Rule Library

Sigma Rules

127 rules found for "attack.T1562.001"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Bitbucket Global Secret Scanning Rule Deleted

Detects Bitbucket global secret scanning rule deletion activity.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global SSH Settings Changed

Detects Bitbucket global SSH access configuration changes.

bitbucketaudit
TA0008 · Lateral MovementTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1021.004 · SSH
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Audit Log Configuration Updated

Detects changes to the bitbucket audit log configuration.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Bitbucket Project Secret Scanning Allowlist Added

Detects when a secret scanning allowlist rule is added for projects.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionhightest

Bitbucket Secret Scanning Exempt Repository Added

Detects when a repository is exempted from secret scanning feature.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Bitbucket Secret Scanning Rule Deleted

Detects when secret scanning rule is deleted for the project or repository.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Github Push Protection Bypass Detected

Detects when a user bypasses the push protection on a secret detected by secret scanning.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionhightest

Github Push Protection Disabled

Detects if the push protection feature is disabled for an organization, enterprise, repositories or custom pattern rules.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionhightest

Github Secret Scanning Feature Disabled

Detects if the secret scanning feature is disabled for an enterprise or repository.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionhighexperimental

AWS GuardDuty Detector Deleted Or Updated

Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities. Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost. Verify with the user identity that this activity is legitimate.

AWScloudtrail
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1562.008 · Disable or Modify Cloud Logs
suktech24Thu Nov 27cloud
Detectionhightest

AWS GuardDuty Important Change

Detects updates of the GuardDuty list of trusted IPs, perhaps to disable security alerts against malicious IPs.

AWScloudtrail
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
falokerTue Feb 11cloud
Detectionmediumtest

Azure Kubernetes Events Deleted

Detects when Events are deleted in Azure Kubernetes. An adversary may delete events in Azure Kubernetes in an attempt to evade detection.

Azureactivitylogs
TA0005 · Defense EvasionT1562 · Impair DefensesT1562.001 · Disable or Modify Tools
Austin SongerSat Jul 24cloud
Detectionhighexperimental

ASLR Disabled Via Sysctl or Direct Syscall - Linux

Detects actions that disable Address Space Layout Randomization (ASLR) in Linux, including: - Use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000) - Modification of the /proc/sys/kernel/randomize_va_space file - Execution of the `sysctl` command to set `kernel.randomize_va_space=0` Disabling ASLR is often used by attackers during exploit development or to bypass memory protection mechanisms. A successful use of these methods can reduce the effectiveness of ASLR and make memory corruption attacks more reliable.

Linuxauditd
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1055.009 · Proc Memory
Milad CheraghiMon May 26linux
Detectionhighexperimental

Kaspersky Endpoint Security Stopped Via CommandLine - Linux

Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl. This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Milad CheraghiSat Oct 18linux
Detectionmediumtest

ESXi Syslog Configuration Change Via ESXCLI

Detects changes to the ESXi syslog configuration via "esxcli"

LinuxProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1562.001 · Disable or Modify ToolsT1562.003 · Impair Command History Logging+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

Disable Security Tools

Detects disabling security tools

macOSProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionhightest

Cisco Disabling Logging

Turn off logging locally or remote

Ciscoaaa
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin ClarkSun Aug 11network
Detectionhightest

Microsoft Malware Protection Engine Crash

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

Windowsapplication
TA0005 · Defense EvasionT1211 · Exploitation for Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Tue May 09windows
Detectionhightest

Microsoft Malware Protection Engine Crash - WER

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

Windowsapplication
TA0005 · Defense EvasionT1211 · Exploitation for Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Tue May 09windows
Detectionhightest

Weak Encryption Enabled and Kerberoast

Detects scenario where weak encryption is enabled for a user profile which could be used for hash/password cracking.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
@neu5ronSun Jul 30windows
Detectionhightest

NetNTLM Downgrade Attack

Detects NetNTLM downgrade attack

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1112 · Modify Registry
Florian Roth (Nextron Systems)+1Tue Mar 20windows
Detectionmediumtest

Potential Privileged System Service Operation - SeLoadDriverPrivilege

Detects the usage of the 'SeLoadDriverPrivilege' privilege. This privilege is required to load or unload a device driver. With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers. This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
xknow+1Mon Apr 08windows
Detectionmediumtest

Windows Defender Exclusion List Modified

Detects modifications to the Windows Defender exclusion registry key. This could indicate a potentially suspicious or even malicious activity by an attacker trying to add a new exclusion in order to bypass security.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
@barryshooshoogaSat Oct 26windows
Detectionmediumtest

Windows Defender Exclusion Registry Key - Write Access Requested

Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.

Windowssecurity
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
@barryshooshooga+1Sat Oct 26windows
Detectionmediumstable

Windows Defender Threat Detection Service Disabled

Detects when the "Windows Defender Threat Protection" service is disabled.

