Rule Library

Sigma Rules

2,824 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathighexperimental

FunkLocker Ransomware File Creation

Detects the creation of files with the ".funksec" extension, which is appended to encrypted files by the FunkLocker ransomware.

WindowsFile Event
TA0040 · ImpactT1486 · Data Encrypted for Impactdetection.emerging-threats
Saiprashanth PulisettiFri Aug 082025
Emerging Threathighexperimental

Grixba Malware Reconnaissance Activity

Detects execution of the Grixba reconnaissance tool based on suspicious command-line parameter combinations. This tool is used by the Play ransomware group for network enumeration, data gathering, and event log clearing.

WindowsProcess Creation
TA0043 · ReconnaissanceT1595.001 · Scanning IP BlocksTA0007 · DiscoveryT1046 · Network Service Discovery+1
yxinmiracle+1Wed Nov 262025
Emerging Threathighexperimental

DNS Query To Katz Stealer Domains

Detects DNS queries to domains associated with Katz Stealer malware. Katz Stealer is a malware variant that is known to be used for stealing sensitive information from compromised systems. In Enterprise environments, DNS queries to these domains may indicate potential malicious activity or compromise.

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNSdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Thu May 222025
Emerging Threathighexperimental

Katz Stealer DLL Loaded

Detects loading of DLLs associated with Katz Stealer malware 2025 variants. Katz Stealer is a malware variant that is known to be used for stealing sensitive information from compromised systems. The process that loads these DLLs are very likely to be malicious.

WindowsImage Load (DLL)
TA0002 · ExecutionT1129 · Shared Modulesdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Thu May 222025
Emerging Threathighexperimental

Kalambur Backdoor Curl TOR SOCKS Proxy Execution

Detects the execution of the "curl.exe" command, referencing "SOCKS" and ".onion" domains, which could be indicative of Kalambur backdoor activity.

WindowsProcess Creation
TA0002 · ExecutionTA0011 · Command and ControlT1090 · ProxyT1573 · Encrypted Channel+4
Arda Buyukkaya (EclecticIQ)Tue Feb 112025
Emerging Threathighexperimental

Shai-Hulud Malware Indicators - Windows

Detects potential Shai-Hulud malware indicators based on specific command line arguments associated with its execution.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud Malicious Bun Execution

Detects the execution of `bun_environment.js` via the Bun runtime, a behavior associated with the Shai-Hulud "Second Coming" NPM supply chain attack. The malware uses a `setup_bun.js` script to install the Bun runtime if not present, and then executes the malicious `bun_environment.js` payload.

WindowsProcess Creation
T1195.002 · Compromise Software Supply ChainT1203 · Exploitation for Client ExecutionTA0002 · ExecutionTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud 2.0 Malicious NPM Package Installation

Detects the command-line installation of specific malicious npm packages and versions associated with the Shai-Hulud 2.0 supply chain attack.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Nov 282025
Emerging Threathighexperimental

Axios NPM Compromise File Creation Indicators - Windows

Detects file creation events linked to the Axios NPM supply chain compromise. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.

WindowsFile Event
TA0001 · Initial AccessT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise Indicators - Windows

Detects the specific Windows execution chain and process tree associated with the Axios NPM supply chain compromise. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.

WindowsProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Threat Huntlowexperimental

Successful MSIX/AppX Package Installation

Detects successful MSIX/AppX package installations on Windows systems by monitoring EventID 854 in the Microsoft-Windows-AppXDeployment-Server/Operational log. While most installations are legitimate, this can help identify unauthorized or suspicious package installations. It is crucial to monitor such events as threat actors may exploit MSIX/AppX packages to deliver and execute malicious payloads.

Windowsappxdeployment-server
TA0002 · ExecutionT1204.002 · Malicious Filedetection.threat-hunting
Michael Haag+1Mon Nov 03windows
Threat Huntlowtest

Firewall Rule Modified In The Windows Firewall Exception List

Detects when a rule has been modified in the Windows firewall exception list

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautSat Feb 19windows
Threat Huntmediumtest

Potential Remote WMI ActiveScriptEventConsumers Activity

Detect potential adversaries leveraging WMI ActiveScriptEventConsumers remotely to move laterally in a network. This event is best correlated and used as an enrichment to determine the potential lateral movement activity.

Windowssecurity
TA0008 · Lateral MovementTA0004 · Privilege Escalationdetection.threat-huntingTA0003 · Persistence+1
Roberto Rodriguez (Cyb3rWard0g)+1Wed Sep 02windows
Threat Huntlowtest

Access To Browser Credential Files By Uncommon Applications - Security

Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing This rule requires heavy baselining before usage.

Windowssecurity
TA0006 · Credential AccessT1555.003 · Credentials from Web Browsersdetection.threat-hunting
Daniel Koifman+1Mon Oct 21windows
Threat Huntlowtest

Scheduled Task Deletion

Detects scheduled task deletion events. Scheduled tasks are likely to be deleted if not used for persistence. Malicious Software often creates tasks directly under the root node e.g. \TASKNAME

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · Persistence2013-08-001 · CAR 2013-08-001+2
David Strassegger+1Fri Jan 22windows
Threat Huntmediumtest

CreateRemoteThread API and LoadLibrary

Detects potential use of CreateRemoteThread api and LoadLibrary function to inject DLL into a process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library Injectiondetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sun Aug 11windows
Threat Huntmediumtest

Remote Thread Creation Via PowerShell

Detects the creation of a remote thread from a Powershell process to another process

WindowsRemote Thread Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Nikita Nazarov+1Tue Oct 06windows
Threat Huntmediumtest

Remote Thread Created In Shell Application

Detects remote thread creation in command shell applications, such as "Cmd.EXE" and "PowerShell.EXE". It is a common technique used by malware, such as IcedID, to inject malicious code and execute it within legitimate processes.

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
Splunk Research TeamMon Jul 29windows
Threat Huntlowtest

Access To Chromium Browsers Sensitive Files By Uncommon Applications

Detects file access requests to chromium based browser sensitive files by uncommon processes. Could indicate potential attempt of stealing sensitive information.

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
X__Junior (Nextron Systems)Mon Jul 29windows
Threat Huntlowtest

Access To Browser Credential Files By Uncommon Applications

Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
François Hubaut+1Sat Apr 09windows
Threat Huntlowtest

Access To Windows Outlook Mail Files By Uncommon Applications

Detects file access requests to Windows Outlook Mail by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1070.008 · Clear Mailbox DataTA0005 · Defense Evasiondetection.threat-hunting
François HubautFri May 10windows
Threat Huntmediumtest

Access To Sysvol Policies Share By Uncommon Process

Detects file access requests to the Windows Sysvol Policies Share by uncommon processes

Windowsfile_access
TA0006 · Credential AccessT1552.006 · Group Policy Preferencesdetection.threat-hunting
François HubautThu Dec 21windows
Threat Huntlowtest

Access To .Reg/.Hive Files By Uncommon Applications

Detects file access requests to files ending with either the ".hive"/".reg" extension, usually associated with Windows Registry backups.

Windowsfile_access
T1112 · Modify RegistryTA0005 · Defense EvasionTA0003 · Persistencedetection.threat-hunting
François HubautFri Sep 15windows
Threat Huntlowtest

Unattend.XML File Access Attempt

Detects attempts to access the "unattend.xml" file, where credentials might be stored. This file is used during the unattended windows install process.

Windowsfile_access
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
François HubautMon Jul 22windows
Threat Huntlowtest

File Creation Date Changed to Another Year

Detects when the file creation time is changed to a year before 2020. Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system. Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity. In order to use this rule in production, it is recommended first baseline normal behavior in your environment and then tune the rule accordingly. Hunting Recommendation: Focus on files with creation times set to years significantly before the current date, especially those in user-writable directories. Correlate with process execution logs to identify the source of the modification and investigate any unsigned or suspicious binaries involved.

WindowsFile Change
T1070.006 · TimestompTA0005 · Defense Evasiondetection.threat-hunting
François Hubaut+1Fri Aug 12windows
Threat Huntlowtest

ADS Zone.Identifier Deleted

Detects the deletion of the "Zone.Identifier" ADS. Attackers can leverage this in order to bypass security restrictions that make use of the ADS such as Microsoft Office apps.

