Detection rules › By event
Microsoft-Windows-Sysmon event 11
Sigma (166)
- .RDP File Created By Uncommon Application
- ADExplorer Writing Complete AD Snapshot Into .dat File
- ADSI-Cache File Creation By Uncommon Tool
- Advanced IP Scanner - File Event
- Adwind RAT / JRAT File Artifact
- Anydesk Temporary Artefact
- Assembly DLL Creation Via AspNetCompiler
- AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl - File
- BloodHound Collection Files
- Created Files by Microsoft Sync Center
- Creation Exe for Service with Unquoted Path
- Creation of a Diagcab
- Creation Of Non-Existent System DLL
- Creation of WerFault.exe/Wer.dll in Unusual Folder
- Cred Dump Tools Dropped Files
- CSExec Service File Creation
- Desktop.INI Created by Uncommon Process
- DLL Search Order Hijackig Via Additional Space in Path
- DPAPI Backup Keys And Certificate Export Activity IOC
- Drop Binaries Into Spool Drivers Color Folder
- Dynamic CSharp Compile Artefact
- EVTX Created In Uncommon Location
- File Creation In Suspicious Directory By Msdt.EXE
- File With Uncommon Extension Created By An Office Application
- Files With System DLL Name In Unsuspected Locations
- Files With System Process Name In Unsuspected Locations
- GatherNetworkInfo.VBS Reconnaissance Script Output
- GoToAssist Temporary Installation Artefact
- HackTool - CrackMapExec File Indicators
- HackTool - Dumpert Process Dumper Default File
- HackTool - Impacket File Indicators
- HackTool - Inveigh Execution Artefacts
- HackTool - Mimikatz Kirbi File Creation
- HackTool - NetExec File Indicators
- HackTool - NPPSpy Hacktool Usage
- HackTool - Potential Remote Credential Dumping Activity Via CrackMapExec Or Impacket-Secretsdump
- HackTool - Powerup Write Hijack DLL
- HackTool - QuarksPwDump Dump File
- HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators
- HackTool - SafetyKatz Dump Indicator
- HackTool - Typical HiveNightmare SAM File Export
- Hijack Legit RDP Session to Move Laterally
- Installation of TeamViewer Desktop
- ISO File Created Within Temp Folders
- ISO or Image Mount Indicator in Recent Files
- Legitimate Application Dropped Archive
- Legitimate Application Dropped Executable
- Legitimate Application Dropped Script
- Legitimate Application Writing Files In Uncommon Location
- LiveKD Driver Creation
- LiveKD Driver Creation By Uncommon Process
- LiveKD Kernel Memory Dump File Created
- LSASS Process Dump Artefact In CrashDumps Folder
- LSASS Process Memory Dump Creation Via Taskmgr.EXE
- LSASS Process Memory Dump Files
- Malicious DLL File Dropped in the Teams or OneDrive Folder
- Malicious PowerShell Scripts - FileCreation
- New Custom Shim Database Created
- New Outlook Macro Created
- NTDS Exfiltration Filename Patterns
- NTDS.DIT Created
- NTDS.DIT Creation By Uncommon Parent Process
- NTDS.DIT Creation By Uncommon Process
- Octopus Scanner Malware
- Office Macro File Creation
- Office Macro File Creation From Suspicious Process
- Office Macro File Download
- OneNote Attachment File Dropped In Suspicious Location
- PCRE.NET Package Temp Files
- PDF File Created By RegEdit.EXE
- Potential Binary Or Script Dropper Via PowerShell
- Potential DCOM InternetExplorer.Application DLL Hijack
- Potential File Extension Spoofing Using Right-to-Left Override
- Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream
- Potential Homoglyph Attack Using Lookalike Characters in Filename
- Potential Initial Access via DLL Search Order Hijacking
- Potential Persistence Attempt Via ErrorHandler.Cmd
- Potential Persistence Via Microsoft Office Add-In
- Potential Persistence Via Microsoft Office Startup Folder
- Potential Persistence Via Notepad++ Plugins
- Potential Persistence Via Outlook Form
- Potential Privilege Escalation Attempt Via .Exe.Local Technique
- Potential RipZip Attack on Startup Folder
- Potential SAM Database Dump
- Potential Startup Shortcut Persistence Via PowerShell.EXE
- Potential Suspicious PowerShell Module File Created
- Potential Webshell Creation On Static Website
- Potential Winnti Dropper Activity
- Potentially Suspicious DMP/HDMP File Creation
- Potentially Suspicious File Creation by OpenEDR's ITSMService
- Potentially Suspicious WDAC Policy File Creation
- PowerShell Module File Created
- PowerShell Module File Created By Non-PowerShell Process
- PowerShell Profile Modification
- PowerShell Script Dropped Via PowerShell.EXE
- Process Explorer Driver Creation By Non-Sysinternals Binary
- Process Monitor Driver Creation By Non-Sysinternals Binary
- PSEXEC Remote Execution File Artefact
- PsExec Service File Creation
- PSScriptPolicyTest Creation By Uncommon Process
- Publisher Attachment File Dropped In Suspicious Location
- Rclone Config File Creation
- RemCom Service File Creation
- Remote Access Tool - ScreenConnect Temporary File
- Renamed VsCode Code Tunnel Execution - File Indicator
- SCR File Write Event
- ScreenConnect Temporary Installation Artefact
- Self Extraction Directive File Created In Potentially Suspicious Location
- Startup Folder File Write
- Suspicious ASPX File Drop by Exchange
- Suspicious Binaries and Scripts in Public Folder
- Suspicious Binary Writes Via AnyDesk
- Suspicious Creation TXT File in User Desktop
- Suspicious Creation with Colorcpl
- Suspicious Deno File Written from Remote Source
- Suspicious Desktopimgdownldr Target File
- Suspicious DotNET CLR Usage Log Artifact
- Suspicious Double Extension Files
- Suspicious Executable File Creation
- Suspicious File Created by ArcSOC.exe
- Suspicious File Created in Outlook Temporary Directory
- Suspicious File Created In PerfLogs
- Suspicious File Created Via OneNote Application
- Suspicious File Creation Activity From Fake Recycle.Bin Folder
- Suspicious File Creation In Uncommon AppData Folder
- Suspicious File Drop by Exchange
- Suspicious File Write to SharePoint Layouts Directory
- Suspicious File Write to Webapps Root Directory
- Suspicious Files in Default GPO Folder
- Suspicious Get-Variable.exe Creation
- Suspicious Interactive PowerShell as SYSTEM
- Suspicious LNK Double Extension File Created
- Suspicious MSExchangeMailboxReplication ASPX Write
- Suspicious Outlook Macro Created
- Suspicious PROCEXP152.sys File Created In TMP
- Suspicious Scheduled Task Write to System32 Tasks
- Suspicious Screensaver Binary File Creation
- Suspicious Startup Folder Persistence
- TeamViewer Remote Session
- UAC Bypass Abusing Winsat Path Parsing - File
- UAC Bypass Using .NET Code Profiler on MMC
- UAC Bypass Using Consent and Comctl32 - File
- UAC Bypass Using EventVwr
- UAC Bypass Using IDiagnostic Profile - File
- UAC Bypass Using IEInstal - File
- UAC Bypass Using MSConfig Token Modification - File
- UAC Bypass Using NTFS Reparse Point - File
- UAC Bypass Using Windows Media Player - File
- UEFI Persistence Via Wpbbin - FileCreation
- Uncommon File Created by Notepad++ Updater Gup.EXE
- Uncommon File Created In Office Startup Folder
- Uncommon File Creation By Mysql Daemon Process
- VHD Image Download Via Browser
- Visual Studio Code Tunnel Remote File Creation
- VsCode Powershell Profile Modification
- WerFault LSASS Process Memory Dump
- Windows Binaries Write Suspicious Extensions
- Windows Shell/Scripting Application File Write to Suspicious Folder
- Windows Terminal Profile Settings Modification By Uncommon Process
- WinRAR Creating Files in Startup Locations
- WinSxS Executable File Creation By Non-System Process
- WMI Persistence - Script Event Consumer File Write
- Wmiexec Default Output File
- Wmiprvse Wbemcomn DLL Hijack - File
- Writing Local Admin Share
- WScript or CScript Dropper - File
Splunk (72)
- Batch File Write to System32
- Common Ransomware Extensions
- Common Ransomware Notes
- ConnectWise ScreenConnect Path Traversal
- Creation of lsass Dump with Taskmgr
- Detect AzureHound File Modifications
- Detect Certipy File Modifications
- Detect Exchange Web Shell
- Detect Outlook exe writing a zip file
- Detect Remote Access Software Usage File
- Detect RTLO In File Name
- Detect SharpHound File Modifications
- Drop IcedID License dat
- Email files written outside of the Outlook directory
- Executables Or Script Creation In Suspicious Path
- Executables Or Script Creation In Temp Path
- File with Samsam Extension
- GitHub Workflow File Creation or Modification
- IcedID Exfiltrated Archived File Creation
- LLM Model File Creation
- MS Exchange Mailbox Replication service writing Active Server Pages
- Msmpeng Application DLL Side Loading
- Overwriting Accessibility Binaries
- Process Creating LNK file in Suspicious Location
- Process Writing DynamicWrapperX
- Ransomware Notes bulk creation
- Remcos RAT File Creation in Remcos Folder
- Rundll32 Process Creating Exe Dll Files
- Ryuk Test Files Detected
- Samsam Test File Write
- SchCache Change By App Connect And Create ADSI Object
- Shai-Hulud 2 Exfiltration Artifact Files
- Shai-Hulud Workflow File Creation or Modification
- Shim Database File Creation
- Spike in File Writes
- Spoolsv Writing a DLL
- Spoolsv Writing a DLL - Sysmon
- Sqlite Module In Temp Folder
- Suspicious Image Creation In Appdata Folder
- Suspicious WAV file in Appdata Folder
- Suspicious writes to windows Recycle Bin
- Wermgr Process Create Executable File
- Windows Admin Permission Discovery
- Windows Archived Collected Data In TEMP Folder
- Windows Boot or Logon Autostart Execution In Startup Folder
- Windows CAB File on Disk
- Windows Credentials from Password Stores Chrome Copied in TEMP Dir
- Windows Credentials from Web Browsers Saved in TEMP Folder
- Windows Defacement Modify Transcodedwallpaper File
- Windows Default RDP File Creation By Non MSTSC Process
- Windows File Without Extension In Critical Folder
- Windows ISO LNK File Creation
- Windows Known Abused DLL Created
- Windows Mimikatz Crypto Export File Extensions
- Windows MOVEit Transfer Writing ASPX
- Windows MSHTA Writing to World Writable Path
- Windows NirSoft Tool Bundle File Created
- Windows Obfuscated Files or Information via RAR SFX
- Windows Office Product Dropped Cab or Inf File
- Windows Office Product Dropped Uncommon File
- Windows Outlook Macro Created by Suspicious Process
- Windows Phishing Outlook Drop Dll In FORM Dir
- Windows Potential AppDomainManager Hijack Artifacts Creation
- Windows Process Writing File to World Writable Path
- Windows RDP Bitmap Cache File Creation
- Windows Replication Through Removable Media
- Windows Screen Capture in TEMP folder
- Windows SharePoint Spinstall0 Webshell File Creation
- Windows Snake Malware File Modification Crmlog
- Windows Snake Malware Kernel Driver Comadmin
- Windows System File on Disk
- Windows User Execution Malicious URL Shortcut File