Net.EXE

Detects a when net.exe is called with a password in the command line

WindowsProcess Creation
TA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation+3
Tim Shelton (HAWK.IO)Thu Dec 09windows
Detectionhightest

Suspicious Microsoft OneNote Child Process

Detects suspicious child processes of the Microsoft OneNote application. This may indicate an attempt to execute malicious embedded objects from a .one file.

WindowsProcess Creation
T1566 · PhishingT1566.001 · Spearphishing AttachmentTA0001 · Initial Access
Tim Rauch+2Fri Oct 21windows
Detectionhightest

Suspicious Execution From Outlook Temporary Folder

Detects a suspicious program execution in Outlook temp folder

WindowsProcess Creation
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)Tue Oct 01windows
Detectionhightest

LSA PPL Protection Disabled Via Reg.EXE

Detects the usage of the "reg.exe" utility to disable PPL protection on the LSA process

WindowsProcess Creation
TA0005 · Defense EvasionT1562.010 · Downgrade Attack
Florian Roth (Nextron Systems)Tue Mar 22windows
Detectionhightest

Suspicious Windows Defender Registry Key Tampering Via Reg.EXE

Detects the usage of "reg.exe" to tamper with different Windows Defender registry keys in order to disable some important features related to protection and detection

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)+2Tue Mar 22windows
Detectionmediumtest

Remote Access Tool - AnyDesk Execution With Known Revoked Signing Certificate

Detects the execution of an AnyDesk binary with a version prior to 8.0.8. Prior to version 8.0.8, the Anydesk application used a signing certificate that got compromised by threat actors. Use this rule to detect instances of older versions of Anydesk using the compromised certificate This is recommended in order to avoid attackers leveraging the certificate and signing their binaries to bypass detections.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial Access
Sai Prashanth Pulisetti+1Thu Feb 08windows
Detectionmediumtest

Remote Access Tool - ScreenConnect Installation Execution

Detects ScreenConnect program starts that establish a remote access to a system.

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Florian Roth (Nextron Systems)Thu Feb 11windows
Detectionhightest

Remote Access Tool - ScreenConnect Server Web Shell Execution

Detects potential web shell execution from the ScreenConnect server process.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Jason Rathbun (Blackpoint Cyber)Mon Feb 26windows
Detectionlowtest

Remote Access Tool - Team Viewer Session Started On Windows Host

Detects the command line executed when TeamViewer starts a session started by a remote host. Once a connection has been started, an investigator can verify the connection details by viewing the "incoming_connections.txt" log file in the TeamViewer folder.

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Josh Nickels+1Mon Mar 11windows
Detectionhightest

User Added to Remote Desktop Users Group

Detects addition of users to the local Remote Desktop Users group via "Net" or "Add-LocalGroupMember".

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0008 · Lateral MovementT1133 · External Remote Services+2
Florian Roth (Nextron Systems)Mon Dec 06windows
Detectionmediumtest

Arbitrary Shell Command Execution Via Settingcontent-Ms

The .SettingContent-ms file type was introduced in Windows 10 and allows a user to create "shortcuts" to various Windows 10 setting pages. These files are simply XML and contain paths to various Windows 10 settings binaries.

WindowsProcess Creation
T1204 · User ExecutionT1566.001 · Spearphishing AttachmentTA0002 · ExecutionTA0001 · Initial Access
SreemanFri Mar 13windows
Detectionhightest

Phishing Pattern ISO in Archive

Detects cases in which an ISO files is opend within an archiver like 7Zip or Winrar, which is a sign of phishing as threat actors put small ISO files in archives as email attachments to bypass certain filters and protective measures (mark of web)

WindowsProcess Creation
TA0001 · Initial AccessT1566 · Phishing
Florian Roth (Nextron Systems)Tue Jun 07windows
Detectionhighstable

Suspicious Double Extension File Execution

Detects suspicious use of an .exe extension after a non-executable file extension like .pdf.exe, a set of spaces or underlines to cloak the executable file in spear phishing campaigns

WindowsProcess Creation
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)+2Wed Jun 26windows
Detectionhighexperimental

