Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Threat Huntmediumtest

Clipboard Data Collection Via Pbpaste

Detects execution of the "pbpaste" utility, which retrieves the contents of the clipboard (a.k.a. pasteboard) and writes them to the standard output (stdout). The utility is often used for creating new files with the clipboard content or for piping clipboard contents to other commands. It can also be used in shell scripts that may require clipboard content as input. Attackers can abuse this utility in order to collect data from the user clipboard, which may contain passwords or sensitive information. Use this rule to hunt for potential abuse of the utility by looking at the parent process and any potentially suspicious command line content.

macOSProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1115 · Clipboard Datadetection.threat-hunting
Daniel CortezTue Jul 30macos
Threat Huntmediumtest

.Class Extension URI Ending Request

Detects requests to URI ending with the ".class" extension in proxy logs. This could rules can be used to hunt for potential downloads of Java classes as seen for example in Log4shell exploitation attacks against Log4j.

Proxy Log
TA0001 · Initial Accessdetection.threat-hunting
Andreas HunkelerTue Dec 21web
Threat Huntlowtest

Firewall Rule Modified In The Windows Firewall Exception List

Detects when a rule has been modified in the Windows firewall exception list

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautSat Feb 19windows
Threat Huntmediumtest

Potential Remote WMI ActiveScriptEventConsumers Activity

Detect potential adversaries leveraging WMI ActiveScriptEventConsumers remotely to move laterally in a network. This event is best correlated and used as an enrichment to determine the potential lateral movement activity.

Windowssecurity
TA0008 · Lateral MovementTA0004 · Privilege Escalationdetection.threat-huntingTA0003 · Persistence+1
Roberto Rodriguez (Cyb3rWard0g)+1Wed Sep 02windows
Threat Huntlowtest

Access To Browser Credential Files By Uncommon Applications - Security

Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing This rule requires heavy baselining before usage.

Windowssecurity
TA0006 · Credential AccessT1555.003 · Credentials from Web Browsersdetection.threat-hunting
Daniel Koifman+1Mon Oct 21windows
Threat Huntlowtest

Scheduled Task Deletion

Detects scheduled task deletion events. Scheduled tasks are likely to be deleted if not used for persistence. Malicious Software often creates tasks directly under the root node e.g. \TASKNAME

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · Persistence2013-08-001 · CAR 2013-08-001+2
David Strassegger+1Fri Jan 22windows
Threat Huntmediumtest

CreateRemoteThread API and LoadLibrary

Detects potential use of CreateRemoteThread api and LoadLibrary function to inject DLL into a process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library Injectiondetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sun Aug 11windows
Threat Huntmediumtest

Remote Thread Creation Via PowerShell

Detects the creation of a remote thread from a Powershell process to another process

WindowsRemote Thread Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Nikita Nazarov+1Tue Oct 06windows
Threat Huntmediumtest

Remote Thread Created In Shell Application

Detects remote thread creation in command shell applications, such as "Cmd.EXE" and "PowerShell.EXE". It is a common technique used by malware, such as IcedID, to inject malicious code and execute it within legitimate processes.

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
Splunk Research TeamMon Jul 29windows
Threat Huntlowtest

Access To Chromium Browsers Sensitive Files By Uncommon Applications

Detects file access requests to chromium based browser sensitive files by uncommon processes. Could indicate potential attempt of stealing sensitive information.

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
X__Junior (Nextron Systems)Mon Jul 29windows
Threat Huntlowtest

Access To Browser Credential Files By Uncommon Applications

Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
François Hubaut+1Sat Apr 09windows
Threat Huntlowtest

Access To Windows Outlook Mail Files By Uncommon Applications

Detects file access requests to Windows Outlook Mail by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1070.008 · Clear Mailbox DataTA0005 · Defense Evasiondetection.threat-hunting
François HubautFri May 10windows
Threat Huntmediumtest

Access To Sysvol Policies Share By Uncommon Process

Detects file access requests to the Windows Sysvol Policies Share by uncommon processes

Windowsfile_access
TA0006 · Credential AccessT1552.006 · Group Policy Preferencesdetection.threat-hunting
François HubautThu Dec 21windows
Threat Huntlowtest

Access To .Reg/.Hive Files By Uncommon Applications

Detects file access requests to files ending with either the ".hive"/".reg" extension, usually associated with Windows Registry backups.

Windowsfile_access
T1112 · Modify RegistryTA0005 · Defense EvasionTA0003 · Persistencedetection.threat-hunting
François HubautFri Sep 15windows
Threat Huntlowtest

Unattend.XML File Access Attempt

Detects attempts to access the "unattend.xml" file, where credentials might be stored. This file is used during the unattended windows install process.

Windowsfile_access
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
François HubautMon Jul 22windows
Threat Huntlowtest

File Creation Date Changed to Another Year

Detects when the file creation time is changed to a year before 2020. Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system. Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity. In order to use this rule in production, it is recommended first baseline normal behavior in your environment and then tune the rule accordingly. Hunting Recommendation: Focus on files with creation times set to years significantly before the current date, especially those in user-writable directories. Correlate with process execution logs to identify the source of the modification and investigate any unsigned or suspicious binaries involved.

WindowsFile Change
T1070.006 · TimestompTA0005 · Defense Evasiondetection.threat-hunting
François Hubaut+1Fri Aug 12windows
Threat Huntlowtest

ADS Zone.Identifier Deleted

Detects the deletion of the "Zone.Identifier" ADS. Attackers can leverage this in order to bypass security restrictions that make use of the ADS such as Microsoft Office apps.

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletiondetection.threat-hunting
François HubautMon Sep 04windows
Threat Huntlowtest

DMP/HDMP File Creation

Detects the creation of a file with the ".dmp"/".hdmp" extension. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.

WindowsFile Event
TA0005 · Defense Evasiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Sep 07windows
Threat Huntlowtest

PFX File Creation

Detects the creation of PFX files (Personal Information Exchange format). PFX files contain private keys and certificates bundled together, making them valuable targets for attackers seeking to: - Exfiltrate digital certificates for impersonation or signing malicious code - Establish persistent access through certificate-based authentication - Bypass security controls that rely on certificate validation Analysts should investigate PFX file creation events by examining which process created the PFX file and its parent process chain, as well as unusual locations outside standard certificate stores or development environments.

WindowsFile Event
TA0006 · Credential AccessT1552.004 · Private Keysdetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Threat Huntmediumtest

Python Path Configuration File Creation - Windows

Detects creation of a Python path configuration file (.pth) in Python library folders, which can be maliciously abused for code execution and persistence. Modules referenced by these files are run at every Python startup (v3.5+), regardless of whether the module is imported by the calling script. Default paths are '\lib\site-packages\*.pth' (Windows) and '/lib/pythonX.Y/site-packages/*.pth' (Unix and macOS).

WindowsFile Event
TA0002 · ExecutionT1059.006 · Pythondetection.threat-hunting
Andreas Braathen (mnemonic.io)+1Thu Apr 25windows
Threat Huntlowtest

Scheduled Task Created - FileCreation

Detects the creation of a scheduled task via file creation.

WindowsFile Event
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+3
Center for Threat Informed Defense (CTID) Summiting the Pyramid TeamWed Sep 27windows
Threat Huntlowtest

Creation of an Executable by an Executable

Detects the creation of an executable by another executable.

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malwaredetection.threat-hunting
François HubautWed Mar 09windows
Threat Huntmediumtest

VsCode Code Tunnel Execution File Indicator

Detects the creation of a file with the name "code_tunnel.json" which indicate execution and usage of VsCode tunneling utility. Attackers can abuse this functionality to establish a C2 channel

WindowsFile Event
TA0011 · Command and Controldetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25windows
Threat Huntmediumtest

WebDAV Temporary Local File Creation

Detects the creation of WebDAV temporary files with potentially suspicious extensions

WindowsFile Event
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing+1
Micah BabinskiMon Aug 21windows
Threat Huntmediumtest

Non-DLL Extension File Renamed With DLL Extension

Detects rename operations of files with non-DLL extensions to files with a DLL extension. This is often performed by malware in order to avoid initial detections based on extensions.