Windowssystem
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhighstable

Windows Defender Grace Period Expired

Detects the expiration of the grace period of Windows Defender. This means protection against viruses, spyware, and other potentially unwanted software is disabled.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionmediumstable

Windows Defender Exclusions Added

Detects the Setting of Windows Defender Exclusions

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christian Burkard (Nextron Systems)Tue Jul 06windows
Detectionhightest

Windows Defender Exploit Guard Tamper

Detects when someone is adding or removing applications or folders from exploit guard "ProtectedFolders" or "AllowedApplications"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionlowstable

Windows Defender Submit Sample Feature Disabled

Detects disabling of the "Automatic Sample Submission" feature of Windows Defender.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Windows Defender Malware And PUA Scanning Disabled

Detects disabling of the Windows Defender feature of scanning for malware and other potentially unwanted software

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhighstable

Windows Defender Real-time Protection Disabled

Detects disabling of Windows Defender Real-time Protection. As this event doesn't contain a lot of information on who initiated this action you might want to reduce it to a "medium" level if this occurs too many times in your environment

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionmediumstable

Windows Defender Real-Time Protection Failure/Restart

Detects issues with Windows Defender Real-Time Protection features

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+1Tue Mar 28windows
Detectionhightest

Win Defender Restored Quarantine File

Detects the restoration of files from the defender quarantine

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Windows Defender Configuration Changes

Detects suspicious changes to the Windows Defender configuration

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Microsoft Defender Tamper Protection Trigger

Detects blocked attempts to change any of Defender's settings such as "Real Time Monitoring" and "Behavior Monitoring"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Bhabesh Raj+1Mon Jul 05windows
Detectionhighstable

Windows Defender Virus Scanning Feature Disabled

Detects disabling of the Windows Defender virus scanning feature

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionmediumtest

Suspicious PROCEXP152.sys File Created In TMP

Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder. This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) or Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU.

WindowsFile Event
T1562.001 · Disable or Modify ToolsTA0005 · Defense Evasion
xknow+1Mon Apr 08windows
Detectionhightest

Load Of RstrtMgr.DLL By A Suspicious Process

Detects the load of RstrtMgr DLL (Restart Manager) by a suspicious process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows. It could also be used for anti-analysis purposes by shut downing specific processes.

WindowsImage Load (DLL)
TA0040 · ImpactTA0005 · Defense EvasionT1486 · Data Encrypted for ImpactT1562.001 · Disable or Modify Tools
Luc GénauxTue Nov 28windows
Detectionlowtest

Load Of RstrtMgr.DLL By An Uncommon Process

Detects the load of RstrtMgr DLL (Restart Manager) by an uncommon process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows. It could also be used for anti-analysis purposes by shut downing specific processes.

WindowsImage Load (DLL)
TA0040 · ImpactTA0005 · Defense EvasionT1486 · Data Encrypted for ImpactT1562.001 · Disable or Modify Tools
Luc GénauxTue Nov 28windows
Detectionhighexperimental

Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location

Detects loading of dbgcore.dll or dbghelp.dll from uncommon locations such as user directories. These DLLs contain the MiniDumpWriteDump function, which can be abused for credential dumping purposes or in some cases for evading EDR/AV detection by suspending processes.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003 · OS Credential DumpingTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionhightest

Tamper Windows Defender - PSClassic

Attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

Windowsps_classic_provider_start
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+1Mon Jun 07windows
Detectionhightest

AMSI Bypass Pattern Assembly GetType

Detects code fragments found in small and obfuscated AMSI bypass PowerShell scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsTA0002 · Execution
Florian Roth (Nextron Systems)Wed Nov 09windows
Detectionmediumtest

Potential AMSI Bypass Script Using NULL Bits

Detects usage of special strings/null bits in order to potentially bypass AMSI functionalities

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Wed Jan 04windows
Detectionhightest

Disable-WindowsOptionalFeature Command PowerShell

Detect built in PowerShell cmdlet Disable-WindowsOptionalFeature, Deployment Image Servicing and Management tool. Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautSat Sep 10windows
Detectionhightest

Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging

Detects attempts to remove Windows Defender configuration using the 'MpPreference' cmdlet

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Tamper Windows Defender - ScriptBlockLogging

Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+5Sun Jan 16windows
Detectionhightest

HackTool - CobaltStrike BOF Injection Pattern

Detects a typical pattern of a CobaltStrike BOF which inject into other processes

WindowsProcess Access
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christian Burkard (Nextron Systems)Wed Aug 04windows
Detectionhighexperimental

Suspicious Process Access to LSASS with Dbgcore/Dbghelp DLLs

Detects suspicious process access to LSASS.exe from processes located in uncommon locations with dbgcore.dll or dbghelp.dll in the call trace. These DLLs contain functions like MiniDumpWriteDump that can be abused for credential dumping purposes. While modern tools like Mimikatz have moved to using ntdll.dll, dbgcore.dll and dbghelp.dll are still used by basic credential dumping utilities and legacy tools for LSASS memory access and process suspension techniques.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows