Rule Library

Sigma Rules

1,585 rules found for "defense-evasion"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Unusual File Download From File Sharing Websites - File Stream

Detects the download of suspicious file type from a well-known file and paste sharing domain

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionhightest

HackTool Named File Stream Created

Detects the creation of a named file stream with the imphash of a well-known hack tool

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionhightest

Exports Registry Key To an Alternate Data Stream

Exports the target Registry key and hides it in the specified alternate data stream.

WindowsAlternate Data Stream
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Oddvar Moe+2Wed Oct 07windows
Detectionhightest

Unusual File Download from Direct IP Address

Detects the download of suspicious file type from URLs with IP

WindowsAlternate Data Stream
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Nasreddine Bencherchali (Nextron Systems)+1Wed Sep 07windows
Detectionhightest

Potential Suspicious Winget Package Installation

Detects potential suspicious winget package installation from a suspicious source.

WindowsAlternate Data Stream
TA0005 · Defense EvasionTA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionhightest

Potentially Suspicious File Download From ZIP TLD

Detects the download of a file with a potentially suspicious extension from a .zip top level domain.

WindowsAlternate Data Stream
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Thu May 18windows
Detectionmediumtest

DNS Query Request By Regsvr32.EXE

Detects DNS queries initiated by "Regsvr32.exe"

WindowsDNS Query
TA0002 · ExecutionT1559.001 · Component Object ModelTA0005 · Defense EvasionT1218.010 · Regsvr32
Dmitriy Lifanov+1Fri Oct 25windows
Detectionhightest

WinDivert Driver Load

Detects the load of the Windiver driver, a powerful user-mode capture/sniffing/modification/blocking/re-injection package for Windows

WindowsDriver Load
TA0006 · Credential AccessTA0009 · CollectionTA0005 · Defense EvasionT1599.001 · Network Address Translation Traversal+1
Florian Roth (Nextron Systems)Fri Jul 30windows
Detectionmediumtest

EventLog EVTX File Deleted

Detects the deletion of the event log files which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070 · Indicator Removal
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionhightest

Exchange PowerShell Cmdlet History Deleted

Detects the deletion of the Exchange PowerShell cmdlet History logs which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070 · Indicator Removal
Nasreddine Bencherchali (Nextron Systems)Wed Oct 26windows
Detectionmediumtest

IIS WebServer Access Logs Deleted

Detects the deletion of IIS WebServer access logs which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070 · Indicator Removal
Tim Rauch+1Fri Sep 16windows
Detectionmediumtest

Process Deletion of Its Own Executable

Detects the deletion of a process's executable by itself. This is usually not possible without workarounds and may be used by malware to hide its traces.

WindowsFile Delete
TA0005 · Defense Evasion
Max Altgelt (Nextron Systems)Tue Sep 03windows
Detectionmediumtest

PowerShell Console History Logs Deleted

Detects the deletion of the PowerShell console History logs which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070 · Indicator Removal
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionhightest

Prefetch File Deleted

Detects the deletion of a prefetch file which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletion
Cedric MAURUGEONWed Sep 29windows
Detectionlowtest

TeamViewer Log File Deleted

Detects the deletion of the TeamViewer log files which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletion
François HubautSun Jan 16windows
Detectionmediumtest

Tomcat WebServer Logs Deleted

Detects the deletion of tomcat WebServer logs which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070 · Indicator Removal
Nasreddine Bencherchali (Nextron Systems)Thu Feb 16windows
Detectionmediumtest

File Deleted Via Sysinternals SDelete

Detects the deletion of files by the Sysinternals SDelete utility. It looks for the common name pattern used to rename files.

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletion
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionmediumtest

ADS Zone.Identifier Deleted By Uncommon Application

Detects the deletion of the "Zone.Identifier" ADS by an uncommon process. Attackers can leverage this in order to bypass security restrictions that make use of the ADS such as Microsoft Office apps.

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletion
Nasreddine Bencherchali (Nextron Systems)Mon Sep 04windows
Detectionhighexperimental

Suspicious File Created by ArcSOC.exe

Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS server, creates a file with suspicious file type, indicating that it may be an executable, script file, or otherwise unusual.

