Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

PaperCut MF/NG Exploitation Related Indicators

Detects exploitation indicators related to PaperCut MF/NG Exploitation

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 252023
Emerging Threathightest

PaperCut MF/NG Potential Exploitation

Detects suspicious child processes of "pc-app.exe". Which could indicate potential exploitation of PaperCut

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Apr 202023
Emerging Threathightest

Peach Sandstorm APT Process Activity Indicators

Detects process creation activity related to Peach Sandstorm APT

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
X__Junior (Nextron Systems)Mon Jan 152023
Emerging Threatmediumtest

Potential Peach Sandstorm APT C2 Communication Activity

Detects potential C2 communication activity related to Peach Sandstorm APT

Proxy Log
TA0011 · Command and Controldetection.emerging-threats
X__Junior (Nextron Systems)Mon Jan 152023
Emerging Threathightest

UNC4841 - Email Exfiltration File Pattern

Detects filename pattern of email related data used by UNC4841 for staging and exfiltration

LinuxFile Event
TA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - Barracuda ESG Exploitation Indicators

Detects file indicators as seen used by UNC4841 during their Barracuda ESG zero day exploitation.

LinuxFile Event
TA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - SSL Certificate Exfiltration Via Openssl

Detects the execution of "openssl" to connect to an IP address. This techniques was used by UNC4841 to exfiltrate SSL certificates and as a C2 channel with named pipes. Investigate commands executed in the temporal vicinity of this command.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - Download Compressed Files From Temp.sh Using Wget

Detects execution of "wget" to download a ".zip" or ".rar" files from "temp.sh". As seen used by UNC4841 during their Barracuda ESG zero day exploitation.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - Download Tar File From Untrusted Direct IP Via Wget

Detects execution of "wget" to download a "tar" from an IP address that doesn't have a trusted certificate. As seen used by UNC4841 during their Barracuda ESG zero day exploitation.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threatcriticaltest

UNC4841 - Potential SEASPY Execution

Detects execution of specific named binaries which were used by UNC4841 to deploy their SEASPY backdoor

LinuxProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

CVE-2024-1212 Exploitation - Progress Kemp LoadMaster Unauthenticated Command Injection

Detects potential exploitation of CVE-2024-1709 an unauthenticated command injection in Progress Kemp LoadMaster. It looks for GET requests to '/access/set' API with the parameters 'param=enableapi' and 'value=1' as well as an "Authorization" header with a base64 encoded value with an uncommon character.

Web Server Log
TA0001 · Initial Accesscve.2024-1212detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 202024
Emerging Threatmediumtest

CVE-2024-1708 - ScreenConnect Path Traversal Exploitation

This detects file modifications to ASPX and ASHX files within the root of the App_Extensions directory, which is allowed by a ZipSlip vulnerability in versions prior to 23.9.8. This occurs during exploitation of CVE-2024-1708.

WindowsFile Event
TA0003 · Persistencecve.2024-1708detection.emerging-threats
Matt Anderson+3Wed Feb 212024
Emerging Threatcriticaltest

CVE-2024-1708 - ScreenConnect Path Traversal Exploitation - Security

This detects file modifications to ASPX and ASHX files within the root of the App_Extensions directory, which is allowed by a ZipSlip vulnerability in versions prior to 23.9.8. This occurs during exploitation of CVE-2024-1708. This requires an Advanced Auditing policy to log a successful Windows Event ID 4663 events and with a SACL set on the directory.

Windowssecurity
TA0001 · Initial AccessTA0003 · Persistencecve.2024-1708detection.emerging-threats
Matt Anderson+2Tue Feb 202024
Emerging Threatmediumtest

ScreenConnect User Database Modification

Detects file modifications to the temporary xml user database file indicating local user modification in the ScreenConnect server. This will occur during exploitation of the ScreenConnect Authentication Bypass vulnerability (CVE-2024-1709) in versions <23.9.8, but may also be observed when making legitimate modifications to local users or permissions.

