Rule Library

Sigma Rules

1,585 rules found for "defense-evasion"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Microsoft Defender Blocked from Loading Unsigned DLL

Detects Code Integrity (CI) engine blocking Microsoft Defender's processes (MpCmdRun and NisSrv) from loading unsigned DLLs which may be an attempt to sideload arbitrary DLL

Windowssecurity-mitigations
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Bhabesh RajTue Aug 02windows
Detectionhightest

Unsigned Binary Loaded From Suspicious Location

Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations

Windowssecurity-mitigations
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Wed Aug 03windows
Detectionhightest

Sysmon Application Crashed

Detects application popup reporting a failure of the Sysmon service

Windowssystem
TA0005 · Defense EvasionT1562 · Impair Defenses
Tim SheltonTue Apr 26windows
Detectionmediumtest

NTLMv1 Logon Between Client and Server

Detects the reporting of NTLMv1 being used between a client and server. NTLMv1 is insecure as the underlying encryption algorithms can be brute-forced by modern hardware.

Windowssystem
TA0005 · Defense EvasionTA0008 · Lateral MovementT1550.002 · Pass the Hash
Tim Shelton+1Tue Apr 26windows
Detectionlowtest

Active Directory Certificate Services Denied Certificate Enrollment Request

Detects denied requests by Active Directory Certificate Services. Example of these requests denial include issues with permissions on the certificate template or invalid signatures.

Windowssystem
TA0006 · Credential AccessTA0005 · Defense EvasionT1553.004 · Install Root Certificate
@serkinvaleryThu Mar 07windows
Detectionhightest

DHCP Server Loaded the CallOut DLL

This rule detects a DHCP server in which a specified Callout DLL (in registry) was loaded

Windowssystem
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Dimitrios SlamarisMon May 15windows
Detectionhightest

DHCP Server Error Failed Loading the CallOut DLL

This rule detects a DHCP server error in which a specified Callout DLL (in registry) could not be loaded

Windowssystem
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Dimitrios SlamarisMon May 15windows
Detectionmediumtest

Eventlog Cleared

One of the Windows Eventlogs has been cleared. e.g. caused by "wevtutil cl" command execution

Windowssystem
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs2016-04-002 · CAR 2016-04-002
Florian Roth (Nextron Systems)Tue Jan 10windows
Detectionhightest

Important Windows Eventlog Cleared

Detects the clearing of one of the Windows Core Eventlogs. e.g. caused by "wevtutil cl" command execution

Windowssystem
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs2016-04-002 · CAR 2016-04-002
Florian Roth (Nextron Systems)+2Tue May 17windows
Detectionhightest

Vulnerable Netlogon Secure Channel Connection Allowed

Detects that a vulnerable Netlogon secure channel connection was allowed, which could be an indicator of CVE-2020-1472.

Windowssystem
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
NVISOTue Sep 15windows
Detectionmediumstable

Windows Defender Threat Detection Service Disabled

Detects when the "Windows Defender Threat Protection" service is disabled.

Windowssystem
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

Invoke-Obfuscation CLIP+ Launcher - System

Detects Obfuscated use of Clip.exe to execute PowerShell

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Tue Oct 13windows
Detectionhightest

Invoke-Obfuscation Obfuscated IEX Invocation - System

Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the code block linked in the references

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Daniel Bohannon ( / )+1Fri Nov 08windows
Detectionhightest

Invoke-Obfuscation STDIN+ Launcher - System

Detects Obfuscated use of stdin to execute PowerShell

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionhightest

Invoke-Obfuscation VAR+ Launcher - System

Detects Obfuscated use of Environment Variables to execute PowerShell

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Jonathan Cheong+1Thu Oct 15windows
Detectionmediumtest

Invoke-Obfuscation COMPRESS OBFUSCATION - System

Detects Obfuscated Powershell via COMPRESS OBFUSCATION

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionmediumtest

Invoke-Obfuscation RUNDLL LAUNCHER - System

Detects Obfuscated Powershell via RUNDLL LAUNCHER

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Sun Oct 18windows
Detectionhightest

Invoke-Obfuscation Via Stdin - System

Detects Obfuscated Powershell via Stdin in Scripts

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Mon Oct 12windows
Detectionhightest

Invoke-Obfuscation Via Use Clip - System

Detects Obfuscated Powershell via use Clip.exe in Scripts

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Fri Oct 09windows
Detectionhightest

Invoke-Obfuscation Via Use MSHTA - System

Detects Obfuscated Powershell via use MSHTA in Scripts

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Fri Oct 09windows
Detectionhightest

Invoke-Obfuscation Via Use Rundll32 - System

Detects Obfuscated Powershell via use Rundll32 in Scripts

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Fri Oct 09windows
Detectionhightest

Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - System

Detects Obfuscated Powershell via VAR++ LAUNCHER

Windowssystem
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Tue Oct 13windows
Detectionhightest

Meterpreter or Cobalt Strike Getsystem Service Installation - System

Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation

Windowssystem
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.001 · Token Impersonation/TheftT1134.002 · Create Process with Token
Teymur Kheirkhabarov+2Sat Oct 26windows
Detectionlowtest

Windows Service Terminated With Error

Detects Windows services that got terminated for whatever reason

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhightest

Important Windows Service Terminated With Error

Detects important or interesting Windows services that got terminated for whatever reason

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhightest

Important Windows Service Terminated Unexpectedly

Detects important or interesting Windows services that got terminated unexpectedly.

