Rule Library

Sigma Rules

254 rules found for "attack.T1218"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Hidden Flag Set On File/Directory Via Chflags - MacOS

Detects the execution of the "chflags" utility with the "hidden" flag, in order to hide files on MacOS. When a file or directory has this hidden flag set, it becomes invisible to the default file listing commands and in graphical file browsers.

macOSProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Omar KhaledWed Aug 21macos
Detectionmediumtest

MSI Installation From Web

Detects installation of a remote msi file from web.

Windowsapplication
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1218.007 · Msiexec
Stamatis ChatzimangouSun Oct 23windows
Detectionhightest

HackTool - CACTUSTORCH Remote Thread Creation

Detects remote thread creation from CACTUSTORCH as described in references.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1055.012 · Process Hollowing+3
Thomas PatzkeFri Feb 01windows
Detectionmediumtest

Remote Thread Creation Via PowerShell In Uncommon Target

Detects the creation of a remote thread from a Powershell process in an uncommon target process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Jun 25windows
Detectionmediumtest

DNS Query Request By Regsvr32.EXE

Detects DNS queries initiated by "Regsvr32.exe"

WindowsDNS Query
TA0002 · ExecutionT1559.001 · Component Object ModelTA0005 · Defense EvasionT1218.010 · Regsvr32
Dmitriy Lifanov+1Fri Oct 25windows
Detectionhightest

Suspicious DotNET CLR Usage Log Artifact

Detects the creation of Usage Log files by the CLR (clr.dll). These files are named after the executing process once the assembly is finished executing for the first time in the (user) session context.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+3Fri Nov 18windows
Detectionmediumtest

SCR File Write Event

Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an ".SCR" file using "rundll32.exe desk.cpl,InstallScreenSaver" for example.

WindowsFile Event
TA0005 · Defense EvasionT1218.011 · Rundll32
Christopher Peacock+1Wed Apr 27windows
Detectionmediumtest

Self Extraction Directive File Created In Potentially Suspicious Location

Detects the creation of Self Extraction Directive files (.sed) in a potentially suspicious location. These files are used by the "iexpress.exe" utility in order to create self extracting packages. Attackers were seen abusing this utility and creating PE files with embedded ".sed" entries.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Joseliyo SanchezMon Feb 05windows
Detectionmediumtest

Created Files by Microsoft Sync Center

This rule detects suspicious files created by Microsoft Sync Center (mobsync)

WindowsFile Event
TA0004 · Privilege EscalationT1055 · Process InjectionT1218 · System Binary Proxy ExecutionTA0002 · Execution+1
elhoimThu Apr 28windows
Detectionhightest

Legitimate Application Dropped Archive

Detects programs on a Windows system that should not write an archive to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionhightest

Legitimate Application Dropped Executable

Detects programs on a Windows system that should not write executables to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionhighexperimental

Legitimate Application Writing Files In Uncommon Location

Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution. Adversaries may leverage legitimate applications (Living off the Land Binaries - LOLBins) to drop or download malicious files to uncommon locations on the system to evade detection by security solutions.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Dec 10windows
Detectionhightest

Legitimate Application Dropped Script

Detects programs on a Windows system that should not write scripts to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionmediumtest

Potentially Suspicious Self Extraction Directive File Created

Detects the creation of a binary file with the ".sed" extension. The ".sed" extension stand for Self Extraction Directive files. These files are used by the "iexpress.exe" utility in order to create self extracting packages. Attackers were seen abusing this utility and creating PE files with embedded ".sed" entries. Usually ".sed" files are simple ini files and not PE binaries.

Windowsfile_executable_detected
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Joseliyo SanchezMon Feb 05windows
Detectionhightest

DLL Loaded From Suspicious Location Via Cmspt.EXE

Detects cmstp loading "dll" or "ocx" files from suspicious locations

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1218.003 · CMSTP
Nasreddine Bencherchali (Nextron Systems)Tue Aug 30windows
Detectionhightest

Time Travel Debugging Utility Usage - Image

Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0006 · Credential AccessT1218 · System Binary Proxy ExecutionT1003.001 · LSASS Memory
Ensar Şamil+1Tue Oct 06windows
Detectionmediumtest

