Rule Library

Sigma Rules

888 rules found for "persistence"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Bitsadmin to Uncommon IP Server Address

Detects Bitsadmin connections to IP addresses instead of FQDN names

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)Fri Jun 10web
Detectionhightest

Bitsadmin to Uncommon TLD

Detects Bitsadmin connections to domains with uncommon TLDs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)+1Thu Mar 07web
Detectionhightest

Suspicious Windows Strings In URI

Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication

Web Server Log
TA0003 · PersistenceTA0010 · ExfiltrationT1505.003 · Web Shell
Nasreddine Bencherchali (Nextron Systems)Mon Jun 06web
Detectionhightest

Webshell ReGeorg Detection Via Web Logs

Certain strings in the uri_query field when combined with null referer and null user agent can indicate activity associated with the webshell ReGeorg.

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shell
Cian HeasleyTue Aug 04web
Detectionhightest

Windows Webshell Strings

Detects common commands used in Windows webshells

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+1Sun Feb 19web
Detectionhightest

MSSQL Add Account To Sysadmin Role

Detects when an attacker tries to backdoor the MSSQL server by adding a backdoor account to the sysadmin fixed server role

Windowsapplication
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionhightest

MSSQL Disable Audit Settings

Detects when an attacker calls the "ALTER SERVER AUDIT" or "DROP SERVER AUDIT" transaction in order to delete or disable audit logs on the server

Windowsapplication
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionhightest

MSSQL SPProcoption Set

Detects when the a stored procedure is set or cleared for automatic execution in MSSQL. A stored procedure that is set to automatic execution runs every time an instance of SQL Server is started

Windowsapplication
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionhightest

MSSQL XPCmdshell Suspicious Execution

Detects when the MSSQL "xp_cmdshell" stored procedure is used to execute commands

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionhightest

MSSQL XPCmdshell Option Change

Detects when the MSSQL "xp_cmdshell" stored procedure setting is changed.

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionlowtest

New BITS Job Created Via Bitsadmin

Detects the creation of a new bits job by Bitsadmin

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionlowtest

New BITS Job Created Via PowerShell

Detects the creation of a new bits job by PowerShell

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionmediumtest

BITS Transfer Job Downloading File Potential Suspicious Extension

Detects new BITS transfer job saving local files with potential suspicious extensions

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionhightest

BITS Transfer Job Download From File Sharing Domains

Detects BITS transfer job downloading files from a file sharing domain.

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Tue Jun 28windows
Detectionhightest

BITS Transfer Job Download From Direct IP

Detects a BITS transfer job downloading file(s) from a direct IP address.

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumtest

BITS Transfer Job With Uncommon Or Suspicious Remote TLD

Detects a suspicious download using the BITS client from a FQDN that is unusual. Adversaries may abuse BITS jobs to persistently execute or clean up after malicious payloads.

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Fri Jun 10windows
Detectionhightest

BITS Transfer Job Download To Potential Suspicious Folder

Detects new BITS transfer job where the LocalName/Saved file is stored in a potentially suspicious location

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Tue Jun 28windows
Detectionhightest

CodeIntegrity - Blocked Image/Driver Load For Policy Violation

Detects blocked load events that did not meet the authenticode signing level requirements or violated the code integrity policy.

Windowscodeintegrity-operational
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Nasreddine Bencherchali (Nextron Systems)Thu Nov 10windows
Detectionhightest

CodeIntegrity - Blocked Driver Load With Revoked Certificate

Detects blocked load attempts of revoked drivers

Windowscodeintegrity-operational
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Nasreddine Bencherchali (Nextron Systems)Tue Jun 06windows
Detectionhightest

DNS Server Error Failed Loading the ServerLevelPluginDLL

Detects a DNS server error in which a specified plugin DLL (in registry) could not be loaded

Windowsdns-server
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Florian Roth (Nextron Systems)Mon May 08windows
Detectionmediumtest

ETW Logging/Processing Option Disabled On IIS Server

Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François Hubaut+1Sun Oct 06windows
Detectionhightest

HTTP Logging Disabled On IIS Server

Detects changes to of the IIS server configuration in order to disable HTTP logging for successful requests.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François HubautSun Oct 06windows
Detectionmediumtest

New Module Module Added To IIS Server

Detects the addition of a new module to an IIS server.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François HubautSun Oct 06windows
Detectionlowtest

Previously Installed IIS Module Was Removed

Detects the removal of a previously installed IIS module.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
Nasreddine Bencherchali (Nextron Systems)Sun Oct 06windows
Detectioncriticaltest

Certificate Request Export to Exchange Webserver

Detects a write of an Exchange CSR to an untypical directory or with aspx name suffix which can be used to place a webshell

Windowsmsexchange-management
TA0003 · PersistenceT1505.003 · Web Shell
Max Altgelt (Nextron Systems)Mon Aug 23windows
Detectioncriticaltest

Mailbox Export to Exchange Webserver

Detects a successful export of an Exchange mailbox to untypical directory or with aspx name suffix which can be used to place a webshell or the needed role assignment for it

Windowsmsexchange-management
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+2Mon Aug 09windows
Detectionhightest

Exchange Set OabVirtualDirectory ExternalUrl Property

Rule to detect an adversary setting OabVirtualDirectory External URL property to a script in Exchange Management log

Windowsmsexchange-management
TA0003 · PersistenceT1505.003 · Web Shell
Jose RodriguezMon Mar 15windows
Detectionmediumtest

MSExchange Transport Agent Installation - Builtin

Detects the Installation of a Exchange Transport Agent

Windowsmsexchange-management
TA0003 · PersistenceT1505.002 · Transport Agent
Tobias MichalskiTue Jun 08windows
Detectionhightest

Failed MSExchange Transport Agent Installation

Detects a failed installation of a Exchange Transport Agent

Windowsmsexchange-management
TA0003 · PersistenceT1505.002 · Transport Agent
Tobias MichalskiTue Jun 08windows
Detectionlowtest

Admin User Remote Logon

Detect remote login by Administrator user (depending on internal pattern).

