Sigma Rule Update (2026-01-26 20:19:36) (#233)

Co-authored-by: YamatoSecurity <YamatoSecurity@users.noreply.github.com>
This commit is contained in:
github-actions[bot]
2026-01-26 20:19:43 +00:00
committed by GitHub
parent 6f323d6b28
commit 8eb7421978

View File

@@ -344,8 +344,8 @@
"T1059.001",
"TA0008",
"T1021.003",
"T1021",
"T1059"
"T1059",
"T1021"
],
"title": "Suspicious Non PowerShell WSMAN COM Provider"
},
@@ -424,8 +424,8 @@
"T1059.001",
"TA0008",
"T1021.006",
"T1059",
"T1021"
"T1021",
"T1059"
],
"title": "Remote PowerShell Session (PS Classic)"
},
@@ -1173,8 +1173,8 @@
"T1529",
"attack.g0091",
"attack.s0363",
"T1059",
"T1071"
"T1071",
"T1059"
],
"title": "Silence.EDA Detection"
},
@@ -1503,8 +1503,8 @@
"T1552.001",
"T1555",
"T1555.003",
"T1552",
"T1548"
"T1548",
"T1552"
],
"title": "HackTool - WinPwn Execution - ScriptBlock"
},
@@ -4374,8 +4374,8 @@
"T1059.001",
"TA0008",
"T1021.006",
"T1059",
"T1021"
"T1021",
"T1059"
],
"title": "Remote PowerShell Session (PS Module)"
},
@@ -4862,8 +4862,8 @@
"T1059.005",
"T1059.006",
"T1059.007",
"T1059",
"T1204"
"T1204",
"T1059"
],
"title": "AppLocker Prevented Application or Script from Running"
},
@@ -5535,8 +5535,8 @@
"TA0002",
"T1059.001",
"T1218",
"T1027",
"T1059"
"T1059",
"T1027"
],
"title": "Obfuscated PowerShell MSI Install via WindowsInstaller COM"
},
@@ -5961,8 +5961,8 @@
"TA0004",
"T1543.003",
"T1562.001",
"T1543",
"T1562"
"T1562",
"T1543"
],
"title": "Devcon Execution Disabling VMware VMCI Device"
},
@@ -6231,8 +6231,8 @@
"TA0002",
"T1059.007",
"cve.2020-1599",
"T1059",
"T1218"
"T1218",
"T1059"
],
"title": "MSHTA Execution with Suspicious File Extensions"
},
@@ -7372,8 +7372,8 @@
"T1482",
"T1069.002",
"stp.1u",
"T1069",
"T1087"
"T1087",
"T1069"
],
"title": "PUA - AdFind Suspicious Execution"
},
@@ -7906,8 +7906,8 @@
"TA0005",
"T1036.004",
"T1036.005",
"T1053",
"T1036"
"T1036",
"T1053"
],
"title": "Scheduled Task Creation Masquerading as System Processes"
},
@@ -8110,8 +8110,8 @@
"T1548.002",
"T1546.001",
"T1112",
"T1546",
"T1548"
"T1548",
"T1546"
],
"title": "Registry Modification of MS-settings Protocol Handler"
},
@@ -8635,8 +8635,8 @@
"TA0003",
"T1053.005",
"T1059.001",
"T1059",
"T1053"
"T1053",
"T1059"
],
"title": "Suspicious Schtasks Execution AppData Folder"
},
@@ -11129,8 +11129,8 @@
"T1218.010",
"TA0002",
"TA0005",
"T1204",
"T1218"
"T1218",
"T1204"
],
"title": "Suspicious WMIC Execution Via Office Process"
},
@@ -11323,8 +11323,8 @@
"T1071.004",
"T1132.001",
"T1048",
"T1071",
"T1132"
"T1132",
"T1071"
],
"title": "DNS Exfiltration and Tunneling Tools Execution"
},
@@ -11870,8 +11870,8 @@
"T1047",
"T1204.002",
"T1218.010",
"T1218",
"T1204"
"T1204",
"T1218"
],
"title": "Suspicious WmiPrvSE Child Process"
},
@@ -13473,8 +13473,8 @@
"T1087.002",
"T1482",
"T1069.002",
"T1069",
"T1087"
"T1087",
"T1069"
],
"title": "Renamed AdFind Execution"
},
@@ -13816,8 +13816,8 @@
"T1587.001",
"TA0002",
"T1569.002",
"T1587",
"T1569"
"T1569",
"T1587"
],
"title": "PUA - CsExec Execution"
},
@@ -15968,8 +15968,8 @@
"T1203",
"T1059.003",
"attack.g0032",
"T1566",
"T1059"
"T1059",
"T1566"
],
"title": "Suspicious HWP Sub Processes"
},
@@ -16369,6 +16369,28 @@
],
"title": "Execute Code with Pester.bat as Parent"
},
{
"category": "process_creation",
"channel": [
"sec"
],
"description": "Detects cmd.exe executing commands with the \"start\" utility using \"/b\" (no window) or \"/min\" (minimized) flags.\nTo reduce false positives from standard background tasks, detection is restricted to scenarios where the target is a known script extension or located in suspicious temporary/public directories.\nThis technique was observed in Chaos, DarkSide, and Emotet malware campaigns.\n",
"event_ids": [
"4688"
],
"id": "568b2ac8-83d2-2e23-94e9-f2a5dcdb457f",
"level": "medium",
"service": "",
"subcategory_guids": [
"0CCE922B-69AE-11D9-BED3-505054503030"
],
"tags": [
"TA0005",
"T1564.003",
"T1564"
],
"title": "Cmd Launched with Hidden Start Flags to Suspicious Targets"
},
{
"category": "process_creation",
"channel": [
@@ -18281,8 +18303,8 @@
"T1218.011",
"TA0006",
"T1003.001",
"T1218",
"T1003"
"T1003",
"T1218"
],
"title": "Process Access via TrolleyExpress Exclusion"
},
@@ -21113,9 +21135,9 @@
"TA0005",
"T1218.014",
"T1036.002",
"T1204",
"T1036",
"T1218"
"T1218",
"T1204"
],
"title": "MMC Executing Files with Reversed Extensions Using RTLO Abuse"
},
@@ -21587,8 +21609,8 @@
"T1047",
"T1204.002",
"T1218.010",
"T1218",
"T1204"
"T1204",
"T1218"
],
"title": "Suspicious Microsoft Office Child Process"
},
@@ -21671,11 +21693,11 @@
"T1557",
"T1082",
"T1556",
"T1505",
"T1574",
"T1546",
"T1547",
"T1564",
"T1547"
"T1505",
"T1546",
"T1574"
],
"title": "Potential Suspicious Activity Using SeCEdit"
},
@@ -23163,8 +23185,8 @@
"T1059.003",
"TA0005",
"T1027.010",
"T1059",
"T1027"
"T1027",
"T1059"
],
"title": "Suspicious Usage of For Loop with Recursive Directory Search in CMD"
},
@@ -23973,8 +23995,8 @@
"T1204.004",
"TA0005",
"T1027.010",
"T1027",
"T1204"
"T1204",
"T1027"
],
"title": "Suspicious Explorer Process with Whitespace Padding - ClickFix/FileFix"
},
@@ -24469,8 +24491,8 @@
"TA0003",
"T1053.005",
"T1059.001",
"T1059",
"T1053"
"T1053",
"T1059"
],
"title": "Scheduled Task Executing Payload from Registry"
},
@@ -24849,8 +24871,8 @@
"T1133",
"T1136.001",
"T1021.001",
"T1136",
"T1021"
"T1021",
"T1136"
],
"title": "User Added to Remote Desktop Users Group"
},
@@ -25485,8 +25507,8 @@
"T1564.004",
"T1552.001",
"T1105",
"T1552",
"T1564"
"T1564",
"T1552"
],
"title": "Insensitive Subfolder Search Via Findstr.EXE"
},
@@ -26480,8 +26502,8 @@
"T1069.002",
"TA0002",
"T1059.001",
"T1059",
"T1087",
"T1059",
"T1069"
],
"title": "HackTool - Bloodhound/Sharphound Execution"
@@ -27410,8 +27432,8 @@
"T1070.001",
"T1562.002",
"car.2016-04-002",
"T1562",
"T1070"
"T1070",
"T1562"
],
"title": "Suspicious Eventlog Clearing or Configuration Change Activity"
},
@@ -27569,8 +27591,8 @@
"T1106",
"T1059.003",
"T1218.011",
"T1218",
"T1059"
"T1059",
"T1218"
],
"title": "HackTool - RedMimicry Winnti Playbook Execution"
},
@@ -27961,8 +27983,8 @@
"T1558.003",
"TA0008",
"T1550.003",
"T1558",
"T1550"
"T1550",
"T1558"
],
"title": "HackTool - Rubeus Execution"
},
@@ -28424,8 +28446,8 @@
"TA0003",
"T1036.005",
"T1053.005",
"T1053",
"T1036"
"T1036",
"T1053"
],
"title": "Suspicious Scheduled Task Creation via Masqueraded XML File"
},
@@ -30517,8 +30539,8 @@
"T1559.001",
"TA0005",
"T1218.010",
"T1559",
"T1218"
"T1218",
"T1559"
],
"title": "Network Connection Initiated By Regsvr32.EXE"
},
@@ -30653,8 +30675,8 @@
"T1071.004",
"TA0002",
"T1059.003",
"T1071",
"T1059"
"T1059",
"T1071"
],
"title": "Network Connection Initiated via Finger.EXE"
},
@@ -31366,8 +31388,8 @@
"T1059.001",
"T1027.010",
"detection.threat-hunting",
"T1027",
"T1059"
"T1059",
"T1027"
],
"title": "Invocation Of Crypto-Classes From The \"Cryptography\" PowerShell Namespace"
},
@@ -31890,8 +31912,8 @@
"TA0001",
"TA0043",
"detection.threat-hunting",
"T1598",
"T1566"
"T1566",
"T1598"
],
"title": "HTML File Opened From Download Folder"
},
@@ -32708,8 +32730,8 @@
"T1547.001",
"detection.threat-hunting",
"T1027",
"T1547",
"T1059"
"T1059",
"T1547"
],
"title": "Registry Set With Crypto-Classes From The \"Cryptography\" PowerShell Namespace"
},
@@ -33235,8 +33257,8 @@
"TA0004",
"T1548.002",
"T1546.001",
"T1548",
"T1546"
"T1546",
"T1548"
],
"title": "Shell Open Registry Keys Manipulation"
},
@@ -34261,8 +34283,8 @@
"T1204.004",
"TA0005",
"T1027.010",
"T1027",
"T1204"
"T1204",
"T1027"
],
"title": "Suspicious Space Characters in RunMRU Registry Path - ClickFix"
},
@@ -37250,9 +37272,9 @@
"T1021.002",
"T1543.003",
"T1569.002",
"T1021",
"T1543",
"T1569",
"T1543"
"T1021"
],
"title": "Potential CobaltStrike Service Installations - Registry"
},
@@ -37873,8 +37895,8 @@
"TA0003",
"T1547.001",
"T1546.009",
"T1546",
"T1547"
"T1547",
"T1546"
],
"title": "Session Manager Autorun Keys Modification"
},
@@ -38674,8 +38696,8 @@
"T1566.001",
"cve.2017-0261",
"detection.emerging-threats",
"T1204",
"T1566"
"T1566",
"T1204"
],
"title": "Exploit for CVE-2017-0261"
},
@@ -38733,8 +38755,8 @@
"car.2016-04-002",
"detection.emerging-threats",
"T1218",
"T1003",
"T1070"
"T1070",
"T1003"
],
"title": "NotPetya Ransomware Activity"
},
@@ -38760,8 +38782,8 @@
"T1543.003",
"T1569.002",
"detection.emerging-threats",
"T1543",
"T1569"
"T1569",
"T1543"
],
"title": "CosmicDuke Service Installation"
},
@@ -39057,8 +39079,8 @@
"TA0011",
"T1071.004",
"detection.emerging-threats",
"T1053",
"T1071",
"T1053",
"T1543"
],
"title": "OilRig APT Schedule Task Persistence - Security"
@@ -39091,8 +39113,8 @@
"TA0011",
"T1071.004",
"detection.emerging-threats",
"T1543",
"T1053",
"T1543",
"T1071"
],
"title": "OilRig APT Registry Persistence"
@@ -39125,8 +39147,8 @@
"TA0011",
"T1071.004",
"detection.emerging-threats",
"T1543",
"T1053",
"T1543",
"T1071"
],
"title": "OilRig APT Activity"
@@ -40199,8 +40221,8 @@
"T1053.005",
"T1059.006",
"detection.emerging-threats",
"T1059",
"T1053"
"T1053",
"T1059"
],
"title": "Serpent Backdoor Payload Execution Via Scheduled Task"
},
@@ -40346,8 +40368,8 @@
"T1053.005",
"T1027",
"detection.emerging-threats",
"T1053",
"T1059"
"T1059",
"T1053"
],
"title": "Turla Group Commands May 2020"
},
@@ -40403,8 +40425,8 @@
"attack.s0412",
"attack.g0001",
"detection.emerging-threats",
"T1059",
"T1218"
"T1218",
"T1059"
],
"title": "ZxShell Malware"
},
@@ -41417,8 +41439,8 @@
"T1059.001",
"T1218.005",
"detection.emerging-threats",
"T1059",
"T1218"
"T1218",
"T1059"
],
"title": "Potential Baby Shark Malware Activity"
},
@@ -41783,8 +41805,8 @@
"T1053.005",
"T1059.001",
"detection.emerging-threats",
"T1059",
"T1036",
"T1059",
"T1053"
],
"title": "Operation Wocao Activity"
@@ -41817,8 +41839,8 @@
"T1059.001",
"detection.emerging-threats",
"T1053",
"T1059",
"T1036"
"T1036",
"T1059"
],
"title": "Operation Wocao Activity - Security"
},
@@ -43891,8 +43913,8 @@
"TA0002",
"T1204.002",
"T1553.005",
"T1553",
"T1204"
"T1204",
"T1553"
],
"title": "Windows AppX Deployment Full Trust Package Installation"
},
@@ -43989,8 +44011,8 @@
"TA0002",
"T1204.002",
"T1553.005",
"T1204",
"T1553"
"T1553",
"T1204"
],
"title": "Windows AppX Deployment Unsigned Package Installation"
},
@@ -45335,8 +45357,8 @@
"TA0002",
"T1543.003",
"T1569.002",
"T1543",
"T1569"
"T1569",
"T1543"
],
"title": "Remote Access Tool Services Have Been Installed - Security"
},
@@ -46163,8 +46185,8 @@
"T1003.006",
"T1569.002",
"attack.s0005",
"T1003",
"T1569"
"T1569",
"T1003"
],
"title": "Credential Dumping Tools Service Execution - Security"
},
@@ -47189,9 +47211,9 @@
"T1485",
"T1553.002",
"attack.s0195",
"T1553",
"T1070",
"T1027",
"T1553"
"T1027"
],
"title": "Potential Secure Deletion with SDelete"
},
@@ -47239,8 +47261,8 @@
"T1087.002",
"T1069.002",
"attack.s0039",
"T1087",
"T1069"
"T1069",
"T1087"
],
"title": "Reconnaissance Activity"
},
@@ -48169,8 +48191,8 @@
"T1218.010",
"TA0002",
"TA0005",
"T1204",
"T1218"
"T1218",
"T1204"
],
"title": "Excel Proxy Executing Regsvr32 With Payload Alternate"
},
@@ -48329,8 +48351,8 @@
"T1218.010",
"TA0002",
"TA0005",
"T1218",
"T1204"
"T1204",
"T1218"
],
"title": "Office Applications Spawning Wmi Cli Alternate"
},
@@ -48513,8 +48535,8 @@
"T1218.010",
"TA0002",
"TA0005",
"T1218",
"T1204"
"T1204",
"T1218"
],
"title": "New Lolbin Process by Office Applications"
},
@@ -50918,8 +50940,8 @@
"T1003.006",
"T1569.002",
"attack.s0005",
"T1003",
"T1569"
"T1569",
"T1003"
],
"title": "Credential Dumping Tools Service Execution - System"
},
@@ -50984,8 +51006,8 @@
"T1543.003",
"T1569.002",
"T1543",
"T1569",
"T1021"
"T1021",
"T1569"
],
"title": "CobaltStrike Service Installations - System"
},
@@ -51960,8 +51982,8 @@
"car.2013-09-005",
"T1543.003",
"T1569.002",
"T1569",
"T1543"
"T1543",
"T1569"
],
"title": "Malicious Service Installations"
},
@@ -52072,8 +52094,8 @@
"T1570",
"TA0002",
"T1569.002",
"T1569",
"T1021"
"T1021",
"T1569"
],
"title": "Metasploit Or Impacket Service Installation Via SMB PsExec"
},
@@ -52791,8 +52813,8 @@
"TA0008",
"T1563.002",
"T1021.001",
"T1021",
"T1563"
"T1563",
"T1021"
],
"title": "Possible RDP Hijacking"
},
@@ -54349,10 +54371,10 @@
"T1570",
"T1021.002",
"T1569.002",
"T1569",
"T1543",
"T1021",
"T1136",
"T1543"
"T1569",
"T1136"
],
"title": "PSExec Lateral Movement"
},