Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

User Added To Highly Privileged Group

Detects addition of users to highly privileged groups via "Net" or "Add-LocalGroupMember".

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Nasreddine Bencherchali (Nextron Systems)Fri Feb 23windows
Detectionhightest

User Added to Remote Desktop Users Group

Detects addition of users to the local Remote Desktop Users group via "Net" or "Add-LocalGroupMember".

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0008 · Lateral MovementT1133 · External Remote Services+2
Florian Roth (Nextron Systems)Mon Dec 06windows
Detectionmediumtest

Execute From Alternate Data Streams

Detects execution from an Alternate Data Stream (ADS). Adversaries may use NTFS file attributes to hide their malicious data in order to evade detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautWed Sep 01windows
Detectionmediumtest

Always Install Elevated Windows Installer

Detects Windows Installer service (msiexec.exe) trying to install MSI packages with SYSTEM privilege

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Teymur Kheirkhabarov+2Tue Oct 13windows
Detectionmediumtest

Potentially Suspicious Windows App Activity

Detects potentially suspicious child process of applications launched from inside the WindowsApps directory. This could be a sign of a rogue ".appx" package installation/execution

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jan 12windows
Detectionmediumtest

Arbitrary Shell Command Execution Via Settingcontent-Ms

The .SettingContent-ms file type was introduced in Windows 10 and allows a user to create "shortcuts" to various Windows 10 setting pages. These files are simply XML and contain paths to various Windows 10 settings binaries.

WindowsProcess Creation
T1204 · User ExecutionT1566.001 · Spearphishing AttachmentTA0002 · ExecutionTA0001 · Initial Access
SreemanFri Mar 13windows
Detectionhightest

Phishing Pattern ISO in Archive

Detects cases in which an ISO files is opend within an archiver like 7Zip or Winrar, which is a sign of phishing as threat actors put small ISO files in archives as email attachments to bypass certain filters and protective measures (mark of web)

WindowsProcess Creation
TA0001 · Initial AccessT1566 · Phishing
Florian Roth (Nextron Systems)Tue Jun 07windows
Detectionmediumtest

Automated Collection Command Prompt

Once established within a system or network, an adversary may use automated techniques for collecting internal data.

WindowsProcess Creation
TA0009 · CollectionT1119 · Automated CollectionTA0006 · Credential AccessT1552.001 · Credentials In Files
François HubautWed Jul 28windows
Detectionhightest

Bad Opsec Defaults Sacrificial Processes With Improper Arguments

Detects attackers using tooling with bad opsec defaults. E.g. spawning a sacrificial process to inject a capability into the process without taking into account how the process is normally run. One trivial example of this is using rundll32.exe without arguments as a sacrificial process (default in CS, now highlighted by c2lint), running WerFault without arguments (Kraken - credit am0nsec), and other examples.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Oleg Kolesnikov invrep_de+3Fri Oct 23windows
Detectionmediumtest

Potential Suspicious Browser Launch From Document Reader Process

Detects when a browser process or browser tab is launched from an application that handles document files such as Adobe, Microsoft Office, etc. And connects to a web application over http(s), this could indicate a possible phishing attempt.

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious File
Joseph KamauMon May 27windows
Detectionhightest

Suspicious Child Process Created as System

Detection of child processes spawned with SYSTEM privileges by parents with LOCAL SERVICE or NETWORK SERVICE accounts

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.002 · Create Process with Token
Teymur Kheirkhabarov+2Sat Oct 26windows
Detectionmediumtest

Potential Commandline Obfuscation Using Escape Characters

Detects potential commandline obfuscation using known escape characters

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
juju4Tue Dec 11windows
Detectionhightest

Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image

Detects potential commandline obfuscation using unicode characters. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
François Hubaut+2Mon Sep 02windows
Detectionmediumtest

Potential Command Line Path Traversal Evasion Attempt

Detects potential evasion or obfuscation attempts using bogus path traversal via the commandline

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Christian Burkard (Nextron Systems)Tue Oct 26windows
Detectionmediumtest

Potential Browser Data Stealing

Adversaries may acquire credentials from web browsers by reading files specific to the target browser. Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store.

