This website requires JavaScript.
Explore
Help
Sign In
security-tools
/
sigma-rules
Watch
1
Star
0
Fork
0
You've already forked sigma-rules
Code
Issues
Pull Requests
Actions
Packages
Projects
Releases
Wiki
Activity
Files
dee3a5f61cba54f66ce2182a09ce7f5cc4e9477a
sigma-rules
/
rules
/
windows
T
History
Eric
4a4588c856
Tune rule for new DLL written to Windows Servicing (
#3062
)
...
(cherry picked from commit
41a7a36817
)
2023-08-30 16:57:00 +00:00
..
collection_email_outlook_mailbox_via_com.toml
…
collection_email_powershell_exchange_mailbox.toml
…
collection_mailbox_export_winlog.toml
…
collection_posh_audio_capture.toml
…
collection_posh_clipboard_capture.toml
…
collection_posh_keylogger.toml
…
collection_posh_mailbox.toml
…
collection_posh_screen_grabber.toml
…
collection_winrar_encryption.toml
…
command_and_control_certreq_postdata.toml
…
command_and_control_certutil_network_connection.toml
…
command_and_control_common_webservices.toml
…
command_and_control_dns_tunneling_nslookup.toml
…
command_and_control_encrypted_channel_freesslcert.toml
…
command_and_control_iexplore_via_com.toml
…
command_and_control_ingress_transfer_bits.toml
…
command_and_control_new_terms_commonly_abused_rat_execution.toml
…
command_and_control_port_forwarding_added_registry.toml
…
command_and_control_rdp_tunnel_plink.toml
…
command_and_control_remote_file_copy_desktopimgdownldr.toml
…
command_and_control_remote_file_copy_mpcmdrun.toml
…
command_and_control_remote_file_copy_powershell.toml
…
command_and_control_remote_file_copy_scripts.toml
…
command_and_control_sunburst_c2_activity_detected.toml
…
command_and_control_teamviewer_remote_file_copy.toml
…
credential_access_bruteforce_admin_account.toml
…
credential_access_bruteforce_multiple_logon_failure_followed_by_success.toml
…
credential_access_bruteforce_multiple_logon_failure_same_srcip.toml
…
credential_access_cmdline_dump_tool.toml
…
credential_access_copy_ntds_sam_volshadowcp_cmdline.toml
…
credential_access_credential_dumping_msbuild.toml
…
credential_access_dcsync_newterm_subjectuser.toml
…
credential_access_dcsync_replication_rights.toml
…
credential_access_disable_kerberos_preauth.toml
…
credential_access_domain_backup_dpapi_private_keys.toml
…
credential_access_dump_registry_hives.toml
…
credential_access_generic_localdumps.toml
…
credential_access_iis_apppoolsa_pwd_appcmd.toml
…
credential_access_iis_connectionstrings_dumping.toml
…
credential_access_kerberoasting_unusual_process.toml
…
credential_access_ldap_attributes.toml
…
credential_access_lsass_handle_via_malseclogon.toml
…
credential_access_lsass_loaded_susp_dll.toml
…
credential_access_lsass_memdump_file_created.toml
…
credential_access_lsass_memdump_handle_access.toml
…
credential_access_lsass_openprocess_api.toml
Update credential_access_lsass_openprocess_api.toml (
#3047
)
2023-08-28 15:28:09 +00:00
credential_access_mimikatz_memssp_default_logs.toml
…
credential_access_mimikatz_powershell_module.toml
…
credential_access_mod_wdigest_security_provider.toml
…
credential_access_moving_registry_hive_via_smb.toml
…
credential_access_persistence_network_logon_provider_modification.toml
…
credential_access_posh_invoke_ninjacopy.toml
…
credential_access_posh_kerb_ticket_dump.toml
…
credential_access_posh_minidump.toml
…
credential_access_posh_request_ticket.toml
…
credential_access_potential_lsa_memdump_via_mirrordump.toml
…
credential_access_relay_ntlm_auth_via_http_spoolss.toml
…
credential_access_remote_sam_secretsdump.toml
…
credential_access_saved_creds_vault_winlog.toml
…
credential_access_saved_creds_vaultcmd.toml
…
credential_access_seenabledelegationprivilege_assigned_to_user.toml
…
credential_access_shadow_credentials.toml
…
credential_access_spn_attribute_modified.toml
…
credential_access_suspicious_comsvcs_imageload.toml
…
credential_access_suspicious_lsass_access_generic.toml
…
credential_access_suspicious_lsass_access_memdump.toml
…
credential_access_suspicious_lsass_access_via_snapshot.toml
…
credential_access_suspicious_winreg_access_via_sebackup_priv.toml
…
credential_access_symbolic_link_to_shadow_copy_created.toml
…
credential_access_via_snapshot_lsass_clone_creation.toml
…
credential_access_wireless_creds_dumping.toml
…
defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml
…
defense_evasion_amsi_bypass_dllhijack.toml
Tune rule for new DLL written to Windows Servicing (
#3062
)
2023-08-30 16:57:00 +00:00
defense_evasion_amsi_bypass_powershell.toml
…
defense_evasion_amsienable_key_mod.toml
…
defense_evasion_clearing_windows_console_history.toml
…
defense_evasion_clearing_windows_event_logs.toml
…
defense_evasion_clearing_windows_security_logs.toml
…
defense_evasion_code_signing_policy_modification_builtin_tools.toml
…
defense_evasion_code_signing_policy_modification_registry.toml
…
defense_evasion_create_mod_root_certificate.toml
…
defense_evasion_cve_2020_0601.toml
…
defense_evasion_defender_disabled_via_registry.toml
…
defense_evasion_defender_exclusion_via_powershell.toml
…
defense_evasion_delete_volume_usn_journal_with_fsutil.toml
…
defense_evasion_disable_posh_scriptblocklogging.toml
…
defense_evasion_disable_windows_firewall_rules_with_netsh.toml
…
defense_evasion_disabling_windows_defender_powershell.toml
…
defense_evasion_disabling_windows_logs.toml
…
defense_evasion_dns_over_https_enabled.toml
…
defense_evasion_dotnet_compiler_parent_process.toml
…
defense_evasion_enable_inbound_rdp_with_netsh.toml
…
defense_evasion_enable_network_discovery_with_netsh.toml
…
defense_evasion_execution_control_panel_suspicious_args.toml
…
defense_evasion_execution_lolbas_wuauclt.toml
…
defense_evasion_execution_msbuild_started_by_office_app.toml
…
defense_evasion_execution_msbuild_started_by_script.toml
…
defense_evasion_execution_msbuild_started_by_system_process.toml
…
defense_evasion_execution_msbuild_started_renamed.toml
…
defense_evasion_execution_msbuild_started_unusal_process.toml
…
defense_evasion_execution_suspicious_explorer_winword.toml
…
defense_evasion_execution_windefend_unusual_path.toml
…
defense_evasion_file_creation_mult_extension.toml
…
defense_evasion_from_unusual_directory.toml
…
defense_evasion_hide_encoded_executable_registry.toml
…
defense_evasion_iis_httplogging_disabled.toml
…
defense_evasion_injection_msbuild.toml
…
defense_evasion_installutil_beacon.toml
…
defense_evasion_masquerading_as_elastic_endpoint_process.toml
…
defense_evasion_masquerading_renamed_autoit.toml
…
defense_evasion_masquerading_suspicious_werfault_childproc.toml
…
defense_evasion_masquerading_trusted_directory.toml
…
defense_evasion_masquerading_werfault.toml
…
defense_evasion_microsoft_defender_tampering.toml
…
defense_evasion_misc_lolbin_connecting_to_the_internet.toml
…
defense_evasion_ms_office_suspicious_regmod.toml
…
defense_evasion_msbuild_beacon_sequence.toml
…
defense_evasion_msbuild_making_network_connections.toml
…
defense_evasion_mshta_beacon.toml
…
defense_evasion_msxsl_beacon.toml
…
defense_evasion_msxsl_network.toml
…
defense_evasion_network_connection_from_windows_binary.toml
…
defense_evasion_parent_process_pid_spoofing.toml
…
defense_evasion_persistence_account_tokenfilterpolicy.toml
…
defense_evasion_posh_assembly_load.toml
…
defense_evasion_posh_compressed.toml
…
defense_evasion_posh_encryption.toml
…
defense_evasion_posh_process_injection.toml
…
defense_evasion_potential_processherpaderping.toml
…
defense_evasion_powershell_windows_firewall_disabled.toml
…
defense_evasion_process_termination_followed_by_deletion.toml