Suspicious LNK Command-Line Padding with Whitespace Characters

Detects exploitation of LNK file command-line length discrepancy, where attackers hide malicious commands beyond the 260-character UI limit while the actual command-line argument field supports 4096 characters using whitespace padding (e.g., 0x20, 0x09-0x0D). Adversaries insert non-printable whitespace characters (e.g., Line Feed \x0A, Carriage Return \x0D) to pad the visible section of the LNK file, pushing malicious commands past the UI-visible boundary. The hidden payload, executed at runtime but invisible in Windows Explorer properties, enables stealthy execution and evasion—commonly used for social engineering attacks. This rule flags suspicious use of such padding observed in real-world attacks.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1204.002 · Malicious File
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Mar 19windows
Detectionhightest

Terminal Service Process Spawn

Detects a process spawned by the terminal service server process (this could be an indicator for an exploitation of CVE-2019-0708)

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0008 · Lateral MovementT1210 · Exploitation of Remote Services+1
Florian Roth (Nextron Systems)Wed May 22windows
Detectionhightest

Suspicious Process By Web Server Process

Detects potentially suspicious processes being spawned by a web server process which could be the result of a successfully placed web shell or exploitation

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1505.003 · Web ShellT1190 · Exploit Public-Facing Application
Thomas Patzke+4Wed Jan 16windows
Detectionhightest

Suspicious Processes Spawned by WinRM

Detects suspicious processes including shells spawnd from WinRM host process

WindowsProcess Creation
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Thu May 20windows
Detectionmediumtest

Windows Registry Trust Record Modification

Alerts on trust record modification within the registry, indicating usage of macros

WindowsRegistry Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Antonlovesdnb+1Wed Feb 19windows
Detectionhightest

Running Chrome VPN Extensions via the Registry 2 VPN Extension

Running Chrome VPN Extensions via the Registry install 2 vpn extension

WindowsRegistry Set
TA0001 · Initial AccessTA0003 · PersistenceT1133 · External Remote Services
François HubautTue Dec 28windows
Emerging Threatcriticaltest

CVE-2010-5278 Exploitation Attempt

MODx manager - Local File Inclusion:Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2010-5278detection.emerging-threats
Subhash PopuriWed Aug 252010
Emerging Threathightest

Rejetto HTTP File Server RCE

Detects attempts to exploit a Rejetto HTTP File Server (HFS) via CVE-2014-6287

Web Server Log
TA0003 · PersistenceTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationT1505.003 · Web Shell+2
Nasreddine Bencherchali (Nextron Systems)Tue Jul 192014
Emerging Threatmediumtest

Exploit for CVE-2017-0261

Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Thu Feb 222017
Emerging Threatcriticalstable

Droppers Exploiting CVE-2017-11882

Detects exploits that use CVE-2017-11882 to start EQNEDT32.EXE and other sub processes like mshta.exe

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Thu Nov 232017
Emerging Threatcriticaltest

Exploit for CVE-2017-8759

Detects Winword starting uncommon sub process csc.exe as used in exploits for CVE-2017-8759

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Fri Sep 152017
Emerging Threatcriticaltest

Fortinet CVE-2018-13379 Exploitation

Detects CVE-2018-13379 exploitation attempt against Fortinet SSL VPNs

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2018-13379detection.emerging-threats
Bhabesh RajTue Dec 082018
Emerging Threatcriticaltest

Oracle WebLogic Exploit

Detects access to a webshell dropped into a keystore folder on the WebLogic server

Web Server Log
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessTA0003 · PersistenceT1505.003 · Web Shell+2
Florian Roth (Nextron Systems)Sun Jul 222018
Emerging Threatcriticaltest

Pulse Secure Attack CVE-2019-11510

Detects CVE-2019-11510 exploitation attempt - URI contains Guacamole

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2019-11510detection.emerging-threats
Florian Roth (Nextron Systems)Mon Nov 182019
Emerging Threatcriticaltest

Citrix Netscaler Attack CVE-2019-19781

Detects CVE-2019-19781 exploitation attempt against Citrix Netscaler, Application Delivery Controller and Citrix Gateway Attack

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2019-19781detection.emerging-threats
Arnim Rupp+1Thu Jan 022019
Emerging Threatcriticaltest

Confluence Exploitation CVE-2019-3398

Detects the exploitation of the Confluence vulnerability described in CVE-2019-3398

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2019-3398detection.emerging-threats
Florian Roth (Nextron Systems)Tue May 262019
Emerging Threatcriticalstable

Ursnif Malware C2 URL Pattern

Detects Ursnif C2 traffic.

Proxy Log
TA0001 · Initial AccessT1566.001 · Spearphishing AttachmentTA0002 · ExecutionT1204.002 · Malicious File+3
Thomas PatzkeThu Dec 192019
Emerging Threathightest

CVE-2020-0688 Exploitation Attempt

Detects CVE-2020-0688 Exploitation attempts

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2020-0688detection.emerging-threats
NVISOThu Feb 272020
Emerging Threatcriticaltest

CVE-2020-0688 Exchange Exploitation via Web Log

Detects the exploitation of Microsoft Exchange vulnerability as described in CVE-2020-0688

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2020-0688detection.emerging-threats
Florian Roth (Nextron Systems)Sat Feb 292020
Emerging Threathightest

CVE-2020-0688 Exploitation via Eventlog

Detects the exploitation of Microsoft Exchange vulnerability as described in CVE-2020-0688

Windowsapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2020-0688detection.emerging-threats
Florian Roth (Nextron Systems)+1Sat Feb 292020
Emerging Threatcriticaltest

CVE-2020-10148 SolarWinds Orion API Auth Bypass

Detects CVE-2020-10148 SolarWinds Orion API authentication bypass attempts

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2020-10148detection.emerging-threats
Bhabesh Raj+1Sun Dec 272020
Emerging Threathightest

Exploited CVE-2020-10189 Zoho ManageEngine

Detects the exploitation of Zoho ManageEngine Desktop Central Java Deserialization vulnerability reported as CVE-2020-10189

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1059.001 · PowerShell+4
Florian Roth (Nextron Systems)Wed Mar 252020
Emerging Threatcriticaltest

DNS RCE CVE-2020-1350

Detects exploitation of DNS RCE bug reported in CVE-2020-1350 by the detection of suspicious sub process

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1569.002 · Service Execution+2
Florian Roth (Nextron Systems)Wed Jul 152020
Emerging Threathightest

Oracle WebLogic Exploit CVE-2020-14882

Detects exploitation attempts on WebLogic servers

Web Server Log
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial Accesscve.2020-14882detection.emerging-threats
Florian Roth (Nextron Systems)Mon Nov 022020
Emerging Threathightest

TerraMaster TOS CVE-2020-28188

Detects the exploitation of the TerraMaster TOS vulnerability described in CVE-2020-28188

Web Server Log
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial Accesscve.2020-28188detection.emerging-threats
Bhabesh RajMon Jan 252020
Emerging Threathightest

Cisco ASA FTD Exploit CVE-2020-3452

Detects exploitation attempts on Cisco ASA FTD systems exploiting CVE-2020-3452 with a status code of 200 (sccessful exploitation)

Web Server Log
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial Accesscve.2020-3452detection.emerging-threats
Florian Roth (Nextron Systems)Thu Jan 072020
Emerging Threatcriticaltest

CVE-2020-5902 F5 BIG-IP Exploitation Attempt

Detects the exploitation attempt of the vulnerability found in F5 BIG-IP and described in CVE-2020-5902

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2020-5902detection.emerging-threats
Florian Roth (Nextron Systems)Sun Jul 052020
Emerging Threatcriticaltest

Citrix ADS Exploitation CVE-2020-8193 CVE-2020-8195

Detects exploitation attempt against Citrix Netscaler, Application Delivery Controller (ADS) and Citrix Gateway exploiting vulnerabilities reported as CVE-2020-8193 and CVE-2020-8195

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2020-8193cve.2020-8195+1
Florian Roth (Nextron Systems)Fri Jul 102020
Emerging Threatcriticaltest

Arcadyan Router Exploitations

Detects exploitation of vulnerabilities in Arcadyan routers as reported in CVE-2021-20090 and CVE-2021-20091.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-20090cve.2021-20091+1
Bhabesh RajTue Aug 242021
Emerging Threatcriticaltest

Oracle WebLogic Exploit CVE-2021-2109

Detects the exploitation of the WebLogic server vulnerability described in CVE-2021-2109

Web Server Log
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial Accesscve.2021-2109detection.emerging-threats
Bhabesh RajWed Jan 202021
Emerging Threathightest

CVE-2021-21972 VSphere Exploitation

Detects the exploitation of VSphere Remote Code Execution vulnerability as described in CVE-2021-21972

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-21972detection.emerging-threats
Bhabesh RajWed Feb 242021
Emerging Threathightest

CVE-2021-21978 Exploitation Attempt

Detects the exploitation of the VMware View Planner vulnerability described in CVE-2021-21978

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-21978detection.emerging-threats
Bhabesh RajTue Mar 102021