Potential DLL Sideloading Using Coregen.exe

Detect usage of the "coregen.exe" (Microsoft CoreCLR Native Image Generator) binary to sideload arbitrary DLLs.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1055 · Process Injection
François HubautSat Dec 31windows
Detectionhighexperimental

BaaUpdate.exe Suspicious DLL Load

Detects BitLocker Access Agent Update Utility (baaupdate.exe) loading DLLs from suspicious locations that are publicly writable which could indicate an attempt to lateral movement via BitLocker DCOM & COM Hijacking. This technique abuses COM Classes configured as INTERACTIVE USER to spawn processes in the context of the logged-on user's session. Specifically, it targets the BDEUILauncher Class (CLSID ab93b6f1-be76-4185-a488-a9001b105b94) which can launch BaaUpdate.exe, which is vulnerable to COM Hijacking when started with input parameters. This allows attackers to execute code in the user's context without needing to steal credentials or use additional techniques to compromise the account.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Swachchhanda Shrawan Poudel (Nextron Systems)Sat Oct 18windows
Detectionmediumtest

Unsigned DLL Loaded by Windows Utility

Detects windows utilities loading an unsigned or untrusted DLL. Adversaries often abuse those programs to proxy execution of malicious code.

WindowsImage Load (DLL)
T1218.011 · Rundll32T1218.010 · Regsvr32TA0005 · Defense Evasion
Swachchhanda Shrawan PoudelWed Feb 28windows
Detectionmediumexperimental

MMC Loading Script Engines DLLs

Detects when the Microsoft Management Console (MMC) loads the DLL libraries like vbscript, jscript etc which might indicate an attempt to execute malicious scripts within a trusted system process for bypassing application whitelisting or defense evasion.

WindowsImage Load (DLL)
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1218.014 · MMC
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionhightest

Network Connection Initiated By AddinUtil.EXE

Detects a network connection initiated by the Add-In deployment cache updating utility "AddInutil.exe". This could indicate a potential command and control communication as this tool doesn't usually initiate network activity.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionhightest

Outbound Network Connection Initiated By Cmstp.EXE

Detects a network connection initiated by Cmstp.EXE Its uncommon for "cmstp.exe" to initiate an outbound network connection. Investigate the source of such requests to determine if they are malicious.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.003 · CMSTP
Nasreddine Bencherchali (Nextron Systems)Tue Aug 30windows
Detectionmediumtest

RegAsm.EXE Initiating Network Connection To Public IP

Detects "RegAsm.exe" initiating a network connection to public IP adresses

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.009 · Regsvcs/Regasm
François HubautThu Apr 25windows
Detectionmediumtest

Network Connection Initiated By Regsvr32.EXE

Detects a network connection initiated by "Regsvr32.exe"

WindowsNetwork Connection
TA0002 · ExecutionT1559.001 · Component Object ModelTA0005 · Defense EvasionT1218.010 · Regsvr32
Dmitriy Lifanov+1Fri Oct 25windows
Detectionmediumtest

Rundll32 Internet Connection

Detects a rundll32 that communicates with public IP addresses

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.011 · Rundll32TA0002 · Execution
Florian Roth (Nextron Systems)Sat Nov 04windows
Detectionmediumtest

Microsoft Sync Center Suspicious Network Connections

Detects suspicious connections from Microsoft Sync Center to non-private IPs.

WindowsNetwork Connection
TA0004 · Privilege EscalationT1055 · Process InjectionT1218 · System Binary Proxy ExecutionTA0002 · Execution+1
elhoimThu Apr 28windows
Detectionmediumtest

Outbound Network Connection To Public IP Via Winlogon

Detects a "winlogon.exe" process that initiate network communications with public IP addresses

WindowsNetwork Connection
TA0005 · Defense EvasionTA0002 · ExecutionTA0011 · Command and ControlT1218.011 · Rundll32
Christopher Peacock+1Fri Apr 28windows
Detectionmediumtest

Potentially Suspicious Wuauclt Network Connection

Detects the use of the Windows Update Client binary (wuauclt.exe) to proxy execute code and making network connections. One could easily make the DLL spawn a new process and inject to it to proxy the network connection and bypass this rule.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Roberto Rodriguez (Cyb3rWard0g)+1Mon Oct 12windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

Windowspowershell-classic
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Tue Jul 13windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell Module