WindowsFile Event
TA0003 · Persistencecve.2024-1709detection.emerging-threats
Matt Anderson+3Wed Feb 212024
Emerging Threatcriticaltest

CVE-2024-1709 - ScreenConnect Authentication Bypass Exploitation

Detects GET requests to '/SetupWizard.aspx/[anythinghere]' that indicate exploitation of the ScreenConnect vulnerability CVE-2024-1709.

Web Server Log
TA0001 · Initial AccessTA0003 · Persistencecve.2024-1709detection.emerging-threats
Matt Anderson+1Tue Feb 202024
Emerging Threatmediumtest

ScreenConnect User Database Modification - Security

This detects file modifications to the temporary xml user database file indicating local user modification in the ScreenConnect server. This will occur during exploitation of the ScreenConnect Authentication Bypass vulnerability (CVE-2024-1709) in versions <23.9.8, but may also be observed when making legitimate modifications to local users or permissions. This requires an Advanced Auditing policy to log a successful Windows Event ID 4663 events and with a SACL set on the directory.

Windowssecurity
TA0005 · Defense Evasioncve.2024-1709detection.emerging-threats
Matt Anderson+3Tue Feb 202024
Emerging Threathightest

Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process

Detects potentially suspicious child process of SSH process (sshd) with a specific execution user. This could be a sign of potential exploitation of CVE-2024-3094.

LinuxProcess Creation
TA0002 · Executioncve.2024-3094detection.emerging-threats
Arnim Rupp+2Mon Apr 012024
Emerging Threatmediumtest

Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection - File Creation

Detects suspicious file creations in the Palo Alto Networks PAN-OS' parent telemetry folder, which are processed by the vulnerable 'dt_curl' script if device telemetry is enabled. As said script overrides the shell-subprocess restriction, arbitrary command execution may occur by carefully crafting filenames that are escaped through this function.

paloaltoFile Eventglobalprotect
TA0002 · Executioncve.2024-3400detection.emerging-threats
Andreas Braathen (mnemonic.io)Thu Apr 252024
Emerging Threathightest

Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection

Detects potential exploitation attempts of CVE-2024-3400 - an OS command injection in Palo Alto GlobalProtect. This detection looks for suspicious strings that indicate a potential directory traversal attempt or command injection.

paloaltoapplianceglobalprotect
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+2
Nasreddine Bencherchali (Nextron Systems)Thu Apr 182024
Emerging Threathightest

Potential Exploitation of CVE-2024-37085 - Suspicious Creation Of ESX Admins Group

Detects execution of the "net.exe" command in order to add a group named "ESX Admins". This could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor. VMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named "ESX Admins" to have full administrative access by default.

WindowsProcess Creation
TA0002 · Executioncve.2024-37085detection.emerging-threats
François HubautMon Jul 292024
Emerging Threathightest

Potential Exploitation of CVE-2024-37085 - Suspicious ESX Admins Group Activity

Detects any creation or modification to a windows domain group with the name "ESX Admins". This could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor. VMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named "ESX Admins" to have full administrative access by default.

Windowssecurity
TA0002 · Executioncve.2024-37085detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Jul 302024
Emerging Threathightest

Potential CSharp Streamer RAT Loading .NET Executable Image

Detects potential CSharp Streamer RAT loading .NET executable image by using the default file name and path associated with the tool.

WindowsImage Load (DLL)
TA0011 · Command and Controlattack.t1219.002detection.emerging-threats
Luca Di BartolomeoSat Jun 222024
Emerging Threatmediumtest

DarkGate - Drop DarkGate Loader In C:\Temp Directory

Detects attackers attempting to save, decrypt and execute the DarkGate Loader in C:\temp folder.

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Tomasz Dyduch+1Fri May 312024
Emerging Threatmediumtest

Potential KamiKakaBot Activity - Lure Document Execution

Detects the execution of a Word document via the WinWord Start Menu shortcut. This behavior was observed being used by KamiKakaBot samples in order to initiate the 2nd stage of the infection.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Mar 222024
Emerging Threatmediumtest

Potential KamiKakaBot Activity - Shutdown Schedule Task Creation

Detects the creation of a schedule task that runs weekly and execute the "shutdown /l /f" command. This behavior was observed being used by KamiKakaBot samples in order to achieve persistence on a system.

WindowsProcess Creation
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Mar 222024
Emerging Threathightest

Potential KamiKakaBot Activity - Winlogon Shell Persistence

Detects changes to the "Winlogon" registry key where a process will set the value of the "Shell" to a value that was observed being used by KamiKakaBot samples in order to achieve persistence.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Mar 222024
Emerging Threathightest

Potential Kapeka Decrypted Backdoor Indicator

Detects the presence of a file that is decrypted backdoor binary dropped by the Kapeka Dropper, which disguises itself as a hidden file under a folder named "Microsoft" within "CSIDL_COMMON_APPDATA" or "CSIDL_LOCAL_APPDATA", depending on the process privileges. The file, typically 5-6 characters long with a random combination of consonants and vowels followed by a ".wll" extension to pose as a legitimate file to evade detection.

WindowsFile Event
TA0005 · Defense Evasiondetection.emerging-threats
Swachchhanda Shrawan Poudel+1Wed Jul 032024
Emerging Threathightest

Kapeka Backdoor Loaded Via Rundll32.EXE

Detects the Kapeka Backdoor binary being loaded by rundll32.exe. The Kapeka loader drops a backdoor, which is a DLL with the '.wll' extension masquerading as a Microsoft Word Add-In.

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious FileTA0005 · Defense EvasionT1218.011 · Rundll32+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Kapeka Backdoor Persistence Activity

Detects Kapeka backdoor persistence activity. Depending on the process privileges, the Kapeka dropper then sets persistence for the backdoor either as a scheduled task (if admin or SYSTEM) or autorun registry (if not). For the scheduled task, it creates a scheduled task called "Sens Api" via schtasks command, which is set to run upon system startup as SYSTEM. To establish persistence through the autorun utility, it adds an autorun entry called "Sens Api" under HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run via the "reg add" command. Both persistence mechanisms are set to launch the binary by calling rundll32 and passing the backdoor's first export ordinal (#1) without any additional argument.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Kapeka Backdoor Execution Via RunDLL32.EXE

Detects Kapeka backdoor process execution pattern, where the dropper launch the backdoor binary by calling rundll32 and passing the backdoor's first export ordinal (#1) with a "-d" argument.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Swachchhanda Shrawan Poudel+1Wed Jul 032024
Emerging Threathightest

Kapeka Backdoor Autorun Persistence

Detects the setting of a new value in the Autorun key that is used by the Kapeka backdoor for persistence.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threatmediumtest

Kapeka Backdoor Configuration Persistence

Detects registry set activity of a value called "Seed" stored in the "\Cryptography\Providers\" registry key. The Kapeka backdoor leverages this location to register a new SIP provider for backdoor configuration persistence.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1553.003 · SIP and Trust Provider Hijackingdetection.emerging-threats
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Kapeka Backdoor Scheduled Task Creation

Detects Kapeka backdoor scheduled task creation based on attributes such as paths, commands line flags, etc.

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Potential Raspberry Robin Aclui Dll SideLoading

Detects potential sideloading of malicious "aclui.dll" by OleView.This behavior was observed in Raspberry-Robin variants reported by chekpoint research on Feburary 2024.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking+1
Swachchhanda Shrawan PoudelWed Jul 312024
Emerging Threathightest

Potential Raspberry Robin CPL Execution Activity

Detects the execution of a ".CPL" file located in the user temp directory via the Shell32 DLL "Control_RunDLL" export function. This behavior was observed in multiple Raspberry-Robin variants.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32detection.emerging-threats
Swachchhanda Shrawan PoudelThu Mar 072024
Emerging Threatlowtest

Potential Raspberry Robin Registry Set Internet Settings ZoneMap

Detects registry modifications related to the proxy configuration of the system, potentially associated with the Raspberry Robin malware, as seen in campaigns running in Q1 2024. Raspberry Robin may alter proxy settings to circumvent security measures, ensuring unhindered connection with Command and Control servers for maintaining control over compromised systems if there are any proxy settings that are blocking connections.