WindowsFile Event
TA0005 · Defense EvasionTA0011 · Command and ControlTA0003 · PersistenceTA0001 · Initial Access+3
Micah BabinskiTue Nov 25windows
Detectionmediumtest

EVTX Created In Uncommon Location

Detects the creation of new files with the ".evtx" extension in non-common or non-standard location. This could indicate tampering with default EVTX locations in order to evade security controls or simply exfiltration of event log to search for sensitive information within. Note that backup software and legitimate administrator might perform similar actions during troubleshooting.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
D3F7A5105Mon Jan 02windows
Detectionmediumtest

Creation Of Non-Existent System DLL

Detects creation of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes. Phantom DLL hijacking involves placing malicious DLLs with names of non-existent system binaries in locations where legitimate applications may search for them, leading to execution of the malicious DLLs. Thus, the creation of such DLLs may indicate preparation for phantom DLL hijacking attacks.

WindowsFile Event
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Thu Dec 01windows
Detectionmediumtest

Files With System DLL Name In Unsuspected Locations

Detects the creation of a file with the ".dll" extension that has the name of a System DLL in uncommon or unsuspected locations. (Outisde of "System32", "SysWOW64", etc.). It is highly recommended to perform an initial baseline before using this rule in production.

WindowsFile Event
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionmediumtest

Files With System Process Name In Unsuspected Locations

Detects the creation of an executable with a system process name in folders other than the system ones (System32, SysWOW64, etc.). It is highly recommended to perform an initial baseline before using this rule in production.

WindowsFile Event
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Sander Wiebing+2Tue May 26windows
Detectionlowtest

Dynamic CSharp Compile Artefact

When C# is compiled dynamically, a .cmdline file will be created as a part of the process. Certain processes are not typically observed compiling C# code, but can do so without touching disk. This can be used to unpack a payload for execution

WindowsFile Event
TA0005 · Defense EvasionT1027.004 · Compile After Delivery
François HubautSun Jan 09windows
Detectionhightest

DLL Search Order Hijackig Via Additional Space in Path

Detects when an attacker create a similar folder structure to windows system folders such as (Windows, Program Files...) but with a space in order to trick DLL load search order and perform a "DLL Search Order Hijacking" attack

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
François Hubaut+1Sat Jul 30windows
Detectionmediumtest

Potentially Suspicious DMP/HDMP File Creation

Detects the creation of a file with the ".dmp"/".hdmp" extension by a shell or scripting application such as "cmd", "powershell", etc. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 07windows
Detectionhightest

HackTool - Powerup Write Hijack DLL

Powerup tool's Write Hijack DLL exploits DLL hijacking for privilege escalation. In it's default mode, it builds a self deleting .bat file which executes malicious command. The detection rule relies on creation of the malicious bat file (debug.bat by default).

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Subhash PopuriSat Aug 21windows
Detectionmediumtest

Potential Initial Access via DLL Search Order Hijacking

Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious module via DLL search order hijacking.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1566 · PhishingT1566.001 · Spearphishing Attachment+4
Tim Rauch+1Fri Oct 21windows
Detectionhightest

Malicious DLL File Dropped in the Teams or OneDrive Folder

Detects creation of a malicious DLL file in the location where the OneDrive or Team applications Upon execution of the Teams or OneDrive application, the dropped malicious DLL file ("iphlpapi.dll") is sideloaded

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
François HubautFri Aug 12windows
Detectionhightest

Uncommon File Creation By Mysql Daemon Process

Detects the creation of files with scripting or executable extensions by Mysql daemon. Which could be an indicator of "User Defined Functions" abuse to download malware.

WindowsFile Event
TA0005 · Defense Evasion
Joseph KamauMon May 27windows
Detectionhightest

Suspicious DotNET CLR Usage Log Artifact

Detects the creation of Usage Log files by the CLR (clr.dll). These files are named after the executing process once the assembly is finished executing for the first time in the (user) session context.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+3Fri Nov 18windows
Detectionhightest

Suspicious File Creation In Uncommon AppData Folder

Detects the creation of suspicious files and folders inside the user's AppData folder but not inside any of the common and well known directories (Local, Romaing, LocalLow). This method could be used as a method to bypass detection who exclude the AppData folder in fear of FPs

WindowsFile Event
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionmediumtest

SCR File Write Event

Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an ".SCR" file using "rundll32.exe desk.cpl,InstallScreenSaver" for example.

