Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

LSASS Dump Keyword In CommandLine

Detects the presence of the keywords "lsass" and ".dmp" in the commandline, which could indicate a potential attempt to dump or create a dump of the lsass process.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
E.M. Anhaus+3Thu Oct 24windows
Detectionmediumtest

Potential File Download Via MS-AppInstaller Protocol Handler

Detects usage of the "ms-appinstaller" protocol handler via command line to potentially download arbitrary files via AppInstaller.EXE The downloaded files are temporarly stored in ":\Users\%username%\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\INetCache\<RANDOM-8-CHAR-DIRECTORY>"

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Thu Nov 09windows
Detectionlowtest

Suspicious Network Command

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
François Hubaut+2Tue Dec 07windows
Detectionmediumtest

Suspicious Scan Loop Network

Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0007 · DiscoveryT1018 · Remote System Discovery
François HubautSat Mar 12windows
Detectionmediumtest

Potential Network Sniffing Activity Using Network Tools

Detects potential network sniffing via use of network tools such as "tshark", "windump". Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

WindowsProcess Creation
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
Timur Zinniatullin+2Mon Oct 21windows
Detectionmediumtest

Process Launched Without Image Name

Detect the use of processes with no name (".exe"), which can be used to evade Image-based detections.

WindowsProcess Creation
TA0005 · Defense Evasion
Matt Anderson (Huntress)Tue Jul 23windows
Detectionmediumtest

Execution of Suspicious File Type Extension

Detects whether the image specified in a process creation event doesn't refer to an ".exe" (or other known executable extension) file. This can be caused by process ghosting or other unorthodox methods to start a process. This rule might require some initial baselining to align with some third party tooling in the user environment.

WindowsProcess Creation
TA0005 · Defense Evasion
Max Altgelt (Nextron Systems)Thu Dec 09windows
Detectionhightest

Non-privileged Usage of Reg or Powershell

Search for usage of reg or Powershell by non-privileged users to modify service configuration in registry

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Teymur Kheirkhabarov+2Mon Oct 05windows
Detectionhightest

Suspicious Process Patterns NTDS.DIT Exfil

Detects suspicious process patterns used in NTDS.DIT exfiltration

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Fri Mar 11windows
Detectionhightest

Potentially Suspicious Call To Win32_NTEventlogFile Class

Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 13windows
Detectionmediumtest

Use Short Name Path in Image

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Sun Aug 07windows
Detectionmediumtest

Use NTFS Short Name in Command Line

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid command-line detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Fri Aug 05windows
Detectionmediumtest

Use NTFS Short Name in Image

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image based detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Sat Aug 06windows
Detectionmediumtest

Obfuscated IP Download Activity

Detects use of an encoded/obfuscated version of an IP address (hex, octal...) in an URL combined with a download command

WindowsProcess Creation
TA0007 · Discovery
Florian Roth (Nextron Systems)+1Wed Aug 03windows
Detectionmediumtest

Obfuscated IP Via CLI

Detects usage of an encoded/obfuscated version of an IP address (hex, octal, etc.) via command line

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 03windows
Detectionhightest

Suspicious Process Parents

Detects suspicious parent processes that should not have any children or should only have a single possible child program

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)Mon Mar 21windows
Detectionhightest

Potential PowerShell Execution Via DLL

Detects potential PowerShell execution from a DLL instead of the usual PowerShell process as seen used in PowerShdll. This detection assumes that PowerShell commands are passed via the CommandLine.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Markus Neis+1Sat Aug 25windows
Detectionhightest

Privilege Escalation via Named Pipe Impersonation

Detects a remote file copy attempt to a hidden network share. This may indicate lateral movement or data staging activity.

WindowsProcess Creation
TA0008 · Lateral MovementT1021 · Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionmediumtest

Private Keys Reconnaissance Via CommandLine Tools

Adversaries may search for private key certificate files on compromised systems for insecurely stored credential

WindowsProcess Creation
TA0006 · Credential AccessT1552.004 · Private Keys
François Hubaut+1Tue Jul 20windows
Detectionmediumtest

Suspicious RunAs-Like Flag Combination

Detects suspicious command line flags that let the user set a target user and command as e.g. seen in PsExec-like tools

WindowsProcess Creation
TA0004 · Privilege Escalation
Florian Roth (Nextron Systems)Fri Nov 11windows
Detectionlowtest

Windows Processes Suspicious Parent Directory

Detect suspicious parent processes of well-known Windows processes

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System UtilitiesT1036.005 · Match Legitimate Name or Location
vburovSat Feb 23windows
Detectionhightest

Suspicious Program Names

Detects suspicious patterns in program names or folders that are often found in malicious samples or hacktools

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Fri Feb 11windows
Detectionmediumtest

Recon Information for Export with Command Prompt

Once established within a system or network, an adversary may use automated techniques for collecting internal data.