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhighstable

Windows Defender Grace Period Expired

Detects the expiration of the grace period of Windows Defender. This means protection against viruses, spyware, and other potentially unwanted software is disabled.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionmediumstable

Windows Defender Exclusions Added

Detects the Setting of Windows Defender Exclusions

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christian Burkard (Nextron Systems)Tue Jul 06windows
Detectionhightest

Windows Defender Exploit Guard Tamper

Detects when someone is adding or removing applications or folders from exploit guard "ProtectedFolders" or "AllowedApplications"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionlowstable

Windows Defender Submit Sample Feature Disabled

Detects disabling of the "Automatic Sample Submission" feature of Windows Defender.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectioninformationaltest

Windows Defender Malware Detection History Deletion

Windows Defender logs when the history of detected infections is deleted.

Windowswindefend
TA0005 · Defense Evasion
Cian HeasleyThu Aug 13windows
Detectionhighstable

Windows Defender Malware And PUA Scanning Disabled

Detects disabling of the Windows Defender feature of scanning for malware and other potentially unwanted software

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhighstable

Windows Defender Real-time Protection Disabled

Detects disabling of Windows Defender Real-time Protection. As this event doesn't contain a lot of information on who initiated this action you might want to reduce it to a "medium" level if this occurs too many times in your environment

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionmediumstable

Windows Defender Real-Time Protection Failure/Restart

Detects issues with Windows Defender Real-Time Protection features

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+1Tue Mar 28windows
Detectionhightest

Win Defender Restored Quarantine File

Detects the restoration of files from the defender quarantine

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Windows Defender Configuration Changes

Detects suspicious changes to the Windows Defender configuration

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Microsoft Defender Tamper Protection Trigger

Detects blocked attempts to change any of Defender's settings such as "Real Time Monitoring" and "Behavior Monitoring"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Bhabesh Raj+1Mon Jul 05windows
Detectionhighstable

Windows Defender Virus Scanning Feature Disabled

Detects disabling of the Windows Defender virus scanning feature

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

HackTool - CACTUSTORCH Remote Thread Creation

Detects remote thread creation from CACTUSTORCH as described in references.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1055.012 · Process Hollowing+3
Thomas PatzkeFri Feb 01windows
Detectionhightest

HackTool - Potential CobaltStrike Process Injection

Detects a potential remote threat creation with certain characteristics which are typical for Cobalt Strike beacons

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.001 · Dynamic-link Library Injection
Olaf Hartong+3Fri Nov 30windows
Detectionmediumtest

Remote Thread Creation Via PowerShell In Uncommon Target

Detects the creation of a remote thread from a Powershell process in an uncommon target process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Jun 25windows
Detectionhightest

Rare Remote Thread Creation By Uncommon Source Image

Detects uncommon processes creating remote threads.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Perez Diego+1Sun Oct 27windows
Detectionmediumtest

Remote Thread Creation By Uncommon Source Image

Detects uncommon processes creating remote threads.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Perez Diego+1Sun Oct 27windows
Detectionmediumtest

Remote Thread Creation In Uncommon Target Image

Detects uncommon target processes for remote thread creation

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.003 · Thread Execution Hijacking
Florian Roth (Nextron Systems)Wed Mar 16windows
Detectionhightest

Remote Thread Creation Ttdinject.exe Proxy

Detects a remote thread creation of Ttdinject.exe used as proxy

WindowsRemote Thread Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
François HubautMon May 16windows
Detectionmediumtest

Hidden Executable In NTFS Alternate Data Stream

Detects the creation of an ADS (Alternate Data Stream) that contains an executable by looking at a non-empty Imphash

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Sun Jun 03windows
Detectionmediumtest

Creation Of a Suspicious ADS File Outside a Browser Download

Detects the creation of a suspicious ADS (Alternate Data Stream) file by software other than browsers

WindowsAlternate Data Stream
TA0005 · Defense Evasion
François HubautSat Oct 22windows
Detectionhightest

Suspicious File Download From File Sharing Websites - File Stream

Detects the download of suspicious file type from a well-known file and paste sharing domain

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows