Detection rules › By event
Microsoft-Windows-Sysmon event 13
Sigma (236)
- Activate Suppression of Windows Security Center Notifications
- Add Debugger Entry To AeDebug For Persistence
- Add Debugger Entry To Hangs Key For Persistence
- Add DisallowRun Execution to Registry
- Add Port Monitor Persistence in Registry
- Allow RDP Remote Assistance Feature
- AMSI Disabled via Registry Modification
- Antivirus Filter Driver Disallowed On Dev Drive - Registry
- Atbroker Registry Change
- Bypass UAC Using DelegateExecute
- Bypass UAC Using Event Viewer
- Bypass UAC Using SilentCleanup Task
- Change the Fax Dll
- Change User Account Associated with the FAX Service
- Change Winevt Channel Access Permission Via Registry
- Classes Autorun Keys Modification
- ClickOnce Trust Prompt Tampering
- CMSTP Execution Registry Event
- COM Hijack via Sdclt
- COM Hijacking via TreatAs
- COM Object Hijacking Via Modification Of Default System CLSID Default Value
- Common Autorun Keys Modification
- CrashControl CrashDump Disabled
- Creation of a Local Hidden User Account by Registry
- CurrentControlSet Autorun Keys Modification
- CurrentVersion Autorun Keys Modification
- CurrentVersion NT Autorun Keys Modification
- Custom File Open Handler Executes PowerShell
- Default RDP Port Changed to Non Standard Port
- DHCP Callout DLL Installation
- Directory Service Restore Mode(DSRM) Registry Value Tampering
- Disable Administrative Share Creation at Startup
- Disable Exploit Guard Network Protection on Windows Defender
- Disable Internal Tools or Feature in Registry
- Disable Macro Runtime Scan Scope
- Disable Microsoft Defender Firewall via Registry
- Disable Privacy Settings Experience in Registry
- Disable PUA Protection on Windows Defender
- Disable Security Events Logging Adding Reg Key MiniNt
- Disable Tamper Protection on Windows Defender
- Disable Windows Defender Functionalities Via Registry Keys
- Disable Windows Event Logging Via Registry
- Disable Windows Firewall by Registry
- Disable Windows Security Center Notifications
- Disabled Windows Defender Eventlog
- Displaying Hidden Files Feature Disabled
- DLL Load via LSASS
- DNS-over-HTTPS Enabled by Registry
- Driver Added To Disallowed Images In HVCI - Registry
- Enable LM Hash Storage
- Enable Local Manifest Installation With Winget
- Enable Microsoft Dynamic Data Exchange
- Enable Remote Connection Between Anonymous Computer - AllowAnonymousCallback
- Enabling COR Profiler Environment Variables
- Esentutl Volume Shadow Copy Service Keys
- ETW Logging Disabled For rpcrt4.dll
- ETW Logging Disabled For SCM
- ETW Logging Disabled In .NET Processes - Sysmon Registry
- Execution DLL of Choice Using WAB.EXE
- FileFix - Command Evidence in TypedPaths
- Hide Schedule Task Via Index Value Tamper
- Hiding User Account Via SpecialAccounts Registry Key
- HybridConnectionManager Service Installation - Registry
- Hypervisor Enforced Paging Translation Disabled
- IE Change Domain Zone
- IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols
- Internet Explorer Autorun Keys Modification
- Internet Explorer DisableFirstRunCustomize Enabled
- Lolbas OneDriveStandaloneUpdater.exe Proxy Download
- Lsass Full Dump Request Via DumpType Registry Settings
- Macro Enabled In A Potentially Suspicious Document
- MaxMpxCt Registry Value Changed
- Microsoft Office Protected View Disabled
- Modification of IE Registry Settings
- Modify User Shell Folders Startup Value
- Narrator's Feedback-Hub Persistence
- NET NGenAssemblyUsageLog Registry Key Tamper
- NetNTLM Downgrade Attack - Registry
- New Application in AppCompat
- New BgInfo.EXE Custom DB Path Registry Configuration
- New BgInfo.EXE Custom VBScript Registry Configuration
- New BgInfo.EXE Custom WMI Query Registry Configuration
- New DLL Added to AppCertDlls Registry Key
- New DLL Added to AppInit_DLLs Registry Key
- New DNS ServerLevelPluginDll Installed
- New File Association Using Exefile