WindowsProcess Creation
TA0009 · CollectionT1119 · Automated Collection
François HubautFri Jul 30windows
Detectionhightest

Suspicious Process Execution From Fake Recycle.Bin Folder

Detects process execution from a fake recycle bin folder, often used to avoid security solution.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasion
X__Junior (Nextron Systems)Wed Jul 12windows
Detectionhightest

Suspicious Redirection to Local Admin Share

Detects a suspicious output redirection to the local admins share, this technique is often found in malicious scripts or hacktool stagers

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Florian Roth (Nextron Systems)Sun Jan 16windows
Detectionmediumtest

Registry Modification of MS-settings Protocol Handler

Detects registry modifications to the 'ms-settings' protocol handler, which is frequently targeted for UAC bypass or persistence. Attackers can modify this registry to execute malicious code with elevated privileges by hijacking the command execution path.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · PersistenceT1548.002 · Bypass User Account Control+2
François Hubaut+1Mon Dec 20windows
Detectionmediumtest

Potential Remote Desktop Tunneling

Detects potential use of an SSH utility to establish RDP over a reverse SSH Tunnel. This can be used by attackers to enable routing of network packets that would otherwise not reach their intended destination.

WindowsProcess Creation
TA0008 · Lateral MovementT1021 · Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionhightest

Potential Defense Evasion Via Right-to-Left Override

Detects the presence of the "u202+E" character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence. This character is used as an obfuscation and masquerading techniques by adversaries to trick users into opening malicious files.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Micah Babinski+2Wed Feb 15windows
Detectionhightest

Script Interpreter Execution From Suspicious Folder

Detects a suspicious script execution in temporary folders or folders accessible by environment variables

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Feb 08windows
Detectionhightest

Suspicious Script Execution From Temp Folder

Detects a suspicious script executions from temporary folder

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+2Wed Jul 14windows
Detectionhightest

Sensitive File Access Via Volume Shadow Copy Backup

Detects a command that accesses the VolumeShadowCopy in order to extract sensitive files such as the Security or SAM registry hives or the AD database (ntds.dit)

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Max Altgelt (Nextron Systems)+1Mon Aug 09windows
Detectionhightest

Suspicious New Service Creation

Detects creation of a new service via "sc" command or the powershell "new-service" cmdlet with suspicious binary paths

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jul 14windows
Detectionhightest

Suspicious Service Binary Directory

Detects a service binary running in a suspicious directory

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)Tue Mar 09windows
Detectionhightest

Suspicious Windows Service Tampering

Detects the usage of binaries such as 'net', 'sc' or 'powershell' in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1489 · Service StopT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+2Thu Sep 01windows
Detectionmediumtest

Shadow Copies Creation Using Operating Systems Utilities

Shadow Copies creation using operating systems utilities, possible credential access

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential DumpingT1003.002 · Security Account ManagerT1003.003 · NTDS
Teymur Kheirkhabarov+2Tue Oct 22windows
Detectionhightest

Windows Shell/Scripting Processes Spawning Suspicious Programs

Detects suspicious child processes of a Windows shell and scripting processes such as wscript, rundll32, powershell, mshta...etc.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1059.001 · PowerShell+1
Florian Roth (Nextron Systems)+1Fri Apr 06windows
Detectionmediumtest

Process Creation Using Sysnative Folder

Detects process creation events that use the Sysnative folder (common for CobaltStrike spawns)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Max Altgelt (Nextron Systems)Tue Aug 23windows
Detectionhightest

System File Execution Location Anomaly

Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+4Mon Nov 27windows
Detectionhightest

Suspicious SYSTEM User Process Creation

Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)

WindowsProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationT1134 · Access Token Manipulation+2
Florian Roth (Nextron Systems)+1Mon Dec 20windows
Detectionmediumtest

Suspicious SYSVOL Domain Group Policy Access

Detects Access to Domain Group Policies stored in SYSVOL

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Markus Neis+2Mon Apr 09windows
Detectionhightest

Tasks Folder Evasion

The Tasks folder in system32 and syswow64 are globally writable paths. Adversaries can take advantage of this and load or influence any script hosts or ANY .NET Application in Tasks to load and execute a custom assembly into cscript, wscript, regsvr32, mshta, eventvwr

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0002 · Execution+1
SreemanMon Jan 13windows
Detectionlowtest

Malicious Windows Script Components File Execution by TAEF Detection

Windows Test Authoring and Execution Framework (TAEF) framework allows you to run automation by executing tests files written on different languages (C, C#, Microsoft COM Scripting interfaces Adversaries may execute malicious code (such as WSC file with VBScript, dll and so on) directly by running te.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Agro oscd.communityTue Oct 13windows
Detectionmediumtest

Malicious PE Execution by Microsoft Visual Studio Debugger

There is an option for a MS VS Just-In-Time Debugger "vsjitdebugger.exe" to launch specified executable and attach a debugger. This option may be used adversaries to execute malicious code by signed verified binary. The debugger is installed alongside with Microsoft Visual Studio package.

WindowsProcess Creation
T1218 · System Binary Proxy ExecutionTA0005 · Defense Evasion
Agro+2Wed Oct 14windows
Detectionmediumtest

Suspicious Userinit Child Process

Detects a suspicious child process of userinit

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)+1Mon Jun 17windows
Detectionmediumtest

Weak or Abused Passwords In CLI

Detects weak passwords or often abused passwords (seen used by threat actors) via the CLI. An example would be a threat actor creating a new user via the net command and providing the password inline

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Sep 14windows
Detectionmediumtest

Usage Of Web Request Commands And Cmdlets

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via CommandLine

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
James Pemberton+4Thu Oct 24windows
Detectionhightest

WhoAmI as Parameter

Detects a suspicious process command line that uses whoami as first parameter (as e.g. used by EfsPotato)

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Nov 29windows
Detectionhightest

Execution via WorkFolders.exe

Detects using WorkFolders.exe to execute an arbitrary control.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Maxime ThiebautThu Oct 21windows