Rule Library

Sigma Rules

889 rules found for "persistence"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Cloudflared Tunnels Related DNS Requests

Detects DNS requests to Cloudflared tunnels domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed Dec 20windows
Detectionmediumtest

DNS Query To Devtunnels Domain

Detects DNS query requests to Devtunnels domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1572 · Protocol Tunneling
citron_ninjaWed Oct 25windows
Detectionhightest

DNS HybridConnectionManager Service Bus

Detects Azure Hybrid Connection Manager services querying the Azure service bus service

WindowsDNS Query
TA0003 · PersistenceT1554 · Compromise Host Software Binary
Roberto Rodriguez (Cyb3rWard0g)+1Mon Apr 12windows
Detectionhighexperimental

Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing

Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.

WindowsDNS Query
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20windows
Detectionmediumtest

DNS Query To Visual Studio Code Tunnels Domain

Detects DNS query requests to Visual Studio Code tunnel domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web Protocols
citron_ninjaWed Oct 25windows
Detectionhightest

Malicious Driver Load

Detects loading of known malicious drivers via their hash.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows
Detectionmediumtest

Malicious Driver Load By Name

Detects loading of known malicious drivers via the file name of the drivers.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Mon Oct 03windows
Detectionhightest

PUA - Process Hacker Driver Load

Detects driver load of the Process Hacker tool

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege Escalationcve.2021-21551T1543 · Create or Modify System Process
Florian Roth (Nextron Systems)Wed Nov 16windows
Detectionmediumtest

PUA - System Informer Driver Load

Detects driver load of the System Informer tool

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Florian Roth (Nextron Systems)Mon May 08windows
Detectionhightest

Driver Load From A Temporary Directory

Detects a driver load from a temporary directory

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Florian Roth (Nextron Systems)Sun Feb 12windows
Detectionhightest

Vulnerable Driver Load

Detects loading of known vulnerable drivers via their hash.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows
Detectionlowtest

Vulnerable Driver Load By Name

Detects the load of known vulnerable drivers via the file name of the drivers.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Mon Oct 03windows
Detectionhightest

Vulnerable HackSys Extreme Vulnerable Driver Load

Detects the load of HackSys Extreme Vulnerable Driver which is an intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level and often abused by threat actors

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows
Detectionhightest

Vulnerable WinRing0 Driver Load

Detects the load of a signed WinRing0 driver often used by threat actors, crypto miners (XMRIG) or malware for privilege escalation

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Florian Roth (Nextron Systems)Tue Jul 26windows
Detectionhightest

Unusual File Modification by dns.exe

Detects an unexpected file being modified by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

WindowsFile Change
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionhightest

Unusual File Deletion by Dns.exe

Detects an unexpected file being deleted by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

WindowsFile Delete
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Tim Rauch+1Tue Sep 27windows
Detectionhighexperimental

Suspicious File Created by ArcSOC.exe

Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS server, creates a file with suspicious file type, indicating that it may be an executable, script file, or otherwise unusual.

WindowsFile Event
TA0005 · Defense EvasionTA0011 · Command and ControlTA0003 · PersistenceTA0001 · Initial Access+3
Micah BabinskiTue Nov 25windows
Detectionmediumtest

Creation Of Non-Existent System DLL

Detects creation of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes. Phantom DLL hijacking involves placing malicious DLLs with names of non-existent system binaries in locations where legitimate applications may search for them, leading to execution of the malicious DLLs. Thus, the creation of such DLLs may indicate preparation for phantom DLL hijacking attacks.

WindowsFile Event
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Thu Dec 01windows
Detectionmediumtest

New Custom Shim Database Created

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backward compatibility of software as the operating system codebase changes over time.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
François Hubaut+1Wed Dec 29windows
Detectionmediumtest

Suspicious Screensaver Binary File Creation

Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.002 · Screensaver
François HubautWed Dec 29windows
Detectionhightest

Creation Exe for Service with Unquoted Path

Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in a higher level directory within the path, so that Windows will choose the adversary's executable to launch.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
François HubautThu Dec 30windows
Detectionmediumtest

Desktop.INI Created by Uncommon Process

Detects unusual processes accessing desktop.ini, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
Maxime Thiebaut+1Thu Mar 19windows
Detectionhightest

DLL Search Order Hijackig Via Additional Space in Path

Detects when an attacker create a similar folder structure to windows system folders such as (Windows, Program Files...) but with a space in order to trick DLL load search order and perform a "DLL Search Order Hijacking" attack

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
François Hubaut+1Sat Jul 30windows
Detectionmediumtest

Potential Persistence Attempt Via ErrorHandler.Cmd

Detects creation of a file named "ErrorHandler.cmd" in the "C:\WINDOWS\Setup\Scripts\" directory which could be used as a method of persistence The content of C:\WINDOWS\Setup\Scripts\ErrorHandler.cmd is read whenever some tools under C:\WINDOWS\System32\oobe\ (e.g. Setup.exe) fail to run for any reason.

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Aug 09windows
Detectionhightest

Suspicious ASPX File Drop by Exchange

Detects suspicious file type dropped by an Exchange component in IIS into a suspicious folder

WindowsFile Event
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+2Sat Oct 01windows
Detectionmediumtest

Suspicious File Drop by Exchange

Detects suspicious file type dropped by an Exchange component in IIS

WindowsFile Event
TA0003 · PersistenceT1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessT1505.003 · Web Shell
Florian Roth (Nextron Systems)Tue Oct 04windows
Detectioncriticaltest

HackTool - Mimikatz Kirbi File Creation

Detects the creation of files created by mimikatz such as ".kirbi", "mimilsa.log", etc.

