Rule Library

Sigma Rules

916 rules found for "Microsoft"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumstable

A New Trust Was Created To A Domain

Addition of domains is seldom and should be verified for legitimacy.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Thomas PatzkeTue Dec 03windows
Detectionhighstable

Password Change on Directory Service Restore Mode (DSRM) Account

Detects potential attempts made to set the Directory Services Restore Mode administrator password. The Directory Service Restore Mode (DSRM) account is a local administrator account on Domain Controllers. Attackers may change the password in order to obtain persistence.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Thomas PatzkeSun Feb 19windows
Detectionmediumtest

Account Tampering - Suspicious Failed Logon Reasons

This method uses uncommon error codes on failed logons to determine suspicious activity and tampering with accounts that have been disabled or somehow restricted.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0001 · Initial Access+1
Florian Roth (Nextron Systems)Sun Feb 19windows
Detectionhightest

Kerberos Manipulation

Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.

Windowssecurity
TA0006 · Credential AccessT1212 · Exploitation for Credential Access
Florian Roth (Nextron Systems)Fri Feb 10windows
Detectionhightest

Suspicious Scheduled Task Creation

Detects suspicious scheduled task creation events. Based on attributes such as paths, commands line flags, etc.

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Dec 05windows
Detectionhightest

Important Scheduled Task Deleted/Disabled

Detects when adversaries stop services or processes by deleting or disabling their respective scheduled tasks in order to conduct data destructive activities

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Dec 05windows
Detectionhightest

Suspicious Scheduled Task Update

Detects update to a scheduled task event that contain suspicious keywords.

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Dec 05windows
Detectionlowtest

Unauthorized System Time Modification

Detect scenarios where a potentially unauthorized application or user is modifying the system time.

Windowssecurity
TA0005 · Defense EvasionT1070.006 · Timestomp
@neu5ronTue Feb 05windows
Detectionhightest

Suspicious Teams Application Related ObjectAcess Event

Detects an access to authentication tokens and accounts of Microsoft Teams desktop application.

Windowssecurity
TA0006 · Credential AccessT1528 · Steal Application Access Token
@serkinvaleryFri Sep 16windows
Detectionmediumstable

User Added to Local Administrator Group

Detects the addition of a new member to the local administrator group, which could be legitimate activity or a sign of privilege escalation activity

Windowssecurity
TA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationT1078 · Valid Accounts+2
Florian Roth (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

Potential Privileged System Service Operation - SeLoadDriverPrivilege

Detects the usage of the 'SeLoadDriverPrivilege' privilege. This privilege is required to load or unload a device driver. With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers. This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
xknow+1Mon Apr 08windows
Detectioninformationaltest

User Logoff Event

Detects a user log-off activity. Could be used for example to correlate information during forensic investigations

Windowssecurity
TA0040 · ImpactT1531 · Account Access Removal
François HubautFri Oct 14windows
Detectionhightest

Microsoft Defender Blocked from Loading Unsigned DLL

Detects Code Integrity (CI) engine blocking Microsoft Defender's processes (MpCmdRun and NisSrv) from loading unsigned DLLs which may be an attempt to sideload arbitrary DLL

Windowssecurity-mitigations
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Bhabesh RajTue Aug 02windows
Detectionhightest

Unsigned Binary Loaded From Suspicious Location

Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations

Windowssecurity-mitigations
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Wed Aug 03windows
Detectionhightest

HybridConnectionManager Service Running

Rule to detect the Hybrid Connection Manager service running on an endpoint.

Windowsmicrosoft-servicebus-client
TA0003 · PersistenceT1554 · Compromise Host Software Binary
Roberto Rodriguez (Cyb3rWard0g)+1Mon Apr 12windows
Detectionmediumexperimental

Unsigned or Unencrypted SMB Connection to Share Established

Detects SMB server connections to shares without signing or encryption enabled. This could indicate potential lateral movement activity using unsecured SMB shares.

Windowssmbserver-connectivity
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Mohamed AbdelghaniSun Oct 19windows
Detectionmediumexperimental

ISATAP Router Address Was Set

Detects the configuration of a new ISATAP router on a Windows host. While ISATAP is a legitimate Microsoft technology for IPv6 transition, unexpected or unauthorized ISATAP router configurations could indicate a potential IPv6 DNS Takeover attack using tools like mitm6. In such attacks, adversaries advertise themselves as DHCPv6 servers and set malicious ISATAP routers to intercept traffic. This detection should be correlated with network baselines and known legitimate ISATAP deployments in your environment.

Windowssystem
TA0040 · ImpactTA0006 · Credential AccessTA0009 · CollectionTA0001 · Initial Access+4
hamidSun Oct 19windows
Detectionlowtest

Active Directory Certificate Services Denied Certificate Enrollment Request

Detects denied requests by Active Directory Certificate Services. Example of these requests denial include issues with permissions on the certificate template or invalid signatures.

Windowssystem
TA0006 · Credential AccessTA0005 · Defense EvasionT1553.004 · Install Root Certificate
@serkinvaleryThu Mar 07windows
Detectionhightest

DHCP Server Loaded the CallOut DLL

This rule detects a DHCP server in which a specified Callout DLL (in registry) was loaded

Windowssystem
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Dimitrios SlamarisMon May 15windows
Detectionhightest

DHCP Server Error Failed Loading the CallOut DLL

This rule detects a DHCP server error in which a specified Callout DLL (in registry) could not be loaded

Windowssystem
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Dimitrios SlamarisMon May 15windows
Detectionhightest

Local Privilege Escalation Indicator TabTip

Detects the invocation of TabTip via CLSID as seen when JuicyPotatoNG is used on a system in brute force mode

Windowssystem
TA0009 · CollectionTA0002 · ExecutionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Fri Oct 07windows
Detectionmediumtest

Eventlog Cleared

One of the Windows Eventlogs has been cleared. e.g. caused by "wevtutil cl" command execution

Windowssystem
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs2016-04-002 · CAR 2016-04-002
Florian Roth (Nextron Systems)Tue Jan 10windows
Detectionhightest

Important Windows Eventlog Cleared

Detects the clearing of one of the Windows Core Eventlogs. e.g. caused by "wevtutil cl" command execution

Windowssystem
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs2016-04-002 · CAR 2016-04-002
Florian Roth (Nextron Systems)+2Tue May 17windows
Detectionmediumtest

Certificate Use With No Strong Mapping

Detects a user certificate that was valid but could not be mapped to a user in a strong way (such as via explicit mapping, key trust mapping, or a SID) This could be a sign of exploitation of the elevation of privilege vulnerabilities (CVE-2022-34691, CVE-2022-26931, CVE-2022-26923) that can occur when the KDC allows certificate spoofing by not requiring a strong mapping. Events where the AccountName and CN of the Subject do not match, or where the CN ends in a dollar sign indicating a machine, may indicate certificate spoofing.

Windowssystem
TA0004 · Privilege Escalation
@br4dy5Mon Oct 09windows
Detectionlowtest

No Suitable Encryption Key Found For Generating Kerberos Ticket

Detects errors when a target server doesn't have suitable keys for generating kerberos tickets. This issue can occur for example when a service uses a user account or a computer account that is configured for only DES encryption on a computer that is running Windows 7 which has DES encryption for Kerberos authentication disabled.

Windowssystem
TA0006 · Credential AccessT1558.003 · Kerberoasting
@serkinvaleryThu Mar 07windows
Detectionhightest

Critical Hive In Suspicious Location Access Bits Cleared

Detects events from the Kernel-General ETW indicating that the access bits of a hive with a system like hive name located in the temp directory have been reset. This occurs when an application tries to access a hive and the hive has not be recognized since the last 7 days (by default). Registry hive dumping utilities such as QuarksPwDump were seen emitting this behavior.

Windowssystem
TA0006 · Credential AccessT1003.002 · Security Account Manager
Florian Roth (Nextron Systems)Mon May 15windows
Detectionlowtest

Volume Shadow Copy Mount

Detects volume shadow copy mount via Windows event log

Windowssystem
TA0006 · Credential AccessT1003.002 · Security Account Manager
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectionmediumexperimental

Crash Dump Created By Operating System

Detects "BugCheck" errors indicating the system rebooted due to a crash, capturing the bugcheck code, dump file path, and report ID.

Windowssystem
TA0006 · Credential AccessTA0009 · CollectionT1003.002 · Security Account ManagerT1005 · Data from Local System
Jason MullMon May 12windows
Detectioninformationalstable

Windows Update Error

Detects Windows update errors including installation failures and connection issues. Defenders should observe this in case critical update KBs aren't installed.

Windowssystem
TA0040 · ImpactTA0042 · Resource DevelopmentT1584 · Compromise Infrastructure
François HubautSat Dec 04windows
Detectionhightest

Vulnerable Netlogon Secure Channel Connection Allowed

Detects that a vulnerable Netlogon secure channel connection was allowed, which could be an indicator of CVE-2020-1472.

Windowssystem
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
NVISOTue Sep 15windows
Detectionmediumstable

Windows Defender Threat Detection Service Disabled

Detects when the "Windows Defender Threat Protection" service is disabled.

Windowssystem
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

Sliver C2 Default Service Installation

Detects known malicious service installation that appear in cases in which a Sliver implants execute the PsExec commands

Windowssystem
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1543.003 · Windows Service+1
Florian Roth (Nextron Systems)+1Thu Aug 25windows
Detectionlowtest

Windows Service Terminated With Error

Detects Windows services that got terminated for whatever reason

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhightest

Important Windows Service Terminated With Error

Detects important or interesting Windows services that got terminated for whatever reason

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhighstable

Windows Defender Grace Period Expired

Detects the expiration of the grace period of Windows Defender. This means protection against viruses, spyware, and other potentially unwanted software is disabled.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

LSASS Access Detected via Attack Surface Reduction

Detects Access to LSASS Process

Windowswindefend
TA0006 · Credential AccessT1003.001 · LSASS Memory
Markus NeisSun Aug 26windows
Detectionhightest

PSExec and WMI Process Creations Block

Detects blocking of process creations originating from PSExec and WMI commands

Windowswindefend
TA0002 · ExecutionTA0008 · Lateral MovementT1047 · Windows Management InstrumentationT1569.002 · Service Execution
Bhabesh RajTue Jul 14windows
Detectionhightest

Windows Defender Exploit Guard Tamper

Detects when someone is adding or removing applications or folders from exploit guard "ProtectedFolders" or "AllowedApplications"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionlowstable

Windows Defender Submit Sample Feature Disabled

Detects disabling of the "Automatic Sample Submission" feature of Windows Defender.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectioninformationaltest

Windows Defender Malware Detection History Deletion

Windows Defender logs when the history of detected infections is deleted.

Windowswindefend
TA0005 · Defense Evasion
Cian HeasleyThu Aug 13windows
Detectionhighstable

Windows Defender Malware And PUA Scanning Disabled

Detects disabling of the Windows Defender feature of scanning for malware and other potentially unwanted software

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhighstable

Windows Defender AMSI Trigger Detected

Detects triggering of AMSI by Windows Defender.

Windowswindefend
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Bhabesh RajMon Sep 14windows
Detectionhighstable

Windows Defender Real-time Protection Disabled

Detects disabling of Windows Defender Real-time Protection. As this event doesn't contain a lot of information on who initiated this action you might want to reduce it to a "medium" level if this occurs too many times in your environment

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionmediumstable

Windows Defender Real-Time Protection Failure/Restart

Detects issues with Windows Defender Real-Time Protection features

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+1Tue Mar 28windows
Detectionhightest

Win Defender Restored Quarantine File

Detects the restoration of files from the defender quarantine

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Windows Defender Configuration Changes

Detects suspicious changes to the Windows Defender configuration

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Microsoft Defender Tamper Protection Trigger

Detects blocked attempts to change any of Defender's settings such as "Real Time Monitoring" and "Behavior Monitoring"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Bhabesh Raj+1Mon Jul 05windows
Detectionhighstable

Windows Defender Threat Detected

Detects actions taken by Windows Defender malware detection engines

Windowswindefend
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Ján TrenčanskýTue Jul 28windows