…
defense_evasion_proxy_execution_via_msdt.toml
…
defense_evasion_rundll32_no_arguments.toml
…
defense_evasion_scheduledjobs_at_protocol_enabled.toml
…
defense_evasion_sdelete_like_filename_rename.toml
…
defense_evasion_sip_provider_mod.toml
…
defense_evasion_solarwinds_backdoor_service_disabled_via_registry.toml
…
defense_evasion_suspicious_certutil_commands.toml
…
defense_evasion_suspicious_execution_from_mounted_device.toml
…
defense_evasion_suspicious_managedcode_host_process.toml
…
defense_evasion_suspicious_process_access_direct_syscall.toml
…
defense_evasion_suspicious_process_creation_calltrace.toml
…
defense_evasion_suspicious_scrobj_load.toml
…
defense_evasion_suspicious_short_program_name.toml
…
defense_evasion_suspicious_wmi_script.toml
…
defense_evasion_suspicious_zoom_child_process.toml
…
defense_evasion_system_critical_proc_abnormal_file_activity.toml
…
defense_evasion_timestomp_sysmon.toml
…
defense_evasion_unsigned_dll_loaded_from_suspdir.toml
…
defense_evasion_untrusted_driver_loaded.toml
…
defense_evasion_unusual_ads_file_creation.toml
…
defense_evasion_unusual_dir_ads.toml
…
defense_evasion_unusual_network_connection_via_dllhost.toml
…
defense_evasion_unusual_network_connection_via_rundll32.toml
…
defense_evasion_unusual_process_network_connection.toml
…
defense_evasion_unusual_system_vp_child_program.toml
…
defense_evasion_via_filter_manager.toml
…
defense_evasion_workfolders_control_execution.toml
…
defense_evasion_wsl_bash_exec.toml
…
defense_evasion_wsl_child_process.toml
…
defense_evasion_wsl_enabled_via_dism.toml
…
defense_evasion_wsl_filesystem.toml
…
defense_evasion_wsl_kalilinux.toml
…
defense_evasion_wsl_registry_modification.toml
…
discovery_adfind_command_activity.toml
…
discovery_admin_recon.toml
…
discovery_command_system_account.toml
…
discovery_enumerating_domain_trusts_via_dsquery.toml
…
discovery_enumerating_domain_trusts_via_nltest.toml
…
discovery_files_dir_systeminfo_via_cmd.toml
…
discovery_group_policy_object_discovery.toml
…
discovery_net_view.toml
…
discovery_peripheral_device.toml
…
discovery_posh_invoke_sharefinder.toml
…
discovery_posh_suspicious_api_functions.toml
…
discovery_post_exploitation_external_ip_lookup.toml
…
discovery_privileged_localgroup_membership.toml
…
discovery_remote_system_discovery_commands_windows.toml
…
discovery_security_software_wmic.toml
…
discovery_system_service_discovery.toml
…
discovery_system_time_discovery.toml
…
discovery_whoami_command_activity.toml
…
execution_apt_solarwinds_backdoor_child_cmd_powershell.toml
…
execution_apt_solarwinds_backdoor_unusual_child_processes.toml
…
execution_com_object_xwizard.toml
…
execution_command_prompt_connecting_to_the_internet.toml
…
execution_command_shell_started_by_svchost.toml
…
execution_command_shell_started_by_unusual_process.toml
…
execution_command_shell_via_rundll32.toml
…
execution_downloaded_shortcut_files.toml
…
execution_downloaded_url_file.toml
…
execution_enumeration_via_wmiprvse.toml
…
execution_from_unusual_path_cmdline.toml
…
execution_html_help_executable_program_connecting_to_the_internet.toml
…
execution_ms_office_written_file.toml
…
execution_pdf_written_file.toml
…
execution_posh_hacktool_functions.toml
…
execution_posh_portable_executable.toml
…
execution_posh_psreflect.toml
…
execution_psexec_lateral_movement_command.toml
…
execution_register_server_program_connecting_to_the_internet.toml
…
execution_scheduled_task_powershell_source.toml
…
execution_shared_modules_local_sxs_dll.toml
…
execution_suspicious_cmd_wmi.toml
…
execution_suspicious_image_load_wmi_ms_office.toml
…
execution_suspicious_pdf_reader.toml
…
execution_suspicious_powershell_imgload.toml
…
execution_suspicious_psexesvc.toml
…
execution_via_compiled_html_file.toml
[Security Content] Tags Reform (
#2725
)
2023-06-22 18:38:56 -03:00
execution_via_hidden_shell_conhost.toml
…
impact_backup_file_deletion.toml
…
impact_deleting_backup_catalogs_with_wbadmin.toml
…
impact_modification_of_boot_config.toml
…
impact_stop_process_service_threshold.toml
[Rule Tuning] High Number of Process and/or Service Terminations (
#2940
)
2023-08-25 22:25:19 +00:00
impact_volume_shadow_copy_deletion_or_resized_via_vssadmin.toml
…
impact_volume_shadow_copy_deletion_via_powershell.toml
…
impact_volume_shadow_copy_deletion_via_wmic.toml
…
initial_access_evasion_suspicious_htm_file_creation.toml
…
initial_access_execution_via_office_addins.toml
…
initial_access_exfiltration_first_time_seen_usb.toml
…
initial_access_script_executing_powershell.toml
…
initial_access_scripts_process_started_via_wmi.toml
…
initial_access_suspicious_ms_exchange_files.toml
…
initial_access_suspicious_ms_exchange_process.toml
…
initial_access_suspicious_ms_exchange_worker_child_process.toml
…
initial_access_suspicious_ms_office_child_process.toml
…
initial_access_suspicious_ms_outlook_child_process.toml
…
initial_access_unusual_dns_service_children.toml
…
initial_access_unusual_dns_service_file_writes.toml
…
initial_access_via_explorer_suspicious_child_parent_args.toml
…
lateral_movement_alternate_creds_pth.toml
…
lateral_movement_cmd_service.toml
…
lateral_movement_dcom_hta.toml
…
lateral_movement_dcom_mmc20.toml
…
lateral_movement_dcom_shellwindow_shellbrowserwindow.toml
…
lateral_movement_defense_evasion_lanman_nullsessionpipe_modification.toml
…
lateral_movement_direct_outbound_smb_connection.toml
…
lateral_movement_evasion_rdp_shadowing.toml
…
lateral_movement_executable_tool_transfer_smb.toml
…
lateral_movement_execution_from_tsclient_mup.toml
…
lateral_movement_execution_via_file_shares_sequence.toml
…
lateral_movement_incoming_winrm_shell_execution.toml
…
lateral_movement_incoming_wmi.toml
…
lateral_movement_mount_hidden_or_webdav_share_net.toml
…
lateral_movement_powershell_remoting_target.toml
…
lateral_movement_rdp_enabled_registry.toml
…
lateral_movement_rdp_sharprdp_target.toml
…
lateral_movement_remote_file_copy_hidden_share.toml
…
lateral_movement_remote_service_installed_winlog.toml
…
lateral_movement_remote_services.toml
…
lateral_movement_remote_task_creation_winlog.toml
…
lateral_movement_scheduled_task_target.toml
…
lateral_movement_suspicious_rdp_client_imageload.toml
…
lateral_movement_via_startup_folder_rdp_smb.toml
…
persistence_ad_adminsdholder.toml
…
persistence_adobe_hijack_persistence.toml
…
persistence_app_compat_shim.toml
…
persistence_appcertdlls_registry.toml
…
persistence_appinitdlls_registry.toml
…
persistence_dontexpirepasswd_account.toml
…
persistence_driver_newterm_imphash.toml
…
persistence_evasion_hidden_local_account_creation.toml
…
persistence_evasion_registry_ifeo_injection.toml
…
persistence_evasion_registry_startup_shell_folder_modified.toml
…
persistence_gpo_schtask_service_creation.toml
…
persistence_local_scheduled_job_creation.toml
…
persistence_local_scheduled_task_creation.toml
…
persistence_local_scheduled_task_scripting.toml
…
persistence_ms_office_addins_file.toml
…
persistence_ms_outlook_vba_template.toml
…
persistence_msds_alloweddelegateto_krbtgt.toml
…
persistence_powershell_exch_mailbox_activesync_add_device.toml
…
persistence_powershell_profiles.toml
…
persistence_priv_escalation_via_accessibility_features.toml
…
persistence_registry_uncommon.toml
…
persistence_remote_password_reset.toml
…
persistence_run_key_and_startup_broad.toml
…
persistence_runtime_run_key_startup_susp_procs.toml
…
persistence_scheduled_task_creation_winlog.toml
…
persistence_scheduled_task_updated.toml
…
persistence_sdprop_exclusion_dsheuristics.toml
…
persistence_service_dll_unsigned.toml
…
persistence_service_windows_service_winlog.toml
…
persistence_services_registry.toml
…
persistence_startup_folder_file_written_by_suspicious_process.toml
…
persistence_startup_folder_file_written_by_unsigned_process.toml
…
persistence_startup_folder_scripts.toml
…
persistence_suspicious_com_hijack_registry.toml
…
persistence_suspicious_image_load_scheduled_task_ms_office.toml
…
persistence_suspicious_scheduled_task_runtime.toml
…
persistence_suspicious_service_created_registry.toml
…
persistence_sysmon_wmi_event_subscription.toml
[New Rule] Suspicious WMI Event Subscription Created (
#1860
)
2023-08-29 19:48:03 +00:00
persistence_system_shells_via_services.toml
…
persistence_temp_scheduled_task.toml
…
persistence_time_provider_mod.toml
…
persistence_user_account_added_to_privileged_group_ad.toml
…
persistence_user_account_creation_event_logs.toml
…
persistence_user_account_creation.toml
…
persistence_via_application_shimming.toml
…
persistence_via_bits_job_notify_command.toml
…
persistence_via_hidden_run_key_valuename.toml
…
persistence_via_lsa_security_support_provider_registry.toml
…
persistence_via_telemetrycontroller_scheduledtask_hijack.toml
…
persistence_via_update_orchestrator_service_hijack.toml
…
persistence_via_windows_management_instrumentation_event_subscription.toml
…
persistence_via_wmi_stdregprov_run_services.toml
…
persistence_via_xp_cmdshell_mssql_stored_procedure.toml
[New Rule] Unusual Process For MSSQL Service Accounts (
#3040
)
2023-08-29 12:16:12 +00:00
persistence_webshell_detection.toml
…
privilege_escalation_create_process_as_different_user.toml
…
privilege_escalation_credroaming_ldap.toml
…
privilege_escalation_disable_uac_registry.toml
…
privilege_escalation_group_policy_iniscript.toml
…
privilege_escalation_group_policy_privileged_groups.toml
…
privilege_escalation_group_policy_scheduled_task.toml
…
privilege_escalation_installertakeover.toml
…
privilege_escalation_krbrelayup_service_creation.toml
…
privilege_escalation_lsa_auth_package.toml
…
privilege_escalation_named_pipe_impersonation.toml
…
privilege_escalation_persistence_phantom_dll.toml
…
privilege_escalation_port_monitor_print_pocessor_abuse.toml
…
privilege_escalation_posh_token_impersonation.toml
…
privilege_escalation_printspooler_registry_copyfiles.toml
…
privilege_escalation_printspooler_service_suspicious_file.toml
…
privilege_escalation_printspooler_suspicious_file_deletion.toml
…
privilege_escalation_printspooler_suspicious_spl_file.toml
…
privilege_escalation_rogue_windir_environment_var.toml
…
privilege_escalation_samaccountname_spoofing_attack.toml
…
privilege_escalation_service_control_spawned_script_int.toml
…
privilege_escalation_suspicious_dnshostname_update.toml
…
privilege_escalation_tokenmanip_sedebugpriv_enabled.toml
…
privilege_escalation_uac_bypass_com_clipup.toml
…
privilege_escalation_uac_bypass_com_ieinstal.toml
…
privilege_escalation_uac_bypass_com_interface_icmluautil.toml
…
privilege_escalation_uac_bypass_diskcleanup_hijack.toml
…
privilege_escalation_uac_bypass_dll_sideloading.toml
…
privilege_escalation_uac_bypass_event_viewer.toml
…
privilege_escalation_uac_bypass_mock_windir.toml
…
privilege_escalation_uac_bypass_winfw_mmc_hijack.toml
…
privilege_escalation_uac_sdclt.toml
…
privilege_escalation_unusual_parentchild_relationship.toml
…
privilege_escalation_unusual_printspooler_childprocess.toml
…
privilege_escalation_unusual_svchost_childproc_childless.toml
…
privilege_escalation_via_ppid_spoofing.toml
…
privilege_escalation_via_rogue_named_pipe.toml
…
privilege_escalation_via_token_theft.toml
…
privilege_escalation_windows_service_via_unusual_client.toml
…
privilege_escalation_wpad_exploitation.toml
…