WindowsProcess Creation
TA0006 · Credential AccessT1555.003 · Credentials from Web Browsers
Nasreddine Bencherchali (Nextron Systems)Fri Dec 23windows
Detectionmediumtest

Copy From Or To Admin Share Or Sysvol Folder

Detects a copy command or a copy utility execution to or from an Admin share or remote

WindowsProcess Creation
TA0008 · Lateral MovementTA0009 · CollectionTA0010 · ExfiltrationT1039 · Data from Network Shared Drive+2
Florian Roth (Nextron Systems)+4Mon Dec 30windows
Detectionmediumtest

Suspicious Copy From or To System Directory

Detects a suspicious copy operation that tries to copy a program from system (System32, SysWOW64, WinSxS) directories to another on disk. Often used to move LOLBINs such as 'certutil' or 'desktopimgdownldr' to a different location with a different name in order to bypass detections based on locations.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Florian Roth (Nextron Systems)+3Fri Jul 03windows
Detectionhightest

LOL-Binary Copied From System Directory

Detects a suspicious copy operation that tries to copy a known LOLBIN from system (System32, SysWOW64, WinSxS) directories to another on disk in order to bypass detections based on locations.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Nasreddine Bencherchali (Nextron Systems)Tue Aug 29windows
Detectionhightest

Potential Data Exfiltration Activity Via CommandLine Tools

Detects the use of various CLI utilities exfiltrating data via web requests

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionhightest

Raccine Uninstall

Detects commands that indicate a Raccine removal from an end system. Raccine is a free ransomware protection tool.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Thu Jan 21windows
Detectionhightest

Suspicious Parent Double Extension File Execution

Detect execution of suspicious double extension files in ParentCommandLine

WindowsProcess Creation
TA0005 · Defense EvasionT1036.007 · Double File Extension
François Hubaut+1Fri Jan 06windows
Detectionhightest

Suspicious Download from Office Domain

Detects suspicious ways to download files from Microsoft domains that are used to store attachments in Emails or OneNote documents

WindowsProcess Creation
TA0011 · Command and ControlTA0042 · Resource DevelopmentT1105 · Ingress Tool TransferT1608 · Stage Capabilities
Florian Roth (Nextron Systems)+1Mon Dec 27windows
Detectioncriticaltest

DumpStack.log Defender Evasion

Detects the use of the filename DumpStack.log to evade Microsoft Defender

WindowsProcess Creation
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Thu Jan 06windows
Detectionmediumtest

Always Install Elevated MSI Spawned Cmd And Powershell

Detects Windows Installer service (msiexec.exe) spawning "cmd" or "powershell"

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Teymur Kheirkhabarov+2Tue Oct 13windows
Detectionmediumtest

Suspicious Electron Application Child Processes

Detects suspicious child processes of electron apps (teams, discord, slack, etc.). This could be a potential sign of ".asar" file tampering (See reference section for more information) or binary execution proxy through specific CLI arguments (see related rule)

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Oct 21windows
Detectionmediumtest

Potentially Suspicious Electron Application CommandLine

Detects potentially suspicious CommandLine of electron apps (teams, discord, slack, etc.). This could be a sign of abuse to proxy execution through a signed binary.

WindowsProcess Creation
TA0002 · Execution
François Hubaut+1Tue Sep 05windows
Detectionmediumtest

Elevated System Shell Spawned From Uncommon Parent Location

Detects when a shell program such as the Windows command prompt or PowerShell is launched with system privileges from a uncommon parent location.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
François Hubaut+1Mon Dec 05windows
Detectionmediumtest

Hidden Powershell in Link File Pattern

Detects events that appear when a user click on a link file with a powershell command in it

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
François HubautSun Feb 06windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 1

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 2

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 3

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 4

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

ETW Logging Tamper In .NET Processes Via CommandLine

Detects changes to environment variables related to ETW logging via the CommandLine. This could indicate potential adversaries stopping ETW providers recording loaded .NET assemblies.

WindowsProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defenses
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

ETW Trace Evasion Activity

Detects command line activity that tries to clear or disable any ETW trace log which could be a sign of logging evasion.