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletiondetection.threat-hunting
François HubautMon Sep 04windows
Threat Huntlowtest

DMP/HDMP File Creation

Detects the creation of a file with the ".dmp"/".hdmp" extension. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.

WindowsFile Event
TA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Sep 07windows
Threat Huntlowtest

PFX File Creation

Detects the creation of PFX files (Personal Information Exchange format). PFX files contain private keys and certificates bundled together, making them valuable targets for attackers seeking to: - Exfiltrate digital certificates for impersonation or signing malicious code - Establish persistent access through certificate-based authentication - Bypass security controls that rely on certificate validation Analysts should investigate PFX file creation events by examining which process created the PFX file and its parent process chain, as well as unusual locations outside standard certificate stores or development environments.

WindowsFile Event
TA0006 · Credential AccessT1552.004 · Private Keysdetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Threat Huntmediumtest

Python Path Configuration File Creation - Windows

Detects creation of a Python path configuration file (.pth) in Python library folders, which can be maliciously abused for code execution and persistence. Modules referenced by these files are run at every Python startup (v3.5+), regardless of whether the module is imported by the calling script. Default paths are '\lib\site-packages\*.pth' (Windows) and '/lib/pythonX.Y/site-packages/*.pth' (Unix and macOS).

WindowsFile Event
TA0002 · ExecutionT1059.006 · Pythondetection.threat-hunting
Andreas Braathen (mnemonic.io)+1Thu Apr 25windows
Threat Huntlowtest

Scheduled Task Created - FileCreation

Detects the creation of a scheduled task via file creation.

WindowsFile Event
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+3
Center for Threat Informed Defense (CTID) Summiting the Pyramid TeamWed Sep 27windows
Threat Huntlowtest

Creation of an Executable by an Executable

Detects the creation of an executable by another executable.

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malwaredetection.threat-hunting
François HubautWed Mar 09windows
Threat Huntmediumtest

VsCode Code Tunnel Execution File Indicator

Detects the creation of a file with the name "code_tunnel.json" which indicate execution and usage of VsCode tunneling utility. Attackers can abuse this functionality to establish a C2 channel

WindowsFile Event
TA0011 · Command and Controldetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25windows
Threat Huntmediumexperimental

WDAC Policy File Creation In CodeIntegrity Folder

Attackers can craft a custom Windows Defender Application Control (WDAC) policy that blocks Endpoint Detection and Response (EDR) components while allowing their own malicious code. The policy is placed in the privileged Windows Code Integrity folder (C:\Windows\System32\CodeIntegrity\). Upon reboot, the policy prevents EDR drivers from loading, effectively bypassing security measures and may further enable undetected lateral movement within an Active Directory environment.

WindowsFile Event
TA0005 · Defense EvasionT1562.001 · Disable or Modify Toolsdetection.threat-hunting
Andreas Braathen (mnemonic.io)Thu Jan 30windows
Threat Huntmediumtest

WebDAV Temporary Local File Creation

Detects the creation of WebDAV temporary files with potentially suspicious extensions

WindowsFile Event
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing+1
Micah BabinskiMon Aug 21windows
Threat Huntmediumtest

Non-DLL Extension File Renamed With DLL Extension

Detects rename operations of files with non-DLL extensions to files with a DLL extension. This is often performed by malware in order to avoid initial detections based on extensions.

WindowsFile Rename
TA0005 · Defense EvasionT1036.008 · Masquerade File Typedetection.threat-hunting
François HubautSat Feb 19windows
Threat Huntlowtest

Amsi.DLL Load By Uncommon Process

Detects loading of Amsi.dll by uncommon processes

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0040 · ImpactT1490 · Inhibit System Recoverydetection.threat-hunting
François HubautSun Mar 12windows
Threat Huntlowexperimental

BITS Client BitsProxy DLL Loaded By Uncommon Process

Detects an uncommon process loading the "BitsProxy.dll". This DLL is used when the BITS COM instance or API is used. This detection can be used to hunt for uncommon processes loading this DLL in your environment. Which may indicate potential suspicious activity occurring.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobsdetection.threat-hunting
UnicornOfHuntWed Jun 04windows
Threat Huntmediumtest

Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process

Detects the load of dbghelp/dbgcore DLL by a potentially uncommon or potentially suspicious process. The Dbghelp and Dbgcore DLLs export functions that allow for the dump of process memory. Tools like ProcessHacker, Task Manager and some attacker tradecraft use the MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity C2 Framework has a module that leverages this API to dump the contents of Lsass.exe and transfer it over the network back to the attacker's machine. Keep in mind that many legitimate Windows processes and services might load the aforementioned DLLs for debugging or other related purposes. Investigate the CommandLine and the Image location of the process loading the DLL.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003.001 · LSASS Memorydetection.threat-hunting
Perez Diego+2Sun Oct 27windows
Threat Huntlowtest

System Drawing DLL Load

Detects processes loading "System.Drawing.ni.dll". This could be an indicator of potential Screen Capture.

WindowsImage Load (DLL)
TA0009 · CollectionT1113 · Screen Capturedetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Threat Huntlowtest

Task Scheduler DLL Loaded By Application Located In Potentially Suspicious Location

Detects the loading of the "taskschd.dll" module from a process that located in a potentially suspicious or uncommon directory. The loading of this DLL might indicate that the application have the capability to create a scheduled task via the "Schedule.Service" COM object. Investigation of the loading application and its behavior is required to determining if its malicious.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelMon Sep 02windows
Threat Huntlowtest

Microsoft Excel Add-In Loaded

Detects Microsoft Excel loading an Add-In (.xll) file

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious Filedetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Fri May 12windows
Threat Huntlowtest

Microsoft Word Add-In Loaded

Detects Microsoft Word loading an Add-In (.wll) file which can be used by threat actors for initial access or persistence.

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious Filedetection.threat-hunting
Steffen Rogge (dr0pd34d)Wed Jul 10windows
Threat Huntmediumexperimental

WerFaultSecure Loading DbgCore or DbgHelp - EDR-Freeze

Detects the loading of dbgcore.dll or dbghelp.dll by WerFaultSecure.exe, which has been observed in EDR-Freeze attacks to suspend processes and evade detection. However, this behavior has also been observed during normal software installations, so further investigation is required to confirm malicious activity. When threat hunting, look for this activity in conjunction with other suspicious processes starting, network connections, or file modifications that occur shortly after the DLL load. Pay special attention to timing - if other malicious activities occur during or immediately after this library loading, it may indicate EDR evasion attempts. Also correlate with any EDR/AV process suspension events or gaps in security monitoring during the timeframe.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1562.001 · Disable or Modify Toolsdetection.threat-hunting
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Threat Huntlowtest

WMI Module Loaded By Uncommon Process

Detects WMI modules being loaded by an uncommon process

WindowsImage Load (DLL)
TA0002 · ExecutionT1047 · Windows Management Instrumentationdetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sat Aug 10windows
Threat Huntmediumtest

Dfsvc.EXE Network Connection To Non-Local IPs

Detects network connections from "dfsvc.exe" used to handled ClickOnce applications to non-local IPs

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Hunthightest

Dfsvc.EXE Initiated Network Connection Over Uncommon Port

Detects an initiated network connection over uncommon ports from "dfsvc.exe". A utility used to handled ClickOnce applications.

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Huntmediumtest

Dllhost.EXE Initiated Network Connection To Non-Local IP Address

Detects Dllhost.EXE initiating a network connection to a non-local IP address. Aside from Microsoft own IP range that needs to be excluded. Network communication from Dllhost will depend entirely on the hosted DLL. An initial baseline is recommended before deployment.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · ExecutionT1559.001 · Component Object Model+1
bartblazeMon Jul 13windows
Threat Huntmediumtest

HH.EXE Initiated HTTP Network Connection

Detects a network connection initiated by the "hh.exe" process to HTTP destination ports, which could indicate the execution/download of remotely hosted .chm files.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.001 · Compiled HTML Filedetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Oct 05windows