WindowsFile Rename
TA0005 · Defense EvasionT1036.008 · Masquerade File Typedetection.threat-hunting
François HubautSat Feb 19windows
Threat Huntlowtest

Amsi.DLL Load By Uncommon Process

Detects loading of Amsi.dll by uncommon processes

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0040 · ImpactT1490 · Inhibit System Recoverydetection.threat-hunting
François HubautSun Mar 12windows
Threat Huntmediumtest

Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process

Detects the load of dbghelp/dbgcore DLL by a potentially uncommon or potentially suspicious process. The Dbghelp and Dbgcore DLLs export functions that allow for the dump of process memory. Tools like ProcessHacker, Task Manager and some attacker tradecraft use the MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity C2 Framework has a module that leverages this API to dump the contents of Lsass.exe and transfer it over the network back to the attacker's machine. Keep in mind that many legitimate Windows processes and services might load the aforementioned DLLs for debugging or other related purposes. Investigate the CommandLine and the Image location of the process loading the DLL.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003.001 · LSASS Memorydetection.threat-hunting
Perez Diego+2Sun Oct 27windows
Threat Huntlowtest

System Drawing DLL Load

Detects processes loading "System.Drawing.ni.dll". This could be an indicator of potential Screen Capture.

WindowsImage Load (DLL)
TA0009 · CollectionT1113 · Screen Capturedetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Threat Huntlowtest

Task Scheduler DLL Loaded By Application Located In Potentially Suspicious Location

Detects the loading of the "taskschd.dll" module from a process that located in a potentially suspicious or uncommon directory. The loading of this DLL might indicate that the application have the capability to create a scheduled task via the "Schedule.Service" COM object. Investigation of the loading application and its behavior is required to determining if its malicious.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1053.005 · Scheduled Task+1
Swachchhanda Shrawan PoudelMon Sep 02windows
Threat Huntlowtest

Microsoft Excel Add-In Loaded

Detects Microsoft Excel loading an Add-In (.xll) file

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious Filedetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Fri May 12windows
Threat Huntlowtest

Microsoft Word Add-In Loaded

Detects Microsoft Word loading an Add-In (.wll) file which can be used by threat actors for initial access or persistence.

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious Filedetection.threat-hunting
Steffen Rogge (dr0pd34d)Wed Jul 10windows
Threat Huntlowtest

WMI Module Loaded By Uncommon Process

Detects WMI modules being loaded by an uncommon process

WindowsImage Load (DLL)
TA0002 · ExecutionT1047 · Windows Management Instrumentationdetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sat Aug 10windows
Threat Huntmediumtest

Dfsvc.EXE Network Connection To Non-Local IPs

Detects network connections from "dfsvc.exe" used to handled ClickOnce applications to non-local IPs

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Hunthightest

Dfsvc.EXE Initiated Network Connection Over Uncommon Port

Detects an initiated network connection over uncommon ports from "dfsvc.exe". A utility used to handled ClickOnce applications.

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Executiondetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Threat Huntmediumtest

Dllhost.EXE Initiated Network Connection To Non-Local IP Address

Detects Dllhost.EXE initiating a network connection to a non-local IP address. Aside from Microsoft own IP range that needs to be excluded. Network communication from Dllhost will depend entirely on the hosted DLL. An initial baseline is recommended before deployment.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · ExecutionT1559.001 · Component Object Model+1
bartblazeMon Jul 13windows
Threat Huntmediumtest

HH.EXE Initiated HTTP Network Connection

Detects a network connection initiated by the "hh.exe" process to HTTP destination ports, which could indicate the execution/download of remotely hosted .chm files.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.001 · Compiled HTML Filedetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Wed Oct 05windows
Threat Huntlowtest

Msiexec.EXE Initiated Network Connection Over HTTP

Detects a network connection initiated by an "Msiexec.exe" process over port 80 or 443. Adversaries might abuse "msiexec.exe" to install and execute remotely hosted packages. Use this rule to hunt for potentially anomalous or suspicious communications.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.007 · Msiexecdetection.threat-hunting
François HubautSun Jan 16windows
Threat Huntlowtest

Network Connection Initiated By PowerShell Process

Detects a network connection that was initiated from a PowerShell process. Often times malicious powershell scripts download additional payloads or communicate back to command and control channels via uncommon ports or IPs. Use this rule as a basis for hunting for anomalies.

WindowsNetwork Connection
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Florian Roth (Nextron Systems)Mon Mar 13windows
Threat Huntmediumtest

Potentially Suspicious Azure Front Door Connection

Detects connections with Azure Front Door (known legitimate service that can be leveraged for C2) that fall outside of known benign behavioral baseline (not using common apps or common azurefd.net endpoints)

WindowsNetwork Connection
TA0011 · Command and ControlT1102.002 · Bidirectional CommunicationT1090.004 · Domain Frontingdetection.threat-hunting
Isaac DunhamThu Nov 07windows
Threat Huntmediumtest

Network Connection Initiated From Users\Public Folder

Detects a network connection initiated from a process located in the "C:\Users\Public" folder. Attacker are known to drop their malicious payloads and malware in this directory as its writable by everyone. Use this rule to hunt for potential suspicious or uncommon activity in your environement.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Fri May 31windows
Threat Huntlowtest

PsExec Default Named Pipe

Detects PsExec service default pipe creation

WindowsNamed Pipe Created
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029detection.threat-hunting
Thomas PatzkeMon Jun 12windows
Threat Huntmediumtest

Uncommon PowerShell Hosts

Detects alternate PowerShell hosts potentially bypassing detections looking for powershell.exe

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)Sun Aug 11windows
Threat Huntlowtest

bXOR Operator Usage In PowerShell Command Line - PowerShell Classic

Detects powershell execution with that make use of to the bxor (Bitwise XOR). Attackers might use as an alternative obfuscation method to Base64 encoded commands. Investigate the CommandLine and process tree to determine if the activity is malicious.

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Teymur Kheirkhabarov+1Mon Jun 29windows
Threat Huntlowtest

Local Firewall Rules Enumeration Via NetFirewallRule Cmdlet

Detects execution of "Get-NetFirewallRule" or "Show-NetFirewallRule" to enumerate the local firewall rules on a host.

WindowsPowerShell Module
detection.threat-huntingTA0007 · DiscoveryT1518.001 · Security Software DiscoveryT1016 · System Network Configuration Discovery
Christopher Peacock+1Thu Jul 13windows
Threat Huntlowtest

Compress-Archive Cmdlet Execution

Detects PowerShell scripts that make use of the "Compress-Archive" cmdlet in order to compress folders and files. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Script
TA0010 · ExfiltrationTA0009 · CollectionT1560 · Archive Collected Datadetection.threat-hunting
Timur Zinniatullin+1Mon Oct 21windows
Threat Huntmediumtest

Windows Mail App Mailbox Access Via PowerShell Script

Detects PowerShell scripts that try to access the default Windows MailApp MailBox. This indicates manipulation of or access to the stored emails of a user. E.g. this could be used by an attacker to exfiltrate or delete the content of the emails.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.008 · Clear Mailbox Datadetection.threat-hunting
François HubautSat Jul 08windows
Threat Huntlowtest

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock

Detects when a powershell script contains calls to the "New-NetFirewallRule" cmdlet in order to add a new firewall rule with an "Allow" action.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautFri May 10windows
Threat Huntmediumtest

SMB over QUIC Via PowerShell Script

Detects the mounting of Windows SMB shares over QUIC, which can be an unexpected event in some enterprise environments

WindowsPowerShell Script
TA0008 · Lateral MovementT1570 · Lateral Tool Transferdetection.threat-hunting
François HubautFri Jul 21windows