WindowsFile Event
TA0006 · Credential AccessT1558 · Steal or Forge Kerberos Tickets
Florian Roth (Nextron Systems)+1Mon Nov 08windows
Detectionhightest

HackTool - Powerup Write Hijack DLL

Powerup tool's Write Hijack DLL exploits DLL hijacking for privilege escalation. In it's default mode, it builds a self deleting .bat file which executes malicious command. The detection rule relies on creation of the malicious bat file (debug.bat by default).

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Subhash PopuriSat Aug 21windows
Detectionmediumtest

Potential Initial Access via DLL Search Order Hijacking

Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious module via DLL search order hijacking.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1566 · PhishingT1566.001 · Spearphishing Attachment+4
Tim Rauch+1Fri Oct 21windows
Detectionhightest

Malicious DLL File Dropped in the Teams or OneDrive Folder

Detects creation of a malicious DLL file in the location where the OneDrive or Team applications Upon execution of the Teams or OneDrive application, the dropped malicious DLL file ("iphlpapi.dll") is sideloaded

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
François HubautFri Aug 12windows
Detectionhightest

File Creation In Suspicious Directory By Msdt.EXE

Detects msdt.exe creating files in suspicious directories which could be a sign of exploitation of either Follina or Dogwalk vulnerabilities

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Foldercve.2022-30190
Vadim Varganov+1Wed Aug 24windows
Detectionmediumtest

Potential Persistence Via Notepad++ Plugins

Detects creation of new ".dll" files inside the plugins directory of a notepad++ installation by a process other than "gup.exe". Which could indicates possible persistence

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Fri Jun 10windows
Detectionhightest

Potential Persistence Via Microsoft Office Add-In

Detects potential persistence activity via startup add-ins that load when Microsoft Office starts (.wll/.xll are simply .dll fit for Word or Excel).

WindowsFile Event
TA0003 · PersistenceT1137.006 · Add-ins
NVISOMon May 11windows
Detectionmediumtest

New Outlook Macro Created

Detects the creation of a macro file for Outlook.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
@scoubimtlMon Apr 05windows
Detectionhightest

Potential Persistence Via Outlook Form

Detects the creation of a new Outlook form which can contain malicious code

WindowsFile Event
TA0003 · PersistenceT1137.003 · Outlook Forms
Tobias MichalskiThu Jun 10windows
Detectionhightest

Suspicious Outlook Macro Created

Detects the creation of a macro file for Outlook.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionhightest

Potential Persistence Via Microsoft Office Startup Folder

Detects creation of Microsoft Office files inside of one of the default startup folders in order to achieve persistence.

WindowsFile Event
TA0003 · PersistenceT1137 · Office Application Startup
Max Altgelt (Nextron Systems)+1Thu Jun 02windows
Detectionmediumtest

Potential Binary Or Script Dropper Via PowerShell

Detects PowerShell creating a binary executable or a script file.

WindowsFile Event
TA0003 · Persistence
François Hubaut+1Fri Mar 17windows
Detectionlowtest

PowerShell Script Dropped Via PowerShell.EXE

Detects PowerShell creating a PowerShell file (.ps1). While often times this behavior is benign, sometimes it can be a sign of a dropper script trying to achieve persistence.

WindowsFile Event
TA0003 · Persistence
François HubautTue May 09windows
Detectionlowtest

PowerShell Module File Created

Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc.

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

Potential Suspicious PowerShell Module File Created

Detects the creation of a new PowerShell module in the first folder of the module directory structure "\WindowsPowerShell\Modules\malware\malware.psm1". This is somewhat an uncommon practice as legitimate modules often includes a version folder.

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

PowerShell Module File Created By Non-PowerShell Process

Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc. by a non-PowerShell process

WindowsFile Event
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionhightest

Potential Startup Shortcut Persistence Via PowerShell.EXE

Detects PowerShell writing startup shortcuts. This procedure was highlighted in Red Canary Intel Insights Oct. 2021, "We frequently observe adversaries using PowerShell to write malicious .lnk files into the startup directory to establish persistence. Accordingly, this detection opportunity is likely to identify persistence mechanisms in multiple threats. In the context of Yellow Cockatoo, this persistence mechanism eventually launches the command-line script that leads to the installation of a malicious DLL"

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Christopher Peacock+1Sun Oct 24windows
Detectionhightest

Potential RipZip Attack on Startup Folder

Detects a phishing attack which expands a ZIP file containing a malicious shortcut. If the victim expands the ZIP file via the explorer process, then the explorer process expands the malicious ZIP file and drops a malicious shortcut redirected to a backdoor into the Startup folder. Additionally, the file name of the malicious shortcut in Startup folder contains {0AFACED1-E828-11D1-9187-B532F1E9575D} meaning the folder shortcut operation.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
GregThu Jul 21windows
Detectionmediumtest

Startup Folder File Write

A General detection for files being created in the Windows startup directory. This could be an indicator of persistence.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Suspicious MSExchangeMailboxReplication ASPX Write

Detects suspicious activity in which the MSExchangeMailboxReplication process writes .asp and .apsx files to disk, which could be a sign of ProxyShell exploitation

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionmediumexperimental

Suspicious File Write to Webapps Root Directory

Detects suspicious file writes to the root directory of web applications, particularly Apache web servers or Tomcat servers. This may indicate an attempt to deploy malicious files such as web shells or other unauthorized scripts.

WindowsFile Event
TA0003 · PersistenceT1505.003 · Web ShellTA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Oct 20windows
Detectionhighexperimental

Suspicious File Write to SharePoint Layouts Directory

Detects suspicious file writes to SharePoint layouts directory which could indicate webshell activity or post-exploitation. This behavior has been observed in the exploitation of SharePoint vulnerabilities such as CVE-2025-49704, CVE-2025-49706 or CVE-2025-53770.

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · PersistenceT1505.003 · Web Shell
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Jul 24windows