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0008 · Lateral Movement+5
juju4Sun Oct 29windows
Detectionlowstable

A Member Was Added to a Security-Enabled Global Group

Detects activity when a member is added to a security-enabled global group

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Alexandr Yampolskyi+1Wed Apr 26windows
Detectionlowstable

A Member Was Removed From a Security-Enabled Global Group

Detects activity when a member is removed from a security-enabled global group

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Alexandr Yampolskyi+1Wed Apr 26windows
Detectionlowstable

A Security-Enabled Global Group Was Deleted

Detects activity when a security-enabled global group is deleted

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Alexandr Yampolskyi+1Wed Apr 26windows
Detectionmediumtest

External Remote RDP Logon from Public IP

Detects successful logon from public IP address via RDP. This can indicate a publicly-exposed RDP port.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
Micah Babinski+1Thu Jan 19windows
Detectionhightest

External Remote SMB Logon from Public IP

Detects successful logon from public IP address via SMB. This can indicate a publicly-exposed SMB port.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
Micah Babinski+1Thu Jan 19windows
Detectionmediumtest

Failed Logon From Public IP

Detects a failed logon attempt from a public IP. A login from a public IP can indicate a misconfigured firewall or network boundary.

Windowssecurity
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+3
NVISOWed May 06windows
Detectionhightest

Powerview Add-DomainObjectAcl DCSync AD Extend Right

Backdooring domain object to grant the rights associated with DCSync to a regular user or machine account using Powerview\Add-DomainObjectAcl DCSync Extended Right cmdlet, will allow to re-obtain the pwd hashes of any user/computer

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Samir Bousseaden+4Wed Apr 03windows
Detectionhightest

Enabled User Right in AD to Control User Objects

Detects scenario where if a user is assigned the SeEnableDelegationPrivilege right in Active Directory it would allow control of other AD user objects.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
@neu5ronSun Jul 30windows
Detectionhightest

Active Directory User Backdoors

Detects scenarios where one can control another users or computers account without having to use their credentials.

Windowssecurity
TA0004 · Privilege EscalationT1098 · Account ManipulationTA0003 · Persistence
@neu5ronThu Apr 13windows
Detectionmediumtest

Remote Task Creation via ATSVC Named Pipe

Detects remote task creation via at.exe or API interacting with ATSVC namedpipe

Windowssecurity
TA0004 · Privilege EscalationTA0002 · ExecutionTA0008 · Lateral MovementTA0003 · Persistence+3
Samir BousseadenWed Apr 03windows
Detectionhightest

CobaltStrike Service Installations - Security

Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement

Windowssecurity
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationTA0008 · Lateral Movement+3
Florian Roth (Nextron Systems)+1Wed May 26windows
Detectionhightest

ETW Logging Disabled In .NET Processes - Registry

Potential adversaries stopping ETW providers recording loaded .NET assemblies.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify RegistryT1562 · Impair Defenses
Roberto Rodriguez (Cyb3rWard0g)+1Fri Jun 05windows
Detectionhightest

Persistence and Execution at Scale via GPO Scheduled Task

Detect lateral movement using GPO scheduled task, usually used to deploy ransomware at scale

Windowssecurity
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0008 · Lateral Movement+1
Samir BousseadenWed Apr 03windows
Detectionhightest

Hidden Local User Creation

Detects the creation of a local hidden user account which should not happen for event ID 4720.

Windowssecurity
TA0003 · PersistenceT1136.001 · Local Account
Christian Burkard (Nextron Systems)Mon May 03windows
Detectionhightest

HybridConnectionManager Service Installation

Rule to detect the Hybrid Connection Manager service installation.

Windowssecurity
TA0003 · PersistenceT1554 · Compromise Host Software Binary
Roberto Rodriguez (Cyb3rWard0g)+1Mon Apr 12windows
Detectionhighexperimental

Potential Kerberos Coercion by Spoofing SPNs via DNS Manipulation

Detects modifications to DNS records in Active Directory where the Distinguished Name (DN) contains a base64-encoded blob matching the pattern "1UWhRCAAAAA...BAAAA". This pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, commonly used in Kerberos coercion attacks. Adversaries may exploit this to coerce victim systems into authenticating to attacker-controlled hosts by spoofing SPNs via DNS. It is one of the strong indicators of a Kerberos coercion attack,. where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073. Please investigate the user account that made the changes, as it is likely a low-privileged account that has been compromised.

Windowssecurity
TA0009 · CollectionTA0006 · Credential AccessT1557.003 · DHCP SpoofingTA0003 · Persistence+1
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20windows
Detectionhightest

NetNTLM Downgrade Attack

Detects NetNTLM downgrade attack

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1112 · Modify Registry
Florian Roth (Nextron Systems)+1Tue Mar 20windows
Detectionmediumtest

Windows Network Access Suspicious desktop.ini Action

Detects unusual processes accessing desktop.ini remotely over network share, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
Tim Shelton (HAWK.IO)Mon Dec 06windows