Rule Library

Sigma Rules

801 rules found for "privilege-escalation"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Potential Waveedit.DLL Sideloading

Detects potential DLL sideloading of "waveedit.dll", which is part of the Nero WaveEditor audio editing software.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Wed Jun 14windows
Detectionmediumtest

Potential Wazuh Security Platform DLL Sideloading

Detects potential DLL side loading of DLLs that are part of the Wazuh security platform

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Mon Mar 13windows
Detectionhightest

Potential Mpclient.DLL Sideloading

Detects potential sideloading of "mpclient.dll" by Windows Defender processes ("MpCmdRun" and "NisSrv") from their non-default directory.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Bhabesh RajTue Aug 02windows
Detectionmediumtest

Potential WWlib.DLL Sideloading

Detects potential DLL sideloading of "wwlib.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu May 18windows
Detectionmediumtest

Unsigned Module Loaded by ClickOnce Application

Detects unsigned module load by ClickOnce application.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.001 · DLL Search Order Hijacking
@serkinvaleryThu Jun 08windows
Detectionhightest

DotNet CLR DLL Loaded By Scripting Applications

Detects .NET CLR DLLs being loaded by scripting applications such as wscript or cscript. This could be an indication of potential suspicious execution.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0002 · ExecutionTA0004 · Privilege EscalationT1055 · Process Injection
omkar72+1Wed Oct 14windows
Detectionhighstable

Suspicious Unsigned Thor Scanner Execution

Detects loading and execution of an unsigned thor scanner binary.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Sun Oct 29windows
Detectionhightest

UAC Bypass Using Iscsicpl - ImageLoad

Detects the "iscsicpl.exe" UAC bypass technique that leverages a DLL Search Order hijacking technique to load a custom DLL's from temp or a any user controlled location in the users %PATH%

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Nasreddine Bencherchali (Nextron Systems)Sun Jul 17windows
Detectionhightest

UAC Bypass With Fake DLL

Attempts to load dismcore.dll after dropping it

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control+1
oscd.community+1Tue Oct 06windows
Detectionhighexperimental

Trusted Path Bypass via Windows Directory Spoofing

Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g "C:\Windows \System32") which can bypass Windows trusted path verification. This technique tricks Windows into treating the path as trusted, allowing malicious DLLs to load with high integrity privileges bypassing UAC.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.007 · Path Interception by PATH Environment Variable+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jun 17windows
Detectionhightest

WMI Persistence - Command Line Event Consumer

Detects WMI command line event consumers

WindowsImage Load (DLL)
TA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event SubscriptionTA0003 · Persistence
Thomas PatzkeWed Mar 07windows
Detectionhightest

Network Connection Initiated Via Notepad.EXE

Detects a network connection that is initiated by the "notepad.exe" process. This might be a sign of process injection from a beacon process or something similar. Notepad rarely initiates a network communication except when printing documents for example.

WindowsNetwork Connection
TA0004 · Privilege EscalationTA0011 · Command and ControlTA0002 · ExecutionTA0005 · Defense Evasion+1
EagleEye TeamThu May 14windows
Detectionmediumtest

Microsoft Sync Center Suspicious Network Connections

Detects suspicious connections from Microsoft Sync Center to non-private IPs.

WindowsNetwork Connection
TA0004 · Privilege EscalationT1055 · Process InjectionT1218 · System Binary Proxy ExecutionTA0002 · Execution+1
elhoimThu Apr 28windows
Detectioncriticaltest

CobaltStrike Named Pipe

Detects the creation of a named pipe as used by CobaltStrike

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+1Tue May 25windows
Detectioncriticaltest

CobaltStrike Named Pipe Pattern Regex

Detects the creation of a named pipe matching a pattern used by CobaltStrike Malleable C2 profiles

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Fri Jul 30windows
Detectionhightest

CobaltStrike Named Pipe Patterns

Detects the creation of a named pipe with a pattern found in CobaltStrike malleable C2 profiles

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectionstp.1k
Florian Roth (Nextron Systems)+1Fri Jul 30windows
Detectionhightest

HackTool - CoercedPotato Named Pipe Creation

Detects the pattern of a pipe name as used by the hack tool CoercedPotato

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Wed Oct 11windows
Detectioncriticaltest

HackTool - DiagTrackEoP Default Named Pipe

Detects creation of default named pipe used by the DiagTrackEoP POC, a tool that abuses "SeImpersonate" privilege.

WindowsNamed Pipe Created
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Wed Aug 03windows
Detectionhightest

HackTool - EfsPotato Named Pipe Creation

Detects the pattern of a pipe name as used by the hack tool EfsPotato

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Mon Aug 23windows
Detectioncriticaltest

HackTool - Koh Default Named Pipe

Detects creation of default named pipes used by the Koh tool

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0006 · Credential AccessT1528 · Steal Application Access Token+1
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectioncriticaltest

Malicious Named Pipe Created

Detects the creation of a named pipe seen used by known APTs or malware.

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+2Mon Nov 06windows
Detectionhightest

Suspicious PowerShell Invocations - Specific - PowerShell Module

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Sun Mar 05windows
Detectionmediumtest

Suspicious Computer Machine Password by PowerShell

The Reset-ComputerMachinePassword cmdlet changes the computer account password that the computers use to authenticate to the domain controllers in the domain. You can use it to reset the password of the local computer.

