Sigma Templates
- Detection of Sysinternals Usage
description: Detects the usage of Sysinternals Toolstags: - attack.t1588.002logsource: category: process_creation product: windowsdetection: selection: CommandLine|contains: ' -accepteula' condition: selectionfalsepositives: - Legitimate use of SysInternals tools- LSASS Dump Detection
description: LSASS memory dump creation using operating systems utilities.tags: - attack.credential_accesslogsource: category: file_event product: windowsdetection: selection: TargetFilename|contains: 'lsass' TargetFilename|endswith: 'dmp' condition: selectionfields: - ComputerName - TargetFilenamefalsepositives: - Admin activitylevel: high- Suspicious Add Scheduled Task From User AppData Temp
description: schtasks.exe create suspicious task from user AppData\Local\Temptags: - attack.execution - attack.t1053.005logsource: product: windows category: process_creationdetection: schtasks: Image|endswith: '\schtasks.exe' suspcommand: CommandLine|contains|all: - '/Create ' - '\AppData\Local\Temp' condition: schtasks and suspcommandfalsepositives: - Unknownlevel: high- Disable UAC Using Registry
description: Detects Disable User Account Control (UAC) Using Registry by changing its registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA from 1 to 0tags: - attack.privilege_escalation - attack.defense_evasion - attack.t1548.002logsource: category: registry_set product: windowsdetection: selection: EventType: SetValue TargetObject|contains: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Details: DWORD (0x00000000) condition: selectionfalsepositives: - Unknownlevel: medium- Windows Defender Service Disabled
description: Detects disables the Windows Defender service (WinDefend) via the registrytags: - attack.defense_evasion - attack.t1562.001logsource: product: windows category: registry_setdetection: selection: EventType: SetValue TargetObject: 'HKLM\SYSTEM\CurrentControlSet\Services\WinDefend\Start' Details: 'DWORD (0x00000004)' condition: selectionfalsepositives: - Administrator actionslevel: high- PowerShell Get-Clipboard Cmdlet Via CLI
description: Detects usage of the 'Get-Clipboard' cmdlet via CLI. Adversaries may collect data stored in the clipboard from users copying information within or between applications.tags: - attack.collection - attack.t1115logsource: category: process_creation product: windowsdetection: selection: CommandLine|contains: 'Get-Clipboard' condition: selectionfalsepositives: - Unknownlevel: medium- User Account Hidden By Registry
description: Detect modifications for a specific user in order to prevent that user from appearing on the logon screen.tags: - attack.defense_evasion - attack.t1564.002logsource: product: windows category: registry_setdetection: selection: EventType: SetValue TargetObject|contains: '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist\' TargetObject|endswith: '$' Details: DWORD (0x00000000) condition: selectionfalsepositives: - Unknownlevel: high