Rule Library

Sigma Rules

3,116 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Service Started/Stopped Via Wmic.EXE

Detects usage of wmic to start or stop a service

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

Potential Remote SquiblyTwo Technique Execution

Detects potential execution of the SquiblyTwo technique that leverages Windows Management Instrumentation (WMI) to execute malicious code remotely. This technique bypasses application whitelisting by using wmic.exe to process malicious XSL (eXtensible Stylesheet Language) scripts that can contain embedded JScript or VBScript. The attack typically works by fetching XSL content from a remote source (using HTTP/HTTPS) and executing it with full trust privileges directly in memory, avoiding disk-based detection mechanisms. This is a common LOLBin (Living Off The Land Binary) technique used for defense evasion and code execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1047 · Windows Management InstrumentationT1220 · XSL Script ProcessingTA0002 · Execution+2
Markus Neis+2Wed Jan 16windows
Detectionmediumexperimental

Registry Manipulation via WMI Stdregprov

Detects the usage of wmic.exe to manipulate Windows registry via the WMI StdRegProv class. This behaviour could be potentially suspicious because it uses an alternative method to modify registry keys instead of legitimate registry tools like reg.exe or regedit.exe. Attackers specifically choose this technique to evade detection and bypass security monitoring focused on traditional registry modification commands.

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense EvasionTA0007 · Discovery+3
Daniel Koifman (KoifSec)Wed Jul 30windows
Detectionhightest

Suspicious WMIC Execution Via Office Process

Office application called wmic to proxye execution through a LOLBIN process. This is often used to break suspicious parent-child chain (Office app spawns LOLBin).

WindowsProcess Creation
T1204.002 · Malicious FileT1047 · Windows Management InstrumentationT1218.010 · Regsvr32TA0002 · Execution+1
Vadim Khrykov+1Mon Aug 23windows
Detectionhightest

Suspicious Process Created Via Wmic.EXE

Detects WMIC executing "process call create" with suspicious calls to processes such as "rundll32", "regsrv32", etc.

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Florian Roth (Nextron Systems)+1Mon Oct 12windows
Detectionmediumtest

Application Terminated Via Wmic.EXE

Detects calls to the "terminate" function via wmic in order to kill an application

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Sep 11windows
Detectionmediumtest

Application Removed Via Wmic.EXE

Detects the removal or uninstallation of an application via "Wmic.EXE".

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
François HubautFri Jan 28windows
Detectionhightest

Potential Tampering With Security Products Via WMIC

Detects uninstallation or termination of security products using the WMIC utility

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)+1Sat Jan 30windows
Detectionmediumtest

XSL Script Execution Via WMIC.EXE

Detects the execution of WMIC with the "format" flag to potentially load local XSL files. Adversaries abuse this functionality to execute arbitrary files while potentially bypassing application whitelisting defenses. Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML files.

WindowsProcess Creation
TA0005 · Defense EvasionT1047 · Windows Management InstrumentationT1220 · XSL Script ProcessingTA0002 · Execution+2
Timur Zinniatullin+2Mon Oct 21windows
Detectionmediumstable

WmiPrvSE Spawned A Process

Detects WmiPrvSE spawning a process

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Roberto Rodriguez (Cyb3rWard0g)Thu Aug 15windows
Detectionmediumstable

Potential WMI Lateral Movement WmiPrvSE Spawned PowerShell

Detects Powershell as a child of the WmiPrvSE process. Which could be a sign of lateral movement via WMI.

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management InstrumentationT1059.001 · PowerShell
Markus NeisWed Apr 03windows
Detectionhightest

Suspicious WmiPrvSE Child Process

Detects suspicious and uncommon child processes of WmiPrvSE

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1047 · Windows Management InstrumentationT1204.002 · Malicious File+1
Vadim Khrykov (ThreatIntel)+2Mon Aug 23windows
Detectionhightest

UEFI Persistence Via Wpbbin - ProcessCreation

Detects execution of the binary "wpbbin" which is used as part of the UEFI based persistence method described in the reference section

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1542.001 · System Firmware
Nasreddine Bencherchali (Nextron Systems)Mon Jul 18windows
Detectionmediumtest

Potential Dropper Script Execution Via WScript/CScript

Detects wscript/cscript executions of scripts located in user directories

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScript
Margaritis Dimitrios+3Wed Jan 16windows
Detectionmediumtest

Cscript/Wscript Potentially Suspicious Child Process

Detects potentially suspicious child processes of Wscript/Cscript. These include processes such as rundll32 with uncommon exports or PowerShell spawning rundll32 or regsvr32. Malware such as Pikabot and Qakbot were seen using similar techniques as well as many others.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)+1Mon May 15windows
Detectionhightest

Cscript/Wscript Uncommon Script Extension Execution

Detects Wscript/Cscript executing a file with an uncommon (i.e. non-script) extension

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScript
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionmediumtest

WSL Child Process Anomaly

Detects uncommon or suspicious child processes spawning from a WSL process. This could indicate an attempt to evade parent/child relationship detections or persistence attempts via cron using WSL

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jan 23windows
Detectionhighexperimental

Installation of WSL Kali-Linux

Detects installation of Kali Linux distribution through Windows Subsystem for Linux (WSL). Attackers may use Kali Linux WSL to leverage its penetration testing tools and capabilities for malicious purposes.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Oct 10windows
Detectionhighexperimental

WSL Kali-Linux Usage

Detects the use of Kali Linux through Windows Subsystem for Linux

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Oct 10windows
Detectionmediumtest

Windows Binary Executed From WSL

Detects the execution of Windows binaries from within a WSL instance. This could be used to masquerade parent-child relationships

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Tue Feb 14windows
Detectionhightest

Proxy Execution Via Wuauclt.EXE

Detects the use of the Windows Update Client binary (wuauclt.exe) for proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Execution
Roberto Rodriguez (Cyb3rWard0g)+4Mon Oct 12windows
Detectionhightest

Suspicious Windows Update Agent Empty Cmdline

Detects suspicious Windows Update Agent activity in which a wuauclt.exe process command line doesn't contain any command line flags

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)Sat Feb 26windows
Detectionhightest

Cab File Extraction Via Wusa.EXE From Potentially Suspicious Paths

Detects the execution of the "wusa.exe" (Windows Update Standalone Installer) utility to extract ".cab" files using the "/extract" argument from potentially suspicious paths.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Wusa.EXE Executed By Parent Process Located In Suspicious Location

Detects execution of the "wusa.exe" (Windows Update Standalone Installer) utility by a parent process that is located in a suspicious location. Attackers could instantiate an instance of "wusa.exe" in order to bypass User Account Control (UAC). They can duplicate the access token from "wusa.exe" to gain elevated privileges.

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)Sun Nov 26windows
Detectionhightest

Xwizard.EXE Execution From Non-Default Location

Detects the execution of Xwizard tool from a non-default directory. When executed from a non-default directory, this utility can be abused in order to side load a custom version of "xwizards.dll".

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Christian Burkard (Nextron Systems)Mon Sep 20windows
Detectionmediumtest

COM Object Execution via Xwizard.EXE

Detects the execution of Xwizard tool with the "RunWizard" flag and a GUID like argument. This utility can be abused in order to run custom COM object created in the registry.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+2Wed Oct 07windows
Detectionmediumtest

Potential Process Hollowing Activity

Detects when a memory process image does not match the disk image, indicative of process hollowing.

Windowsprocess_tampering
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.012 · Process Hollowing
Christopher Peacock+2Tue Jan 25windows
Detectionlowtest

Potential Defense Evasion Via Raw Disk Access By Uncommon Tools

Detects raw disk access using uncommon tools or tools that are located in suspicious locations (heavy filtering is required), which could indicate possible defense evasion attempts

Windowsraw_access_thread
TA0005 · Defense Evasionattack.t1006
Teymur Kheirkhabarov+1Tue Oct 22windows
Detectionmediumtest

Potential Persistence Via Disk Cleanup Handler - Registry

Detects when an attacker modifies values of the Disk Cleanup Handler in the registry to achieve persistence. The disk cleanup manager is part of the operating system. It displays the dialog box […] The user has the option of enabling or disabling individual handlers by selecting or clearing their check box in the disk cleanup manager's UI. Although Windows comes with a number of disk cleanup handlers, they aren't designed to handle files produced by other applications. Instead, the disk cleanup manager is designed to be flexible and extensible by enabling any developer to implement and register their own disk cleanup handler. Any developer can extend the available disk cleanup services by implementing and registering a disk cleanup handler.

WindowsRegistry Add
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Thu Jul 21windows
Detectionmediumexperimental

Delete Defender Scan ShellEx Context Menu Registry Key

Detects deletion of registry key that adds 'Scan with Defender' option in context menu. Attackers may use this to make it harder for users to scan files that are suspicious.

WindowsRegistry Delete
TA0005 · Defense Evasion
Matt Anderson (Huntress)Fri Jul 11windows
Detectionhighexperimental

Windows Credential Guard Related Registry Value Deleted - Registry

Detects attempts to disable Windows Credential Guard by deleting registry values. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.

WindowsRegistry Delete
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Dec 26windows
Detectionmediumtest

Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted

Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by deleting the existing "DisableAIDataAnalysis" registry value. Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.

WindowsRegistry Delete
TA0009 · CollectionT1113 · Screen Capture
Sajid Nawaz KhanSun Jun 02windows
Detectionhightest

Folder Removed From Exploit Guard ProtectedFolders List - Registry

Detects the removal of folders from the "ProtectedFolders" list of of exploit guard. This could indicate an attacker trying to launch an encryption process or trying to manipulate data inside of the protected folder

WindowsRegistry Delete
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Terminal Server Client Connection History Cleared - Registry

Detects the deletion of registry keys containing the MSTSC connection history

WindowsRegistry Delete
TA0003 · PersistenceTA0005 · Defense EvasionT1070 · Indicator RemovalT1112 · Modify Registry
Christian Burkard (Nextron Systems)Tue Oct 19windows
Detectionhightest

Removal Of AMSI Provider Registry Keys

Detects the deletion of AMSI provider registry key entries in HKLM\Software\Microsoft\AMSI. This technique could be used by an attacker in order to disable AMSI inspection.

