Rule Library

Sigma Rules

3,707 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threatlowtest

Potential Exploitation of CVE-2022-21919 or CVE-2021-34484 for LPE

Detects potential exploitation attempts of CVE-2022-21919 or CVE-2021-34484 leading to local privilege escalation via the User Profile Service. During exploitation of this vulnerability, two logs (Provider_Name: Microsoft-Windows-User Profiles Service) with EventID 1511 and 1515 are created (EventID 1515 may generate many false positives). Additionally, the directory \Users\TEMP may be created during exploitation. This behavior was observed on Windows Server 2008.

Windowsapplication
TA0002 · Executiondetection.emerging-threatscve.2022-21919cve.2021-34484
CybexTue Aug 162022
Emerging Threatmediumtest

Potential CVE-2022-22954 Exploitation Attempt - VMware Workspace ONE Access Remote Code Execution

Detects potential exploitation attempt of CVE-2022-22954, a remote code execution vulnerability in VMware Workspace ONE Access and Identity Manager. As reported by Morphisec, part of the attack chain, threat actors used PowerShell commands that executed as a child processes of the legitimate Tomcat "prunsrv.exe" process application.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1059.006 · PythonT1190 · Exploit Public-Facing Application+2
kostastsaleMon Apr 252022
Emerging Threathightest

CVE-2022-24527 Microsoft Connected Cache LPE

Detects files created during the local privilege exploitation of CVE-2022-24527 Microsoft Connected Cache

WindowsFile Event
TA0002 · ExecutionTA0004 · Privilege EscalationT1059.001 · PowerShellcve.2022-24527+1
Florian Roth (Nextron Systems)Wed Apr 132022
Emerging Threathightest

Atlassian Confluence CVE-2022-26134

Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2022-26134

LinuxProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationT1059 · Command and Scripting Interpreter+2
Nasreddine Bencherchali (Nextron Systems)Fri Jun 032022
Emerging Threathightest

Potential CVE-2022-26809 Exploitation Attempt

Detects suspicious remote procedure call (RPC) service anomalies based on the spawned sub processes (long shot to detect the exploitation of vulnerabilities like CVE-2022-26809)

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1569.002 · Service Execution+2
Florian Roth (Nextron Systems)Wed Apr 132022
Emerging Threatmediumtest

Zimbra Collaboration Suite Email Server Unauthenticated RCE

Detects an attempt to leverage the vulnerable servlet "mboximport" for an unauthenticated remote command injection

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-27925detection.emerging-threats
@gott_cyberWed Aug 172022
Emerging Threathightest

Potential CVE-2022-29072 Exploitation Attempt

Detects potential exploitation attempts of CVE-2022-29072, a 7-Zip privilege escalation and command execution vulnerability. 7-Zip version 21.07 and earlier on Windows allows privilege escalation (CVE-2022-29072) and command execution when a file with the .7z extension is dragged to the Help>Contents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process.

WindowsProcess Creation
TA0002 · Executioncve.2022-29072detection.emerging-threats
François HubautSun Apr 172022
Emerging Threathightest

Potential Nimbuspwn Exploit CVE-2022-29799 and CVE-2022-27800

Detects potential exploitation attempts of Nimbuspwn vulnerabilities CVE-2022-29799 and CVE-2022-27800 in Linux systems.

Linux
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationdetection.emerging-threatscve.2022-29799+1
Bhabesh RajWed May 042022
Emerging Threatmediumtest

Suspicious Set Value of MSDT in Registry (CVE-2022-30190)

Detects set value ms-msdt MSProtocol URI scheme in Registry that could be an attempt to exploit CVE-2022-30190.

WindowsRegistry Set
TA0005 · Defense Evasionattack.t1221detection.emerging-threats
Sittikorn SSun May 312022
Emerging Threathightest

CVE-2022-31656 VMware Workspace ONE Access Auth Bypass

Detects the exploitation of VMware Workspace ONE Access Authentication Bypass vulnerability as described in CVE-2022-31656 VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-31656detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Aug 122022
Emerging Threatmediumtest

CVE-2022-31659 VMware Workspace ONE Access RCE

Detects possible exploitation of VMware Workspace ONE Access Admin Remote Code Execution vulnerability as described in CVE-2022-31659

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-31659detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Aug 122022
Emerging Threathightest

Apache Spark Shell Command Injection - ProcessCreation

Detects attempts to exploit an apache spark server via CVE-2014-6287 from a commandline perspective

LinuxProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-33891detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Jul 202022
Emerging Threathightest

Apache Spark Shell Command Injection - Weblogs

Detects attempts to exploit an apache spark server via CVE-2014-6287 from a weblogs perspective

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-33891detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Jul 192022
Emerging Threathightest

Atlassian Bitbucket Command Injection Via Archive API

Detects attempts to exploit the Atlassian Bitbucket Command Injection CVE-2022-36804

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-36804detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Sep 292022
Emerging Threathightest

