Rule Library

Sigma Rules

382 rules found for "credential-access"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Diskshadow Script Mode - Uncommon Script Extension Execution

Detects execution of "Diskshadow.exe" in script mode to execute an script with a potentially uncommon extension. Initial baselining of the allowed extension list is required.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 15windows
Detectionmediumtest

Diskshadow Script Mode - Execution From Potential Suspicious Location

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag where the script is located in a potentially suspicious location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 15windows
Detectionhightest

Potential Windows Defender AV Bypass Via Dump64.EXE Rename

Detects when a user is potentially trying to bypass the Windows Defender AV by renaming a tool to dump64.exe and placing it in the Visual Studio folder. Currently the rule is covering only usage of procdump but other utilities can be added in order to increase coverage.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Austin Songer+2Fri Nov 26windows
Detectionmediumtest

DumpMinitool Execution

Detects the use of "DumpMinitool.exe" a tool that allows the dump of process memory via the use of the "MiniDumpWriteDump"

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)+1Wed Apr 06windows
Detectionhightest

Suspicious DumpMinitool Execution

Detects suspicious ways to use the "DumpMinitool.exe" binary

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1036 · MasqueradingT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Wed Apr 06windows
Detectionmediumtest

Esentutl Gather Credentials

Conti recommendation to its affiliates to use esentutl to access NTDS dumped file. Trickbot also uses this utilities to get MSEdge info via its module pwgrab.

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential DumpingT1003.003 · NTDSS0404 · S0404
sam0x90Fri Aug 06windows
Detectionhightest

Copying Sensitive Files with Credential Data

Files with well-known filenames (sensitive files with credential data) copying

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account ManagerT1003.003 · NTDS2013-07-001 · CAR 2013-07-001+1
Teymur Kheirkhabarov+2Tue Oct 22windows
Detectionmediumtest

Remote File Download Via Findstr.EXE

Detects execution of "findstr" with specific flags and a remote share path. This specific set of CLI flags would allow "findstr" to download the content of the file located on the remote share as described in the LOLBAS entry.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionhightest

Findstr GPP Passwords

Look for the encrypted cpassword value within Group Policy Preference files on the Domain Controller. This value can be decrypted with gpp-decrypt.

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
François HubautMon Dec 27windows
Detectionhightest

LSASS Process Reconnaissance Via Findstr.EXE

Detects findstring commands that include the keyword lsass, which indicates recon actviity for the LSASS process PID

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Florian Roth (Nextron Systems)Fri Aug 12windows
Detectionmediumtest

Permission Misconfiguration Reconnaissance Via Findstr.EXE

Detects usage of findstr with the "EVERYONE" or "BUILTIN" keywords. This was seen being used in combination with "icacls" and other utilities to spot misconfigured files or folders permissions.

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionlowtest

Insensitive Subfolder Search Via Findstr.EXE

Detects execution of findstr with the "s" and "i" flags for a "subfolder" and "insensitive" search respectively. Attackers sometimes leverage this built-in utility to search the system for interesting files or filter through results of commands.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionhighexperimental

Suspicious Child Process of Notepad++ Updater - GUP.Exe

Detects suspicious child process creation by the Notepad++ updater process (gup.exe). This could indicate potential exploitation of the updater component to deliver unwanted malware.

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1195.002 · Compromise Software Supply ChainTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Feb 03windows
Detectionhightest

HackTool - ADCSPwn Execution

Detects command line parameters used by ADCSPwn, a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Sat Jul 31windows
Detectionhightest

HackTool - Certify Execution

Detects Certify a tool for Active Directory certificate abuse based on PE metadata characteristics and common command line arguments.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Martin MuellerMon Apr 17windows
Detectionhightest

HackTool - Certipy Execution

Detects Certipy execution, a tool for Active Directory Certificate Services enumeration and abuse based on PE metadata characteristics and common command line arguments.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1649 · Steal or Forge Authentication Certificates
Martin Mueller+1Mon Apr 17windows
Detectionhightest