WindowsRegistry Delete
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautMon Jun 07windows
Detectionmediumtest

Removal of Potential COM Hijacking Registry Keys

Detects any deletion of entries in ".*\shell\open\command" registry keys. These registry keys might have been used for COM hijacking activities by a threat actor or an attacker and the deletion could indicate steps to remove its tracks.

WindowsRegistry Delete
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhighexperimental

RunMRU Registry Key Deletion - Registry

Detects attempts to delete the RunMRU registry key, which stores the history of commands executed via the run dialog. In the clickfix techniques, the phishing lures instruct users to open a run dialog through (Win + R) and execute malicious commands. Adversaries may delete this key to cover their tracks after executing commands.

WindowsRegistry Delete
TA0005 · Defense EvasionT1070.003 · Clear Command History
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Sep 25windows
Detectionmediumtest

Removal Of Index Value to Hide Schedule Task - Registry

Detects when the "index" value of a scheduled task is removed or deleted from the registry. Which effectively hides it from any tooling such as "schtasks /query"

WindowsRegistry Delete
TA0005 · Defense EvasionT1562 · Impair Defenses
Nasreddine Bencherchali (Nextron Systems)Fri Aug 26windows
Detectionmediumtest

Removal Of SD Value to Hide Schedule Task - Registry

Remove SD (Security Descriptor) value in \Schedule\TaskCache\Tree registry hive to hide schedule task. This technique is used by Tarrask malware

WindowsRegistry Delete
TA0005 · Defense EvasionT1562 · Impair Defenses
Sittikorn SFri Apr 15windows
Detectionhightest

Creation of a Local Hidden User Account by Registry

Sysmon registry detection of a local hidden user account.

WindowsRegistry Event
TA0003 · PersistenceT1136.001 · Local Account
Christian Burkard (Nextron Systems)Mon May 03windows
Detectionhightest

UAC Bypass Via Wsreset

Unfixed method for UAC bypass from Windows 10. WSReset.exe file associated with the Windows Store. It will run a binary file contained in a low-privilege registry.

WindowsRegistry Event
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
oscd.community+1Wed Oct 07windows
Detectionhighstable

CMSTP Execution Registry Event

Detects various indicators of Microsoft Connection Manager Profile Installer execution

WindowsRegistry Event
TA0005 · Defense EvasionTA0002 · ExecutionT1218.003 · CMSTPG0069 · G0069+1
Nik SeetharamanMon Jul 16windows
Detectionhighexperimental

Windows Defender Threat Severity Default Action Modified

Detects modifications or creations of Windows Defender's default threat action settings based on severity to 'allow' or take 'no action'. This is a highly suspicious configuration change that effectively disables Defender's ability to automatically mitigate threats of a certain severity level, allowing malicious software to run unimpeded. An attacker might use this technique to bypass defenses before executing payloads.

WindowsRegistry Event
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Matt Anderson (Huntress)Fri Jul 11windows
Detectionhightest

Disable Security Events Logging Adding Reg Key MiniNt

Detects the addition of a key 'MiniNt' to the registry. Upon a reboot, Windows Event Log service will stop writing events.

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1562.002 · Disable Windows Event LoggingT1112 · Modify Registry+1
Ilyas Ochkov+1Fri Oct 25windows
Detectionhightest

Wdigest CredGuard Registry Modification

Detects potential malicious modification of the property value of IsCredGuardEnabled from HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest to disable Cred Guard on a system. This is usually used with UseLogonCredential to manipulate the caching credentials.

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Sun Aug 25windows
Detectionhightest

Esentutl Volume Shadow Copy Service Keys

Detects the volume shadow copy service initialization and processing via esentutl. Registry keys such as HKLM\\System\\CurrentControlSet\\Services\\VSS\\Diag\\VolSnap\\Volume are captured.

WindowsRegistry Event
TA0006 · Credential AccessT1003.002 · Security Account Manager
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectioncriticaltest

Windows Credential Editor Registry

Detects the use of Windows Credential Editor (WCE)

WindowsRegistry Event
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0005 · S0005
Florian Roth (Nextron Systems)Tue Dec 31windows
Detectionhightest

HybridConnectionManager Service Installation - Registry

Detects the installation of the Azure Hybrid Connection Manager service to allow remote code execution from Azure function.

WindowsRegistry Event
TA0042 · Resource DevelopmentT1608 · Stage Capabilities
Roberto Rodriguez (Cyb3rWard0g)+1Mon Apr 12windows