Rule Library

Sigma Rules

3,707 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Potential Pikabot Hollowing Activity

Detects the execution of rundll32 that leads to the invocation of legitimate Windows binaries. The malware Pikabot has been seen to use this technique for process hollowing through hard-coded Windows binaries

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.012 · Process Hollowingdetection.emerging-threats
Andreas Braathen (mnemonic.io)Fri Oct 272023
Emerging Threathightest

Pikabot Fake DLL Extension Execution Via Rundll32.EXE

Detects specific process tree behavior linked to "rundll32" executions, wherein the associated DLL lacks a common ".dll" extension, often signaling potential Pikabot activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
Swachchhanda Shrawan Poudel+1Fri Jan 262023
Emerging Threathightest

Qakbot Regsvr32 Calc Pattern

Detects a specific command line of "regsvr32" where the "calc" keyword is used in conjunction with the "/s" flag. This behavior is often seen used by Qakbot

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri May 262023
Emerging Threathightest

Potential Qakbot Rundll32 Execution

Detects specific process tree behavior of a "rundll32" execution often linked with potential Qakbot activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
X__Junior (Nextron Systems)Wed May 242023
Emerging Threatcriticaltest

Qakbot Rundll32 Exports Execution

Detects specific process tree behavior of a "rundll32" execution with exports linked with Qakbot activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
X__Junior (Nextron Systems)Wed May 242023
Emerging Threatcriticaltest

Qakbot Rundll32 Fake DLL Extension Execution

Detects specific process tree behavior of a "rundll32" execution where the DLL doesn't have the ".dll" extension. This is often linked with potential Qakbot activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
X__Junior (Nextron Systems)+1Wed May 242023
Emerging Threathightest

Qakbot Uninstaller Execution

Detects the execution of the Qakbot uninstaller file mentioned in the USAO-CDCA document on the disruption of the Qakbot malware and botnet

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Florian Roth (Nextron Systems)Thu Aug 312023
Emerging Threatmediumtest

Rhadamanthys Stealer Module Launch Via Rundll32.EXE

Detects the use of Rundll32 to launch an NSIS module that serves as the main stealer capability of Rhadamanthys infostealer, as observed in reports and samples in early 2023

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
TropChaudThu Jan 262023
Emerging Threatcriticaltest

Rorschach Ransomware Execution Activity

Detects Rorschach ransomware execution activity

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellT1059.001 · PowerShellTA0005 · Defense Evasion+1
X__Junior (Nextron Systems)Tue Apr 042023
Emerging Threatcriticaltest

SNAKE Malware Kernel Driver File Indicator

Detects SNAKE malware kernel driver file indicator

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed May 102023
Emerging Threatlowtest

SNAKE Malware Installer Name Indicators

Detects filename indicators associated with the SNAKE malware as reported by CISA in their report

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed May 102023
Emerging Threathightest

SNAKE Malware WerFault Persistence File Creation

Detects the creation of a file named "WerFault.exe" in the WinSxS directory by a non-system process, which can be indicative of potential SNAKE malware activity

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed May 102023
Emerging Threathightest

Potential SNAKE Malware Installation CLI Arguments Indicator

Detects a specific command line arguments sequence seen used by SNAKE malware during its installation as described by CISA in their report

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential SNAKE Malware Installation Binary Indicator

Detects a specific binary name seen used by SNAKE malware during its installation as described by CISA in their report

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential SNAKE Malware Persistence Service Execution

Detects a specific child/parent process relationship indicative of a "WerFault" process running from the "WinSxS" as a service. This could be indicative of potential SNAKE malware activity as reported by CISA.

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

SNAKE Malware Covert Store Registry Key

Detects any registry event that targets the key 'SECURITY\Policy\Secrets\n' which is a key related to SNAKE malware as described by CISA

WindowsRegistry Event
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 112023
Emerging Threatmediumtest

Potential Encrypted Registry Blob Related To SNAKE Malware

Detects the creation of a registry value in the ".wav\OpenWithProgIds" key with an uncommon name. This could be related to SNAKE Malware as reported by CISA

WindowsRegistry Set
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed May 102023
Emerging Threatcriticaltest

SNAKE Malware Service Persistence

Detects the creation of a service named "WerFaultSvc" which seems to be used by the SNAKE malware as a persistence mechanism as described by CISA in their report

Windowssystem
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed May 102023
Emerging Threathightest

Ursnif Redirection Of Discovery Commands

Detects the redirection of Ursnif discovery commands as part of the initial execution of the malware.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
kostastsaleSun Jul 162023
Emerging Threathightest

Potential SocGholish Second Stage C2 DNS Query

Detects a DNS query initiated from a "wscript" process for domains matching a specific pattern that was seen being used by SocGholish for its Command and Control traffic

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002detection.emerging-threats
Dusty MillerThu Feb 232023
Emerging Threathightest

Potential Compromised 3CXDesktopApp Beaconing Activity - DNS

Detects potential beaconing activity to domains related to 3CX 3CXDesktopApp compromise

WindowsDNS Query
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 292023
Emerging Threatcriticaltest

Malicious DLL Load By Compromised 3CXDesktopApp

Detects DLL load activity of known compromised DLLs used in by the compromised 3CXDesktopApp

