Rule Library

Sigma Rules

557 rules found for "Red Canary"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

Replace Desktop Wallpaper by Powershell

An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users. This may take the form of modifications to internal websites, or directly to user systems with the replacement of the desktop wallpaper

WindowsPowerShell Script
TA0040 · ImpactT1491.001 · Internal Defacement
François HubautSun Dec 26windows
Detectionlowtest

Powershell Suspicious Win32_PnPEntity

Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.

WindowsPowerShell Script
TA0007 · DiscoveryT1120 · Peripheral Device Discovery
François HubautMon Aug 23windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell - PS Script

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsPowerShell Script
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows
Detectionmediumtest

Suspicious PowerShell WindowStyle Option

Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden

WindowsPowerShell Script
TA0005 · Defense EvasionT1564.003 · Hidden Window
François Hubaut+1Wed Oct 20windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Script

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Script
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionhightest

Tamper Windows Defender - ScriptBlockLogging

Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+5Sun Jan 16windows
Detectionmediumtest

Testing Usage of Uncommonly Used Port

Adversaries may communicate using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443.

WindowsPowerShell Script
TA0011 · Command and ControlT1571 · Non-Standard Port
François HubautSun Jan 23windows
Detectionmediumtest

Powershell Timestomp

Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.006 · Timestomp
François HubautTue Aug 03windows
Detectionmediumtest

Potential Persistence Via PowerShell User Profile Using Add-Content

Detects calls to "Add-Content" cmdlet in order to modify the content of the user profile and potentially adding suspicious commands for persistence

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
François Hubaut+1Wed Aug 18windows
Detectionmediumtest

PowerShell WMI Win32_Product Install MSI

Detects the execution of an MSI file using PowerShell and the WMI Win32_Product class

WindowsPowerShell Script
TA0005 · Defense EvasionT1218.007 · Msiexec
François HubautSun Apr 24windows
Detectionmediumtest

Winlogon Helper DLL

Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[Wow6432Node]Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.004 · Winlogon Helper DLL
Timur Zinniatullin+1Mon Oct 21windows
Detectionmediumtest

Powershell WMI Persistence

Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription.

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
François HubautThu Aug 19windows
Detectionmediumtest

Powershell XML Execute Command

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
François HubautWed Jan 19windows
Detectionmediumtest

Potential Credential Dumping Activity Via LSASS

Detects process access requests to the LSASS process with specific call trace calls and access masks. This behaviour is expressed by many credential dumping tools such as Mimikatz, NanoDump, Invoke-Mimikatz, Procdump and even the Taskmgr dumping feature.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Samir Bousseaden+1Wed Apr 03windows
Detectionmediumtest

Compress Data and Lock With Password for Exfiltration With 7-ZIP

An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party utilities

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
François HubautTue Jul 27windows
Detectionhightest

Interactive AT Job

Detects an interactive AT job, which may be used as a form of privilege escalation.

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1053.002 · At
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionhighstable

Boot Configuration Tampering Via Bcdedit.EXE

Detects the use of the bcdedit command to tamper with the boot configuration data. This technique is often times used by malware or attackers as a destructive way before launching ransomware.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows
Detectionmediumtest

Chromium Browser Instance Executed With Custom Extension

Detects a Chromium based browser process with the 'load-extension' flag to start a instance with a custom extension

WindowsProcess Creation
TA0003 · Persistenceattack.t1176.001
Aedan Russell+2Sun Jun 19windows
Detectionhightest

Suspicious Chromium Browser Instance Executed With Custom Extension

Detects a suspicious process spawning a Chromium based browser process with the 'load-extension' flag to start an instance with a custom extension

WindowsProcess Creation
TA0003 · Persistenceattack.t1176.001
Aedan Russell+2Sun Jun 19windows
Detectionmediumtest

New Root Certificate Installed Via CertMgr.EXE

Detects execution of "certmgr" with the "add" flag in order to install a new certificate on the system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sun Mar 05windows
Detectionmediumtest

New Root Certificate Installed Via Certutil.EXE

Detects execution of "certutil" with the "addstore" flag in order to install a new certificate on the system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sun Mar 05windows
Detectionmediumtest

Deleted Data Overwritten Via Cipher.EXE

Detects usage of the "cipher" built-in utility in order to overwrite deleted data from disk. Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives

WindowsProcess Creation
TA0040 · ImpactT1485 · Data Destruction
François HubautSun Dec 26windows
Detectionlowtest

Data Copied To Clipboard Via Clip.EXE

Detects the execution of clip.exe in order to copy data to the clipboard. Adversaries may collect data stored in the clipboard from users copying information within or between applications.

WindowsProcess Creation
TA0009 · CollectionT1115 · Clipboard Data
François HubautTue Jul 27windows
Detectionlowtest

Change Default File Association Via Assoc

Detects file association changes using the builtin "assoc" command. When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access or by administrators using the built-in assoc utility. Applications can modify the file association for a given file extension to call an arbitrary program when a file with the given extension is opened.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.001 · Change Default File Association
Timur Zinniatullin+1Mon Oct 21windows
Detectionlowtest

File Deletion Via Del

Detects execution of the builtin "del"/"erase" commands in order to delete files. Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
François HubautSat Jan 15windows
Detectionlowtest

File And SubFolder Enumeration Via Dir Command

Detects usage of the "dir" command part of Windows CMD with the "/S" command line flag in order to enumerate files in a specified directory and all subdirectories.