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562.006 · Indicator Blocking2016-04-002 · CAR 2016-04-002
@neu5ron+3Fri Mar 22windows
Detectionmediumtest

Potentially Suspicious EventLog Recon Activity Using Log Query Utilities

Detects execution of different log query utilities and commands to search and dump the content of specific event logs or look for specific event IDs. This technique is used by threat actors in order to extract sensitive information from events logs such as usernames, IP addresses, hostnames, etc.

WindowsProcess Creation
TA0006 · Credential AccessTA0007 · DiscoveryT1552 · Unsecured CredentialsT1087 · Account Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Sep 09windows
Detectionhightest

Potentially Suspicious Execution From Parent Process In Public Folder

Detects a potentially suspicious execution of a parent process located in the "\Users\Public" folder executing a child process containing references to shell or scripting binaries and commandlines.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1564 · Hide ArtifactsT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Fri Feb 25windows
Detectionhightest

Process Execution From A Potentially Suspicious Folder

Detects a potentially suspicious execution from an uncommon folder.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+1Wed Jan 16windows
Detectionmediumtest

Suspicious File Characteristics Due to Missing Fields

Detects Executables in the Downloads folder without FileVersion,Description,Product,Company likely created with py2exe

WindowsProcess Creation
TA0002 · ExecutionT1059.006 · Python
Markus Neis+1Thu Nov 22windows
Detectionhightest

Suspicious Reconnaissance Activity Via GatherNetworkInfo.VBS

Detects execution of the built-in script located in "C:\Windows\System32\gatherNetworkInfo.vbs". Which can be used to gather information about the target machine

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1615 · Group Policy DiscoveryT1059.005 · Visual Basic
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream - CLI

Detects command line containing reference to the "::$index_allocation" stream, which can be used as a technique to prevent access to folders or files from tooling such as "explorer.exe" or "powershell.exe"

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Nasreddine Bencherchali (Nextron Systems)+1Mon Oct 09windows
Detectionmediumtest

Writing Of Malicious Files To The Fonts Folder

Monitors for the hiding possible malicious files in the C:\Windows\Fonts\ location. This folder doesn't require admin privillege to be written and executed from.

WindowsProcess Creation
T1211 · Exploitation for Defense EvasionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionTA0003 · Persistence+1
SreemanTue Apr 21windows
Detectionmediumtest

Potential Homoglyph Attack Using Lookalike Characters

Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters. This is used as an obfuscation and masquerading techniques. Only "perfect" homoglyphs are included; these are characters that are indistinguishable from ASCII characters and thus may make excellent candidates for homoglyph attack characters.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1036.003 · Rename System Utilities
Micah BabinskiSun May 07windows
Detectionhightest

Execution Of Non-Existing File

Checks whether the image specified in a process creation event is not a full, absolute path (caused by process ghosting or other unorthodox methods to start a process)

WindowsProcess Creation
TA0005 · Defense Evasion
Max Altgelt (Nextron Systems)Thu Dec 09windows
Detectionhightest

Base64 MZ Header In CommandLine

Detects encoded base64 MZ header in the commandline

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionhightest

Potential WinAPI Calls Via CommandLine

Detects the use of WinAPI Functions via the commandline. As seen used by threat actors via the tool winapiexec

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native API
Nasreddine Bencherchali (Nextron Systems)Tue Sep 06windows
Detectionmediumtest

Potentially Suspicious JWT Token Search Via CLI

Detects potentially suspicious search for JWT tokens via CLI by looking for the string "eyJ0eX" or "eyJhbG". JWT tokens are often used for access-tokens across various applications and services like Microsoft 365, Azure, AWS, Google Cloud, and others. Threat actors may search for these tokens to steal them for lateral movement or privilege escalation.

WindowsProcess Creation
TA0006 · Credential AccessT1528 · Steal Application Access TokenT1552.001 · Credentials In Files
Nasreddine Bencherchali (Nextron Systems)+1Tue Oct 25windows
Detectionlowtest

Local Accounts Discovery

Local accounts, System Owner/User discovery using operating systems utilities

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User DiscoveryT1087.001 · Local Account
Timur Zinniatullin+2Mon Oct 21windows
Detectionmediumtest

LOLBIN Execution From Abnormal Drive

Detects LOLBINs executing from an abnormal or uncommon drive such as a mounted ISO.

WindowsProcess Creation
TA0005 · Defense Evasion
Christopher Peacock+3Tue Jan 25windows