WindowsImage Load (DLL)
TA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Mar 312023
Emerging Threathightest

Potential Compromised 3CXDesktopApp Beaconing Activity - Netcon

Detects potential beaconing activity to domains related to 3CX 3CXDesktopApp compromise

WindowsNetwork Connection
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 292023
Emerging Threathightest

Potential Compromised 3CXDesktopApp Execution

Detects execution of known compromised version of 3CXDesktopApp

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 292023
Emerging Threathightest

Potential Suspicious Child Process Of 3CXDesktopApp

Detects potential suspicious child processes of "3CXDesktopApp.exe". Which could be related to the 3CXDesktopApp supply chain compromise

WindowsProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Nasreddine Bencherchali (Nextron Systems)Wed Mar 292023
Emerging Threathightest

Potential Compromised 3CXDesktopApp Update Activity

Detects the 3CXDesktopApp updater downloading a known compromised version of the 3CXDesktopApp software

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 292023
Emerging Threathightest

Potential Compromised 3CXDesktopApp Beaconing Activity - Proxy

Detects potential beaconing activity to domains related to 3CX 3CXDesktopApp compromise

Proxy Log
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 292023
Emerging Threathightest

Potential Compromised 3CXDesktopApp ICO C2 File Download

Detects potential malicious .ICO files download from a compromised 3CXDesktopApp via web requests to the the malicious Github repository

Proxy Log
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Mar 312023
Emerging Threatmediumtest

DLL Names Used By SVR For GraphicalProton Backdoor

Hunts known SVR-specific DLL names.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking+1
CISAMon Dec 182023
Emerging Threathightest

Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor

Hunts for known SVR-specific scheduled task names

Windowssecurity
TA0003 · Persistencedetection.emerging-threats
CISAMon Dec 182023
Emerging Threathightest

Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor - Task Scheduler

Hunts for known SVR-specific scheduled task names

Windowstaskscheduler
TA0003 · Persistencedetection.emerging-threats
CISAMon Dec 182023
Emerging Threathightest

Diamond Sleet APT DNS Communication Indicators

Detects DNS queries related to Diamond Sleet APT activity

WindowsDNS Query
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Diamond Sleet APT File Creation Indicators

Detects file creation activity that is related to Diamond Sleet APT activity

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Diamond Sleet APT DLL Sideloading Indicators

Detects DLL sideloading activity seen used by Diamond Sleet APT

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking+1
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Diamond Sleet APT Process Activity Indicators

Detects process creation activity indicators related to Diamond Sleet APT

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Diamond Sleet APT Scheduled Task Creation - Registry

Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability

WindowsRegistry Event
TA0005 · Defense EvasionT1562 · Impair Defensesdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threatcriticaltest

Diamond Sleet APT Scheduled Task Creation

Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability

Windowssecurity
TA0002 · ExecutionTA0004 · Privilege EscalationTA0003 · PersistenceT1053.005 · Scheduled Task+1
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

Potential Operation Triangulation C2 Beaconing Activity - DNS

Detects potential beaconing activity to domains used in 0day attacks on iOS devices and revealed by Kaspersky and the FSB

dns
TA0011 · Command and ControlG0020 · G0020detection.emerging-threats
Florian Roth (Nextron Systems)Thu Jun 012023
Emerging Threathightest

Potential Operation Triangulation C2 Beaconing Activity - Proxy

Detects potential beaconing activity to domains used in 0day attacks on iOS devices and revealed by Kaspersky and the FSB

Proxy Log
TA0011 · Command and ControlG0020 · G0020detection.emerging-threats
Florian Roth (Nextron Systems)Thu Jun 012023
Emerging Threathightest

Potential APT FIN7 Related PowerShell Script Created

Detects PowerShell script file creation with specific name or suffix which was seen being used often by FIN7 PowerShell scripts

WindowsFile Event
TA0002 · ExecutionG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential APT FIN7 POWERHOLD Execution

Detects execution of the POWERHOLD script seen used by FIN7 as reported by WithSecureLabs

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential POWERTRASH Script Execution

Detects potential execution of the PowerShell script POWERTRASH

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential APT FIN7 Reconnaissance/POWERTRASH Related Activity

Detects specific command line execution used by FIN7 as reported by WithSecureLabs for reconnaissance and POWERTRASH execution

WindowsProcess Creation
TA0002 · ExecutionG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Lace Tempest File Indicators

Detects PowerShell script file creation with specific names or suffixes which was seen being used often in PowerShell scripts by FIN7

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest PowerShell Evidence Eraser

Detects a PowerShell script used by Lace Tempest APT to erase evidence from victim servers by exploiting CVE-2023-47246 as reported by SysAid Team

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest PowerShell Launcher

Detects a PowerShell script used by Lace Tempest APT to launch their malware loader by exploiting CVE-2023-47246 as reported by SysAid Team

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest Cobalt Strike Download

Detects specific command line execution used by Lace Tempest to download Cobalt Strike as reported by SysAid Team

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest Malware Loader Execution

Detects execution of a specific binary based on filename and hash used by Lace Tempest to load additional malware as reported by SysAid Team

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023