WindowsPowerShell Module
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
François HubautMon Feb 21windows
Detectionmediumtest

Powershell Create Scheduled Task

Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
François HubautTue Dec 28windows
Detectionmediumtest

Registry-Free Process Scope COR_PROFILER

Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR. The COR_PROFILER is a .NET Framework feature which allows developers to specify an unmanaged (or external of .NET) profiling DLL to be loaded into each .NET process that loads the Common Language Runtime (CLR). These profiliers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR. (Citation: Microsoft Profiling Mar 2017) (Citation: Microsoft COR_PROFILER Feb 2013)

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.012 · COR_PROFILER
François HubautThu Dec 30windows
Detectionmediumexperimental

DMSA Service Account Created in Specific OUs - PowerShell

Detects the creation of a dMSA service account using the New-ADServiceAccount cmdlet in certain OUs. The fact that the cmdlet is used to create a dMSASvc account in a specific OU is highly suspicious. It is a pattern trying to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025. On top of that, if the user that is creating the dMSASvc account is not a legitimate administrator or does not have the necessary permissions, it is a strong signal of an attempted or successful abuse of the BaDSuccessor vulnerability for privilege escalation within the Windows Server 2025 Active Directory environment.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Swachchhanda Shrawan Poudel (Nextron Systems)Sat May 24windows
Detectionmediumtest

Service Registry Permissions Weakness Check

Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Adversaries may use flaws in the permissions for registry to redirect from the originally specified executable to one that they control, in order to launch their own code at Service start. Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.011 · Services Registry Permissions Weakness+1
François HubautThu Dec 30windows
Detectionhightest

HackTool - WinPwn Execution - ScriptBlock

Detects scriptblock text keywords indicative of potential usge of the tool WinPwn. A tool for Windows and Active Directory reconnaissance and exploitation.

WindowsPowerShell Script
TA0006 · Credential AccessTA0005 · Defense EvasionTA0007 · DiscoveryTA0002 · Execution+9
Swachchhanda Shrawan PoudelMon Dec 04windows
Detectionmediumtest

Powershell LocalAccount Manipulation

Adversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
François HubautTue Dec 28windows
Detectionlowexperimental

DMSA Link Attributes Modified

Detects modification of dMSA link attributes (msDS-ManagedAccountPrecededByLink) via PowerShell scripts. This command line pattern could be an indicator an attempt to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0001 · Initial Access+2
Swachchhanda Shrawan Poudel (Nextron Systems)Sat May 24windows
Detectionmediumtest

Modify Group Policy Settings - ScriptBlockLogging

Detect malicious GPO modifications can be used to implement many other malicious behaviors.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
François HubautFri Aug 19windows
Detectionhightest

PowerShell ShellCode

Detects Base64 encoded Shellcode

WindowsPowerShell Script
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process InjectionTA0002 · Execution+1
David Ledbetter (shellcode)+1Sat Nov 17windows
Detectionhightest

Potential Persistence Via Security Descriptors - ScriptBlock

Detects usage of certain functions and keywords that are used to manipulate security descriptors in order to potentially set a backdoor. As seen used in the DAMP project.

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Jan 05windows
Detectionmediumtest

Suspicious GetTypeFromCLSID ShellExecute

Detects suspicious Powershell code that execute COM Objects

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.015 · Component Object Model Hijacking
François HubautSat Apr 02windows
Detectionhightest

Suspicious PowerShell Invocations - Specific

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Sun Mar 05windows
Detectionhightest

Suspicious Service DACL Modification Via Set-Service Cmdlet - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionmediumtest

Potential Persistence Via PowerShell User Profile Using Add-Content

Detects calls to "Add-Content" cmdlet in order to modify the content of the user profile and potentially adding suspicious commands for persistence

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
François Hubaut+1Wed Aug 18windows
Detectionhightest

Abuse of Service Permissions to Hide Services Via Set-Service - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionmediumexperimental

Registry Modification Attempt Via VBScript - PowerShell

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods embedded within PowerShell scripts or commands. Threat actors commonly embed VBScript code within PowerShell to perform registry modifications, attempting to evade detection that monitors for direct registry access through traditional tools. This technique can be used for persistence, defense evasion, and privilege escalation by modifying registry keys without using regedit.exe, reg.exe, or PowerShell's native registry cmdlets.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionmediumtest

Winlogon Helper DLL

Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[Wow6432Node]Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.004 · Winlogon Helper DLL
Timur Zinniatullin+1Mon Oct 21windows
Detectionmediumtest

Powershell WMI Persistence

Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription.

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
François HubautThu Aug 19windows
Detectionmediumtest

WMIC Unquoted Services Path Lookup - PowerShell

Detects known WMI recon method to look for unquoted service paths, often used by pentest inside of powershell scripts attackers enum scripts

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

HackTool - LittleCorporal Generated Maldoc Injection

Detects the process injection of a LittleCorporal generated Maldoc.

WindowsProcess Access
TA0005 · Defense EvasionTA0002 · ExecutionTA0004 · Privilege EscalationT1204.002 · Malicious File+1
Christian Burkard (Nextron Systems)Mon Aug 09windows
Detectionlowtest

Uncommon Process Access Rights For Target Image

Detects process access request to uncommon target images with a "PROCESS_ALL_ACCESS" access mask.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.011 · Extra Window Memory Injection
Nasreddine Bencherchali (Nextron Systems)+1Mon May 27windows
Detectionhightest

Credential Dumping Attempt Via Svchost

Detects when a process tries to access the memory of svchost to potentially dump credentials.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Florent LabouyrieFri Apr 30windows
Detectionmediumtest

Function Call From Undocumented COM Interface EditionUpgradeManager

Detects function calls from the EditionUpgradeManager COM interface. Which is an interface that is not used by standard executables.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
oscd.community+1Wed Oct 07windows
Detectionhightest

UAC Bypass Using WOW64 Logger DLL Hijack

Detects the pattern of UAC Bypass using a WoW64 logger DLL hijack (UACMe 30)

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhightest

Interactive AT Job

Detects an interactive AT job, which may be used as a form of privilege escalation.

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1053.002 · At
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24windows