WindowsProcess Creation
TA0007 · DiscoveryT1217 · Browser Information Discovery
François HubautMon Dec 13windows
Detectionhightest

Potential Privilege Escalation Using Symlink Between Osk and Cmd

Detects the creation of a symbolic link between "cmd.exe" and the accessibility on-screen keyboard binary (osk.exe) using "mklink". This technique provides an elevated command prompt to the user from the login screen without the need to log in.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.008 · Accessibility Features
François HubautSun Dec 11windows
Detectionlowtest

Directory Removal Via Rmdir

Detects execution of the builtin "rmdir" command in order to delete directories. Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
François HubautSat Jan 15windows
Detectionmediumtest

Read Contents From Stdin Via Cmd.EXE

Detect the use of "<" to read and potentially execute a file via cmd.exe

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
François Hubaut+1Tue Mar 07windows
Detectionmediumtest

New Generic Credentials Added Via Cmdkey.EXE

Detects usage of "cmdkey.exe" to add generic credentials. As an example, this can be used before connecting to an RDP session via command line interface.

WindowsProcess Creation
TA0006 · Credential AccessT1003.005 · Cached Domain Credentials
François Hubaut+1Fri Feb 03windows
Detectionhightest

Potential Reconnaissance For Cached Credentials Via Cmdkey.EXE

Detects usage of cmdkey to look for cached credentials on the system

WindowsProcess Creation
TA0006 · Credential AccessT1003.005 · Cached Domain Credentials
jmallette+2Wed Jan 16windows
Detectionmediumtest

Dynamic .NET Compilation Via Csc.EXE

Detects execution of "csc.exe" to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Delivery
Florian Roth (Nextron Systems)+1Sat Aug 24windows
Detectionhightest

Suspicious Use of CSharp Interactive Console

Detects the execution of CSharp interactive console by PowerShell

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Michael R.Sun Mar 08windows
Detectionmediumtest

Active Directory Structure Export Via Csvde.EXE

Detects the execution of "csvde.exe" in order to export organizational Active Directory structure.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1087.002 · Domain Account
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionhightest

Suspicious Curl.EXE Download

Detects a suspicious curl process start on Windows and outputs the requested document to a local file

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Fri Jul 03windows
Detectionlowtest

DirLister Execution

Detect the usage of "DirLister.exe" a utility for quickly listing folder or drive contents. It was seen used by BlackCat ransomware to create a list of accessible directories and files.

WindowsProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautSat Aug 20windows
Detectionlowexperimental

System Information Discovery via Registry Queries

Detects attempts to query system information directly from the Windows Registry.

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
lazargThu Jun 12windows
Detectionmediumtest

Dism Remove Online Package

Deployment Image Servicing and Management tool. DISM is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautSun Jan 16windows
Detectionhightest

Dllhost.EXE Execution Anomaly

Detects a "dllhost" process spawning with no commandline arguments which is very rare to happen and could indicate process injection activity or malware mimicking similar system processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Nasreddine Bencherchali (Nextron Systems)Mon Jun 27windows
Detectionmediumtest

Domain Trust Discovery Via Dsquery

Detects execution of "dsquery.exe" for domain trust discovery

WindowsProcess Creation
TA0007 · DiscoveryT1482 · Domain Trust Discovery
E.M. Anhaus+3Thu Oct 24windows
Detectionmediumtest

Esentutl Steals Browser Information

One way Qbot steals sensitive information is by extracting browser data from Internet Explorer and Microsoft Edge by using the built-in utility esentutl.exe

WindowsProcess Creation
TA0009 · CollectionT1005 · Data from Local System
François HubautSun Feb 13windows
Detectionhightest

Findstr GPP Passwords

Look for the encrypted cpassword value within Group Policy Preference files on the Domain Controller. This value can be decrypted with gpp-decrypt.

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
François HubautMon Dec 27windows
Detectionmediumtest

Recon Command Output Piped To Findstr.EXE

Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example. Attackers often time use this technique to extract specific information they require in their reconnaissance phase.

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discovery
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 06windows
Detectionmediumtest

Security Tools Keyword Lookup Via Findstr.EXE

Detects execution of "findstr" to search for common names of security tools. Attackers often pipe the results of recon commands such as "tasklist" or "whoami" to "findstr" in order to filter out the results. This detection focuses on the keywords that the attacker might use as a filter.

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 20windows
Detectionhightest

Sysmon Discovery Via Default Driver Altitude Using Findstr.EXE

Detects usage of "findstr" with the argument "385201". Which could indicate potential discovery of an installed Sysinternals Sysmon service using the default driver altitude (even if the name is changed).

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
François HubautThu Dec 16windows
Detectionhighstable

Fsutil Suspicious Invocation

Detects suspicious parameters of fsutil (deleting USN journal, configuring it with small size, etc). Might be used by ransomwares during the attack (seen by NotPetya and others).

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1070 · Indicator RemovalT1485 · Data Destruction
Ecco+2Thu Sep 26windows
Detectionmediumtest

Portable Gpg.EXE Execution

Detects the execution of "gpg.exe" from uncommon location. Often used by ransomware and loaders to decrypt/encrypt data.

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impact
François Hubaut+1Sun Aug 06windows
Detectionmediumtest

Gpresult Display Group Policy Information

Detects cases in which a user uses the built-in Windows utility gpresult to display the Resultant Set of Policy (RSoP) information

WindowsProcess Creation
TA0007 · DiscoveryT1615 · Group Policy Discovery
François HubautSun May 01windows