Potential KDC RC4-HMAC Downgrade Exploit - CVE-2022-37966

Detects the exploitation of a security bypass and elevation of privilege vulnerability with Authentication Negotiation by using weak RC4-HMAC negotiation

Windowssystem
TA0004 · Privilege Escalationdetection.emerging-threatscve.2022-37966
Florian Roth (Nextron Systems)Wed Nov 092022
Emerging Threathightest

Potential OWASSRF Exploitation Attempt - Proxy

Detects exploitation attempt of the OWASSRF variant targeting exchange servers It uses the OWA endpoint to access the powershell backend endpoint

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Dec 222022
Emerging Threatcriticaltest

OWASSRF Exploitation Attempt Using Public POC - Proxy

Detects exploitation attempt of the OWASSRF variant targeting exchange servers using publicly available POC. It uses the OWA endpoint to access the powershell backend endpoint

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Dec 222022
Emerging Threathightest

Potential OWASSRF Exploitation Attempt - Webserver

Detects exploitation attempt of the OWASSRF variant targeting exchange servers It uses the OWA endpoint to access the powershell backend endpoint

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Dec 222022
Emerging Threatcriticaltest

OWASSRF Exploitation Attempt Using Public POC - Webserver

Detects exploitation attempt of the OWASSRF variant targeting exchange servers using publicly available POC. It uses the OWA endpoint to access the powershell backend endpoint

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Dec 222022
Emerging Threathightest

Suspicious Sysmon as Execution Parent

Detects suspicious process executions in which Sysmon itself is the parent of a process, which could be a sign of exploitation (e.g. CVE-2022-41120)

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationcve.2022-41120detection.emerging-threats
Florian Roth (Nextron Systems)+1Thu Nov 102022
Emerging Threathightest

Exploitation Indicator Of CVE-2022-42475

Detects exploitation indicators of CVE-2022-42475 a heap-based buffer overflow in sslvpnd.

fortiossslvpnd
TA0001 · Initial Accesscve.2022-42475detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+2Thu Feb 082022
Emerging Threathightest

Potential Centos Web Panel Exploitation Attempt - CVE-2022-44877

Detects potential exploitation attempts that target the Centos Web Panel 7 Unauthenticated Remote Code Execution CVE-2022-44877

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-44877detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jan 202022
Emerging Threathightest

Potential CVE-2022-46169 Exploitation Attempt

Detects potential exploitation attempts that target the Cacti Command Injection CVE-2022-46169

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-46169detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Dec 272022
Emerging Threathightest

BlueSky Ransomware Artefacts

Detect access to files and shares with names and extensions used by BlueSky ransomware which could indicate a current or previous encryption attempt.

Windowssecurity
TA0040 · ImpactT1486 · Data Encrypted for Impactdetection.emerging-threats
j4sonTue May 232022
Emerging Threathightest

Potential Bumblebee Remote Thread Creation

Detects remote thread injection events based on action seen used by bumblebee

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell+1
Nasreddine Bencherchali (Nextron Systems)Tue Sep 272022
Emerging Threathightest

ChromeLoader Malware Execution

Detects execution of ChromeLoader malware via a registered scheduled task

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+3
kostastsaleMon Jan 102022
Emerging Threathightest

Emotet Loader Execution Via .LNK File

Detects the Emotet Epoch4 loader as reported by @malware_traffic back in 2022. The ".lnk" file was delivered via phishing campaign.

WindowsProcess Creation
TA0002 · ExecutionT1059.006 · Pythondetection.emerging-threats
kostastsaleFri Apr 222022
Emerging Threathightest

Hermetic Wiper TG Process Patterns

Detects process execution patterns found in intrusions related to the Hermetic Wiper malware attacks against Ukraine in February 2022

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocoldetection.emerging-threats
Florian Roth (Nextron Systems)Fri Feb 252022
Emerging Threathightest

Raspberry Robin Subsequent Execution of Commands

Detects raspberry robin subsequent execution of commands.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleFri May 062022
Emerging Threathightest

Raspberry Robin Initial Execution From External Drive

Detects the initial execution of the Raspberry Robin malware from an external drive using "Cmd.EXE".

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleFri May 062022
Emerging Threathightest

Potential Raspberry Robin Dot Ending File

Detects commandline containing reference to files ending with a "." This scheme has been seen used by raspberry-robin

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Oct 282022
Emerging Threathightest

Serpent Backdoor Payload Execution Via Scheduled Task

Detects post exploitation execution technique of the Serpent backdoor. According to Proofpoint, one of the commands that the backdoor ran was via creating a temporary scheduled task using an unusual method. It creates a fictitious windows event and a trigger in which once the event is created, it executes the payload.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+2
kostastsaleMon Mar 212022
Emerging Threathightest

FakeUpdates/SocGholish Activity

Detects initial execution of FakeUpdates/SocGholish malware via wscript that later executes commands via cmd or powershell.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleThu Jun 162022
Emerging Threathightest

MSSQL Extended Stored Procedure Backdoor Maggie

This rule detects the execution of the extended storage procedure backdoor named Maggie in the context of Microsoft SQL server

Windowsapplication
TA0004 · Privilege EscalationTA0003 · PersistenceT1546 · Event Triggered Executiondetection.emerging-threats
Denis Szadkowski+1Sun Oct 092022
Emerging Threathightest

Potential ACTINIUM Persistence Activity

Detects specific process parameters as used by ACTINIUM scheduled task persistence creation.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053 · Scheduled Task/Job+2
Andreas HunkelerMon Feb 072022
Emerging Threathightest

MERCURY APT Activity

Detects suspicious command line patterns seen being used by MERCURY APT

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellG0069 · G0069detection.emerging-threats
Florian Roth (Nextron Systems)Fri Aug 262022
Emerging Threatmediumtest

CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21

Detects potential exploitation attempt of CVE-2023-1389 an Unauthenticated Command Injection in TP-Link Archer AX21.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-1389detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Tue Jun 252023
Emerging Threathightest

Exploitation Indicators Of CVE-2023-20198

Detecting exploitation indicators of CVE-2023-20198 a privilege escalation vulnerability in Cisco IOS XE Software Web UI.

Ciscosyslog
TA0004 · Privilege EscalationTA0001 · Initial Accessdetection.emerging-threats
Lars B. P. Frydenskov (Trifork Security)Fri Oct 202023
Emerging Threathightest

MSMQ Corrupted Packet Encountered

Detects corrupted packets sent to the MSMQ service. Could potentially be a sign of CVE-2023-21554 exploitation

Windowsapplication
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Apr 212023
Emerging Threathightest

CVE-2023-22518 Exploitation Attempt - Suspicious Confluence Child Process (Linux)

Detects exploitation attempt of CVE-2023-22518 (Confluence Data Center / Confluence Server), where an attacker can exploit vulnerable endpoints to e.g. create admin accounts and execute arbitrary commands.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Andreas Braathen (mnemonic.io)Tue Nov 142023
Emerging Threatmediumtest

CVE-2023-22518 Exploitation Attempt - Suspicious Confluence Child Process (Windows)

Detects exploitation attempt of CVE-2023-22518 (Confluence Data Center / Confluence Server), where an attacker can exploit vulnerable endpoints to e.g. create admin accounts and execute arbitrary commands.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Andreas Braathen (mnemonic.io)Tue Nov 142023
Emerging Threatmediumtest

CVE-2023-22518 Exploitation Attempt - Vulnerable Endpoint Connection (Proxy)

Detects exploitation attempt of CVE-2023-22518 (Confluence Data Center / Confluence Server), where an attacker can exploit vulnerable endpoints to e.g. create admin accounts and execute arbitrary commands.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-22518detection.emerging-threats
Andreas Braathen (mnemonic.io)Tue Nov 142023
Emerging Threatmediumtest

CVE-2023-22518 Exploitation Attempt - Vulnerable Endpoint Connection (Webserver)

Detects exploitation attempt of CVE-2023-22518 (Confluence Data Center / Confluence Server), where an attacker can exploit vulnerable endpoints to e.g. create admin accounts and execute arbitrary commands.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-22518detection.emerging-threats
Andreas Braathen (mnemonic.io)Tue Nov 142023
Emerging Threatmediumtest

Potential CVE-2023-2283 Exploitation

Detects potential exploitation attempt of CVE-2023-2283 an authentication bypass in libSSH. The exploitation method causes an error message stating that keys for curve25519 could not be generated. It is an error message that is a sign of an exploitation attempt. It is not a sign of a successful exploitation.

Linuxsshd
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-2283detection.emerging-threats
Florian Roth (Nextron Systems)Fri Jun 092023
Emerging Threatlowtest

Outlook Task/Note Reminder Received

Detects changes to the registry values related to outlook that indicates that a reminder was triggered for a Note or Task item. This could be a sign of exploitation of CVE-2023-23397. Further investigation is required to determine the success of an exploitation.

WindowsRegistry Set
TA0003 · PersistenceT1137 · Office Application Startupcve.2023-23397detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Apr 052023
Emerging Threatcriticaltest

CVE-2023-23397 Exploitation Attempt

Detects outlook initiating connection to a WebDAV or SMB share, which could be a sign of CVE-2023-23397 exploitation.

Windowssecurity
TA0006 · Credential AccessTA0001 · Initial Accesscve.2023-23397detection.emerging-threats
Robert LeeThu Mar 162023
Emerging Threatmediumtest

Potential CVE-2023-23397 Exploitation Attempt - SMB

Detects (failed) outbound connection attempts to internet facing SMB servers. This could be a sign of potential exploitation attempts of CVE-2023-23397.

Windowssmbclient-connectivity
TA0010 · Exfiltrationcve.2023-23397detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Apr 052023
Emerging Threathightest

Potential CVE-2023-23752 Exploitation Attempt

Detects the potential exploitation attempt of CVE-2023-23752 an Improper access check, in web service endpoints in Joomla

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-23752detection.emerging-threats
Bhabesh RajThu Feb 232023