WindowsRegistry Set
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasiondetection.emerging-threats
Swachchhanda Shrawan PoudelWed Jul 312024
Emerging Threathightest

DPRK Threat Actor - C2 Communication DNS Indicators

Detects DNS queries for C2 domains used by DPRK Threat actors.

WindowsDNS Query
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Feb 202024
Emerging Threatmediumtest

Potential APT FIN7 Exploitation Activity

Detects potential APT FIN7 exploitation activity as reported by Google. In order to obtain initial access, FIN7 used compromised Remote Desktop Protocol (RDP) credentials to login to a target server and initiate specific Windows process chains.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shelldetection.emerging-threats
Alex WalstonMon Jul 292024
Emerging Threathightest

Forest Blizzard APT - File Creation Activity

Detects the creation of specific files inside of ProgramData directory. These files were seen being created by Forest Blizzard as described by MSFT.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Loggingdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threatmediumtest

Forest Blizzard APT - JavaScript Constrained File Creation

Detects the creation of JavaScript files inside of the DriverStore directory. Forest Blizzard used this to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Loggingdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathightest

Forest Blizzard APT - Custom Protocol Handler Creation

Detects the setting of a custom protocol handler with the name "rogue". Seen being created by Forest Blizzard APT as reported by MSFT.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathightest

Forest Blizzard APT - Custom Protocol Handler DLL Registry Set

Detects the setting of the DLL that handles the custom protocol handler. Seen being created by Forest Blizzard APT as reported by MSFT.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathightest

ScreenConnect - SlashAndGrab Exploitation Indicators

Detects indicators of exploitation by threat actors during exploitation of the "SlashAndGrab" vulnerability related to ScreenConnect as reported Team Huntress

WindowsFile Event
TA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Feb 232024
Threat Huntmediumtest

Mail Forwarding/Redirecting Activity In O365

Detects email forwarding or redirecting activity in O365 Audit logs.

Microsoft 365audit
TA0009 · CollectionT1114.003 · Email Forwarding RuleTA0005 · Defense EvasionT1564.008 · Email Hiding Rules+3
RedCanary Team+1Wed Oct 11cloud
Threat Huntlowtest

Okta Password Health Report Query

Detects all activities against the endpoint "/reports/password-health/*" which should only be accessed via OKTA Admin Console UI. Use this rule to hunt for potential suspicious requests. Correlate this event with "admin console" login and alert on requests without any corresponding admin console login

Oktaokta
TA0006 · Credential Accessdetection.threat-hunting
Muhammad FaisalWed Oct 25cloud
Threat Huntmediumtest

Python Path Configuration File Creation - Linux

Detects creation of a Python path configuration file (.pth) in Python library folders, which can be maliciously abused for code execution and persistence. Modules referenced by these files are run at every Python startup (v3.5+), regardless of whether the module is imported by the calling script. Default paths are '\lib\site-packages\*.pth' (Windows) and '/lib/pythonX.Y/site-packages/*.pth' (Unix and macOS).

LinuxFile Event
TA0002 · ExecutionT1059.006 · Pythondetection.threat-hunting
Andreas Braathen (mnemonic.io)Thu Apr 25linux
Threat Huntmediumtest

Terminate Linux Process Via Kill

Detects usage of command line tools such as "kill", "pkill" or "killall" to terminate or signal a running process.

LinuxProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defensesdetection.threat-hunting
Tuan Le (NCSGroup)Thu Mar 16linux
Threat Huntmediumtest

Python Path Configuration File Creation - MacOS

Detects creation of a Python path configuration file (.pth) in Python library folders, which can be maliciously abused for code execution and persistence. Modules referenced by these files are run at every Python startup (v3.5+), regardless of whether the module is imported by the calling script. Default paths are '\lib\site-packages\*.pth' (Windows) and '/lib/pythonX.Y/site-packages/*.pth' (Unix and macOS).

macOSFile Event
TA0002 · ExecutionT1059.006 · Pythondetection.threat-hunting
Andreas Braathen (mnemonic.io)Thu Apr 25macos