- New Netsh Helper DLL Registered From A Suspicious Location
- New ODBC Driver Registered
- New PortProxy Registry Entry Added
- New Root or CA or AuthRoot Certificate to Store
- New RUN Key Pointing to Suspicious Folder
- New TimeProviders Registered With Uncommon DLL Name
- Office Application Startup - Office Test
- Office Autorun Keys Modification
- Office Macros Warning Disabled
- Old TLS1.0/TLS1.1 Protocol Version Enabled
- Outlook EnableUnsafeClientMailRules Setting Enabled - Registry
- Outlook Macro Execution Without Warning Setting Enabled
- Outlook Security Settings Updated - Registry
- Path To Screensaver Binary Modified
- Periodic Backup For System Registry Hives Enabled
- Persistence Via Disk Cleanup Handler - Autorun
- Persistence Via Hhctrl.ocx
- Persistence Via New SIP Provider
- Potential AMSI COM Server Hijacking
- Potential Attachment Manager Settings Associations Tamper
- Potential Attachment Manager Settings Attachments Tamper
- Potential AutoLogger Sessions Tampering
- Potential ClickFix Execution Pattern - Registry
- Potential CobaltStrike Service Installations - Registry
- Potential COM Object Hijacking Via TreatAs Subkey - Registry
- Potential Credential Dumping Attempt Using New NetworkProvider - REG
- Potential Credential Dumping Via LSASS SilentProcessExit Technique
- Potential EventLog File Location Tampering
- Potential PendingFileRenameOperations Tampering
- Potential Persistence Using DebugPath
- Potential Persistence Via App Paths Default Property
- Potential Persistence Via AppCompat RegisterAppRestart Layer
- Potential Persistence Via AutodialDLL
- Potential Persistence Via CHM Helper DLL
- Potential Persistence Via Custom Protocol Handler
- Potential Persistence Via DLLPathOverride
- Potential Persistence Via Event Viewer Events.asp
- Potential Persistence Via Excel Add-in - Registry
- Potential Persistence Via GlobalFlags
- Potential Persistence Via Logon Scripts - Registry
- Potential Persistence Via LSA Extensions
- Potential Persistence Via Mpnotify
- Potential Persistence Via MyComputer Registry Keys
- Potential Persistence Via Netsh Helper DLL - Registry
- Potential Persistence Via New AMSI Providers - Registry
- Potential Persistence Via Outlook Home Page
- Potential Persistence Via Outlook LoadMacroProviderOnBoot Setting
- Potential Persistence Via Outlook Today Page
- Potential Persistence Via Scrobj.dll COM Hijacking
- Potential Persistence Via Shim Database In Uncommon Location
- Potential Persistence Via Shim Database Modification
- Potential Persistence Via TypedPaths
- Potential Persistence Via Visual Studio Tools for Office
- Potential PowerShell Execution Policy Tampering
- Potential Provisioning Registry Key Abuse For Binary Proxy Execution - REG
- Potential PSFactoryBuffer COM Hijacking
- Potential Qakbot Registry Activity
- Potential Ransomware Activity Using LegalNotice Message
- Potential Registry Persistence Attempt Via DbgManagedDebugger
- Potential Registry Persistence Attempt Via Windows Telemetry
- Potential SentinelOne Shell Context Menu Scan Command Tampering
- Potential Signing Bypass Via Windows Developer Features - Registry
- Potential WerFault ReflectDebugger Registry Value Abuse
- Potentially Suspicious Command Executed Via Run Dialog Box - Registry
- Potentially Suspicious Desktop Background Change Via Registry
- Potentially Suspicious ODBC Driver Registered
- PowerShell as a Service in Registry
- PowerShell Logging Disabled Via Registry Key Tampering
- PowerShell Script Execution Policy Enabled
- PUA - Sysinternal Tool Execution - Registry
- PUA - Sysinternals Tools Execution - Registry
- Python Function Execution Security Warning Disabled In Excel - Registry
- RDP Sensitive Settings Changed
- RDP Sensitive Settings Changed to Zero
- RedMimicry Winnti Playbook Registry Manipulation
- Register New IFiltre For Persistence
- Registry Disable System Restore
- Registry Entries For Azorult Malware
- Registry Explorer Policy Modification