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Module
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 13windows
Detectionmediumtest

SyncAppvPublishingServer Bypass Powershell Restriction - PS Module

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

WindowsPowerShell Module
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+1Mon Oct 05windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell ScriptBlock

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

SyncAppvPublishingServer Execution to Bypass Powershell Restriction

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+1Mon Oct 05windows
Detectionmediumtest

PowerShell WMI Win32_Product Install MSI

Detects the execution of an MSI file using PowerShell and the WMI Win32_Product class

WindowsPowerShell Script
TA0005 · Defense EvasionT1218.007 · Msiexec
François HubautSun Apr 24windows
Detectionhighstable

CMSTP Execution Process Access

Detects various indicators of Microsoft Connection Manager Profile Installer execution

WindowsProcess Access
TA0005 · Defense EvasionT1218.003 · CMSTPTA0002 · ExecutionT1559.001 · Component Object Model+3
Nik SeetharamanMon Jul 16windows
Detectionhightest

Suspicious AddinUtil.EXE CommandLine Execution

Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with suspicious Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+2Mon Sep 18windows
Detectionmediumtest

Uncommon Child Process Of AddinUtil.EXE

Detects uncommon child processes of the Add-In deployment cache updating utility (AddInutil.exe) which could be a sign of potential abuse of the binary to proxy execution via a custom Addins.Store payload.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionmediumtest

Uncommon AddinUtil.EXE CommandLine Execution

Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with uncommon Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionmediumtest

AddinUtil.EXE Execution From Uncommon Directory

Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) from a non-standard directory.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionmediumtest

AgentExecutor PowerShell Execution

Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Sat Dec 24windows
Detectionhightest

Suspicious AgentExecutor PowerShell Execution

Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Sat Dec 24windows
Detectionmediumtest

Uncommon Child Process Of Appvlp.EXE

Detects uncommon child processes of Appvlp.EXE Appvlp or the Application Virtualization Utility is included with Microsoft Office. Attackers are able to abuse "AppVLP" to execute shell commands. Normally, this binary is used for Application Virtualization, but it can also be abused to circumvent the ASR file path rule folder or to mark a file as a system file.

WindowsProcess Creation
T1218 · System Binary Proxy ExecutionTA0005 · Defense EvasionTA0002 · Execution
SreemanFri Mar 13windows
Detectionmediumtest

Uncommon Assistive Technology Applications Execution Via AtBroker.EXE

Detects the start of a non built-in assistive technology applications via "Atbroker.EXE".

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Mateusz Wydra+1Mon Oct 12windows
Detectionhighexperimental

Suspicious BitLocker Access Agent Update Utility Execution

Detects the execution of the BitLocker Access Agent Update Utility (baaupdate.exe) which is not a common parent process for other processes. Suspicious child processes spawned by baaupdate.exe could indicate an attempt at lateral movement via BitLocker DCOM & COM Hijacking.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
andrewdanis+1Sat Oct 18windows
Detectionhightest

Suspicious Child Process Of BgInfo.EXE

Detects suspicious child processes of "BgInfo.exe" which could be a sign of potential abuse of the binary to proxy execution via external VBScript

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Nasreddine Bencherchali (Nextron Systems)Wed Aug 16windows
Detectionmediumtest

Uncommon Child Process Of BgInfo.EXE

Detects uncommon child processes of "BgInfo.exe" which could be a sign of potential abuse of the binary to proxy execution via external VBScript

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Nasreddine Bencherchali (Nextron Systems)+2Sat Oct 26windows
Detectionlowtest

BitLockerTogo.EXE Execution

Detects the execution of "BitLockerToGo.EXE". BitLocker To Go is BitLocker Drive Encryption on removable data drives. This feature includes the encryption of, USB flash drives, SD cards, External hard disk drives, Other drives that are formatted by using the NTFS, FAT16, FAT32, or exFAT file system. This is a rarely used application and usage of it at all is worth investigating. Malware such as Lumma stealer has been seen using this process as a target for process hollowing.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Josh Nickels+1Thu Jul 11windows
Detectionmediumtest

Potential Binary Proxy Execution Via Cdb.EXE

Detects usage of "cdb.exe" to launch arbitrary processes or commands from a debugger script file

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Beyu Denis+2Sat Oct 26windows