WindowsFile Event
TA0005 · Defense EvasionT1218.011 · Rundll32
Christopher Peacock+1Wed Apr 27windows
Detectionmediumtest

OneNote Attachment File Dropped In Suspicious Location

Detects creation of files with the ".one"/".onepkg" extension in suspicious or uncommon locations. This could be a sign of attackers abusing OneNote attachments

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Sun Jan 22windows
Detectionhightest

Suspicious File Created Via OneNote Application

Detects suspicious files created via the OneNote application. This could indicate a potential malicious ".one"/".onepkg" file was executed as seen being used in malware activity in the wild

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Feb 09windows
Detectionmediumtest

Publisher Attachment File Dropped In Suspicious Location

Detects creation of files with the ".pub" extension in suspicious or uncommon locations. This could be a sign of attackers abusing Publisher documents

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

PSScriptPolicyTest Creation By Uncommon Process

Detects the creation of the "PSScriptPolicyTest" PowerShell script by an uncommon process. This file is usually generated by Microsoft Powershell to test against Applocker.

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jun 01windows
Detectionhightest

.RDP File Created By Uncommon Application

Detects creation of a file with an ".rdp" extension by an application that doesn't commonly create such files.

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionhightest

Potential Winnti Dropper Activity

Detects files dropped by Winnti as described in RedMimicry Winnti playbook

WindowsFile Event
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Alexander RauschWed Jun 24windows
Detectionhightest

PDF File Created By RegEdit.EXE

Detects the creation of a file with the ".pdf" extension by the "RegEdit.exe" process. This indicates that a user is trying to print/save a registry key as a PDF in order to potentially extract sensitive information and bypass defenses.

WindowsFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Jul 08windows
Detectionmediumtest

Self Extraction Directive File Created In Potentially Suspicious Location

Detects the creation of Self Extraction Directive files (.sed) in a potentially suspicious location. These files are used by the "iexpress.exe" utility in order to create self extracting packages. Attackers were seen abusing this utility and creating PE files with embedded ".sed" entries.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Joseliyo SanchezMon Feb 05windows
Detectionhightest

Windows Binaries Write Suspicious Extensions

Detects Windows executables that write files with suspicious extensions

WindowsFile Event
TA0005 · Defense EvasionT1036 · Masquerading
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionhightest

Suspicious Creation with Colorcpl

Once executed, colorcpl.exe will copy the arbitrary file to c:\windows\system32\spool\drivers\color\

WindowsFile Event
TA0005 · Defense EvasionT1564 · Hide Artifacts
François HubautFri Jan 21windows
Detectionmediumtest

Created Files by Microsoft Sync Center

This rule detects suspicious files created by Microsoft Sync Center (mobsync)

WindowsFile Event
TA0004 · Privilege EscalationT1055 · Process InjectionT1218 · System Binary Proxy ExecutionTA0002 · Execution+1
elhoimThu Apr 28windows
Detectionmediumtest

Suspicious Files in Default GPO Folder

Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder

WindowsFile Event
T1036.005 · Match Legitimate Name or LocationTA0005 · Defense Evasion
elhoimThu Apr 28windows
Detectionhightest

Suspicious Double Extension Files

Detects dropped files with double extensions, which is often used by malware as a method to abuse the fact that Windows hide default extensions by default.

WindowsFile Event
TA0005 · Defense EvasionT1036.007 · Double File Extension
Nasreddine Bencherchali (Nextron Systems)+1Sun Jun 19windows
Detectionhightest

Suspicious Executable File Creation

Detect creation of suspicious executable file names. Some strings look for suspicious file extensions, others look for filenames that exploit unquoted service paths.

WindowsFile Event
TA0005 · Defense EvasionT1564 · Hide Artifacts
François HubautMon Sep 05windows
Detectionhightest

Suspicious Get-Variable.exe Creation

Get-Variable is a valid PowerShell cmdlet WindowsApps is by default in the path where PowerShell is executed. So when the Get-Variable command is issued on PowerShell execution, the system first looks for the Get-Variable executable in the path and executes the malicious binary instead of looking for the PowerShell cmdlet.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546 · Event Triggered ExecutionTA0005 · Defense Evasion+1
François HubautSat Apr 23windows