HackTool - CrackMapExec Execution

This rule detect common flag combinations used by CrackMapExec in order to detect its use even if the binary has been replaced.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential Access+7
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionhightest

HackTool - CrackMapExec Process Patterns

Detects suspicious process patterns found in logs when CrackMapExec is used

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Sat Mar 12windows
Detectionhightest

HackTool - CreateMiniDump Execution

Detects the use of CreateMiniDump hack tool used to dump the LSASS process memory for credential extraction on the attacker's machine

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Sun Dec 22windows
Detectionhighexperimental

HackTool - Doppelanger LSASS Dumper Execution

Detects the execution of the Doppelanger hacktool which is used to dump LSASS memory via process cloning while evading common detection methods

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jul 01windows
Detectioncriticaltest

HackTool - Dumpert Process Dumper Execution

Detects the use of Dumpert process dumper, which dumps the lsass.exe process memory

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Tue Feb 04windows
Detectioncriticaltest

Hacktool Execution - Imphash

Detects the execution of different Windows based hacktools via their import hash (imphash) even if the files have been renamed

WindowsProcess Creation
TA0006 · Credential AccessTA0042 · Resource DevelopmentT1588.002 · ToolT1003 · OS Credential Dumping
Florian Roth (Nextron Systems)Fri Mar 04windows
Detectionhightest

Hacktool Execution - PE Metadata

Detects the execution of different Windows based hacktools via PE metadata (company, product, etc.) even if the files have been renamed

WindowsProcess Creation
TA0006 · Credential AccessTA0042 · Resource DevelopmentT1588.002 · ToolT1003 · OS Credential Dumping
Florian Roth (Nextron Systems)Wed Apr 27windows
Detectionhightest

HackTool - HandleKatz LSASS Dumper Execution

Detects the use of HandleKatz, a tool that demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Thu Aug 18windows
Detectionhightest

HackTool - Hashcat Password Cracker Execution

Execute Hashcat.exe with provided SAM file from registry of Windows and Password list to crack against

WindowsProcess Creation
TA0006 · Credential AccessT1110.002 · Password Cracking
François HubautMon Dec 27windows
Detectionhightest

HackTool - Hydra Password Bruteforce Execution

Detects command line parameters used by Hydra password guessing hack tool

WindowsProcess Creation
TA0006 · Credential AccessT1110 · Brute ForceT1110.001 · Password Guessing
Vasiliy BurovMon Oct 05windows
Detectionhightest

HackTool - Impacket Tools Execution

Detects the execution of different compiled Windows binaries of the impacket toolset (based on names or part of their names - could lead to false positives)

WindowsProcess Creation
TA0009 · CollectionTA0002 · ExecutionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Sat Jul 24windows
Detectioncriticaltest

HackTool - Inveigh Execution

Detects the use of Inveigh a cross-platform .NET IPv4/IPv6 machine-in-the-middle tool

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionhightest

HackTool - KrbRelay Execution

Detects the use of KrbRelay, a Kerberos relaying tool

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Florian Roth (Nextron Systems)Wed Apr 27windows
Detectionhightest

HackTool - KrbRelayUp Execution

Detects KrbRelayUp used to perform a universal no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1558.003 · KerberoastingTA0008 · Lateral Movement+1
Florian Roth (Nextron Systems)Tue Apr 26windows
Detectionhightest

HackTool - RemoteKrbRelay Execution

Detects the use of RemoteKrbRelay, a Kerberos relaying tool via CommandLine flags and PE metadata.

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Nasreddine Bencherchali (Nextron Systems)Thu Jun 27windows
Detectionmediumexperimental

HackTool - LaZagne Execution

Detects the execution of the LaZagne. A utility used to retrieve multiple types of passwords stored on a local computer. LaZagne has been leveraged multiple times by threat actors in order to dump credentials.

WindowsProcess Creation
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)+1Mon Jun 24windows
Detectionhightest

HackTool - Mimikatz Execution

Detection well-known mimikatz command line arguments

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS MemoryT1003.002 · Security Account ManagerT1003.004 · LSA Secrets+2
Teymur Kheirkhabarov+3Tue Oct 22windows
Detectionhightest

HackTool - Pypykatz Credentials Dumping Activity

Detects the usage of "pypykatz" to obtain stored credentials. Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database through Windows registry where the SAM database is stored

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account Manager
François HubautWed Jan 05windows
Detectionhightest

HackTool - Quarks PwDump Execution

Detects usage of the Quarks PwDump tool via commandline arguments

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account Manager
Nasreddine Bencherchali (Nextron Systems)Mon Sep 05windows
Detectioncriticaltest

Potential SMB Relay Attack Tool Execution

Detects different hacktools used for relay attacks on Windows for privilege escalation

WindowsProcess Creation
TA0009 · CollectionTA0002 · ExecutionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Sat Jul 24windows
Detectioncriticalstable

HackTool - Rubeus Execution

Detects the execution of the hacktool Rubeus via PE information of command line parameters

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1003 · OS Credential DumpingT1558.003 · Kerberoasting+2
Florian Roth (Nextron Systems)Wed Dec 19windows
Detectioncriticaltest

HackTool - SafetyKatz Execution

Detects the execution of the hacktool SafetyKatz via PE information and default Image name

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Nasreddine Bencherchali (Nextron Systems)Thu Oct 20windows
Detectioncriticalstable

HackTool - SecurityXploded Execution

Detects the execution of SecurityXploded Tools

WindowsProcess Creation
TA0006 · Credential AccessT1555 · Credentials from Password Stores
Florian Roth (Nextron Systems)Wed Dec 19windows
Detectioncriticaltest

HackTool - Windows Credential Editor (WCE) Execution

Detects the use of Windows Credential Editor (WCE), a popular post-exploitation tool used to extract plaintext passwords, hash, PIN code and Kerberos tickets from memory. It is often used by threat actors for credential dumping and lateral movement within compromised networks.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0005 · S0005
Florian Roth (Nextron Systems)Tue Dec 31windows
Detectionhightest

HackTool - WinPwn Execution

Detects commandline keywords indicative of potential usge of the tool WinPwn. A tool for Windows and Active Directory reconnaissance and exploitation.

WindowsProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionTA0007 · DiscoveryTA0002 · Execution+9
Swachchhanda Shrawan PoudelMon Dec 04windows
Detectionhighexperimental

HackTool - WSASS Execution

Detects execution of WSASS, a tool used to dump LSASS memory on Windows systems by leveraging WER's (Windows Error Reporting) WerFaultSecure.EXE to bypass PPL (Protected Process Light) protections.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan Poudel (Nextron Systems)Sun Nov 23windows
Detectionhightest

HackTool - XORDump Execution

Detects suspicious use of XORDump process memory dumping utility

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)Fri Jan 28windows
Detectionhightest

Microsoft IIS Service Account Password Dumped

Detects the Internet Information Services (IIS) command-line tool, AppCmd, being used to list passwords

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+2Tue Nov 08windows
Detectionhightest

Microsoft IIS Connection Strings Decryption

Detects use of aspnet_regiis to decrypt Microsoft IIS connection strings. An attacker with Microsoft IIS web server access via a webshell or alike can decrypt and dump any hardcoded connection strings, such as the MSSQL service account password using aspnet_regiis command.

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+1Wed Sep 28windows
Detectionhighexperimental

Attempts of Kerberos Coercion Via DNS SPN Spoofing

Detects the presence of "UWhRC....AAYBAAAA" pattern in command line. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like in CVE-2025-33073. If you see this pattern in the command line, it is likely an attempt to add spoofed Service Principal Names (SPNs) to DNS records, or checking for the presence of such records through the `nslookup` command.

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20windows
Detectionmediumtest

Dumping Process via Sqldumper.exe

Detects process dump via legitimate sqldumper.exe binary

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Kirill Kiryanov+1Thu Oct 08windows
Detectionhightest

Time Travel Debugging Utility Usage

Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1218 · System Binary Proxy ExecutionT1003.001 · LSASS Memory
Ensar Şamil+1Tue Oct 06windows