- Registry Hide Function from User
- Registry Modification for OCI DLL Redirection
- Registry Modification to Hidden File Extension
- Registry Persistence Mechanisms in Recycle Bin
- Registry Persistence via Explorer Run Key
- Registry Persistence via Service in Safe Mode
- Registry Tampering by Potentially Suspicious Processes
- RestrictedAdminMode Registry Value Tampering
- Run Once Task Configuration in Registry
- Running Chrome VPN Extensions via the Registry 2 VPN Extension
- Scheduled TaskCache Change by Uncommon Program
- ScreenSaver Registry Key Set
- Scripted Diagnostics Turn Off Check Enabled - Registry
- Security Event Logging Disabled via MiniNt Registry Key - Registry Set
- Security Support Provider (SSP) Added to LSA Configuration
- Service Binary in Suspicious Folder
- ServiceDll Hijack
- Session Manager Autorun Keys Modification
- Shell Open Registry Keys Manipulation
- Sticky Key Like Backdoor Usage - Registry
- Suspicious Application Allowed Through Exploit Guard
- Suspicious Camera and Microphone Access
- Suspicious Environment Variable Has Been Registered
- Suspicious Execution Of Renamed Sysinternals Tools - Registry
- Suspicious Keyboard Layout Load
- Suspicious Path In Keyboard Layout IME File Registry Value
- Suspicious PowerShell In Registry Run Keys
- Suspicious Printer Driver Empty Manufacturer
- Suspicious Run Key from Download
- Suspicious Service Installed
- Suspicious Shell Open Command Registry Modification
- Suspicious Shim Database Patching Activity
- Suspicious Space Characters in RunMRU Registry Path - ClickFix
- Suspicious Space Characters in TypedPaths Registry Path - FileFix
- Sysmon Driver Altitude Change
- System Scripts Autorun Keys Modification
- Tamper With Sophos AV Registry Keys
- Trust Access Disable For VBApplications
- UAC Bypass Abusing Winsat Path Parsing - Registry
- UAC Bypass Using Windows Media Player - Registry
- UAC Bypass via Event Viewer
- UAC Bypass via Sdclt
- UAC Bypass Via Wsreset
- UAC Disabled
- UAC Notification Disabled
- UAC Secure Desktop Prompt Disabled
- Uncommon Extension In Keyboard Layout IME File Registry Value
- Uncommon Microsoft Office Trusted Location Added
- Usage of Renamed Sysinternals Tools - RegistrySet
- VBScript Payload Stored in Registry
- Wdigest CredGuard Registry Modification
- Wdigest Enable UseLogonCredential
- WFP Filter Added via Registry
- Windows Credential Editor Registry
- Windows Credential Guard Disabled - Registry
- Windows Defender Exclusions Added - Registry
- Windows Defender Service Disabled - Registry
- Windows Defender Threat Severity Default Action Modified
- Windows Event Log Access Tampering Via Registry
- Windows Hypervisor Enforced Code Integrity Disabled
- Windows Recall Feature Enabled - Registry
- Windows Registry Trust Record Modification
- Windows Vulnerable Driver Blocklist Disabled
- WINEKEY Registry Modification
- Winget Admin Settings Modification
- Winlogon AllowMultipleTSSessions Enable
- Winlogon Notify Key Logon Persistence
- WinSock2 Autorun Keys Modification
- Wow6432Node Classes Autorun Keys Modification
- Wow6432Node CurrentVersion Autorun Keys Modification
- Wow6432Node Windows NT CurrentVersion Autorun Keys Modification
Splunk (172)
- Active Setup Registry Autostart
- Add DefaultUser And Password In Registry
- Allow Inbound Traffic By Firewall Rule Registry
- Allow Operation with Consent Admin
- Auto Admin Logon Registry Entry
- Detect Remote Access Software Usage Registry
- Disable AMSI Through Registry
- Disable Defender AntiVirus Registry
- Disable Defender BlockAtFirstSeen Feature
- Disable Defender Enhanced Notification
- Disable Defender MpEngine Registry
- Disable Defender Spynet Reporting
- Disable Defender Submit Samples Consent Feature
- Disable ETW Through Registry
- Disable Registry Tool
- Disable Security Logs Using MiniNt Registry
- Disable Show Hidden Files
- Disable UAC Remote Restriction
- Disable Windows App Hotkeys
- Disable Windows Behavior Monitoring
- Disable Windows SmartScreen Protection
- Disabling CMD Application
- Disabling ControlPanel
- Disabling Defender Services
- Disabling FolderOptions Windows Feature
- Disabling NoRun Windows App
- Disabling Remote User Account Control
- Disabling SystemRestore In Registry
- Disabling Task Manager
- Disabling Windows Local Security Authority Defences via Registry
- Enable RDP In Other Port Number
- Enable WDigest UseLogonCredential Registry
- ETW Registry Disabled
- Eventvwr UAC Bypass
- Hide User Account From Sign-In Screen
- Logon Script Event Trigger Execution
- Malicious InProcServer32 Modification
- Modification Of Wallpaper
- Monitor Registry Keys for Print Monitors
- NET Profiler UAC bypass
- Print Processor Registry Autostart
- Registry Keys for Creating SHIM Databases
- Registry Keys Used For Persistence
- Registry Keys Used For Privilege Escalation
- Remcos client registry install entry
- Revil Registry Entry
- Screensaver Event Trigger Execution
- Sdclt UAC Bypass
- Set Default PowerShell Execution Policy To Unrestricted or Bypass
- SilentCleanup UAC Bypass
- Time Provider Persistence Registry
- Windows AD DSRM Account Changes
- Windows Audit Policy Auditing Option Modified - Registry
- Windows Autostart Execution LSASS Driver Registry Modification
- Windows Chrome Auto-Update Disabled via Registry
- Windows Chrome Extension Allowed Registry Modification
- Windows Compatibility Telemetry Tampering Through Registry
- Windows Defender Exclusion Registry Entry
- Windows Disable Change Password Through Registry
- Windows Disable Lock Workstation Feature Through Registry
- Windows Disable LogOff Button Through Registry
- Windows Disable Memory Crash Dump
- Windows Disable Notification Center
- Windows Disable Shutdown Button Through Registry
- Windows Disable Windows Group Policy Features Through Registry
- Windows DisableAntiSpyware Registry
- Windows Enable Win32 ScheduledJob via Registry
- Windows Hide Notification Features Through Registry
- Windows Impair Defense Change Win Defender Health Check Intervals
- Windows Impair Defense Change Win Defender Quick Scan Interval
- Windows Impair Defense Change Win Defender Throttle Rate
- Windows Impair Defense Change Win Defender Tracing Level
- Windows Impair Defense Configure App Install Control
- Windows Impair Defense Define Win Defender Threat Action
- Windows Impair Defense Delete Win Defender Context Menu
- Windows Impair Defense Delete Win Defender Profile Registry
- Windows Impair Defense Deny Security Software With Applocker
- Windows Impair Defense Disable Controlled Folder Access
- Windows Impair Defense Disable Defender Firewall And Network
- Windows Impair Defense Disable Defender Protocol Recognition
- Windows Impair Defense Disable PUA Protection
- Windows Impair Defense Disable Realtime Signature Delivery
- Windows Impair Defense Disable Web Evaluation
- Windows Impair Defense Disable Win Defender App Guard
- Windows Impair Defense Disable Win Defender Compute File Hashes
- Windows Impair Defense Disable Win Defender Gen reports
- Windows Impair Defense Disable Win Defender Network Protection
- Windows Impair Defense Disable Win Defender Report Infection
- Windows Impair Defense Disable Win Defender Scan On Update
- Windows Impair Defense Disable Win Defender Signature Retirement
- Windows Impair Defense Overide Win Defender Phishing Filter
- Windows Impair Defense Override SmartScreen Prompt
- Windows Impair Defense Set Win Defender Smart Screen Level To Warn
- Windows Impair Defenses Disable Auto Logger Session
- Windows Impair Defenses Disable AV AutoStart via Registry
- Windows Impair Defenses Disable HVCI
- Windows Impair Defenses Disable Win Defender Auto Logging
- Windows InProcServer32 New Outlook Form
- Windows LSA Secrets NoLMhash Registry
- Windows Modify Registry AuthenticationLevelOverride
- Windows Modify Registry Auto Minor Updates
- Windows Modify Registry Auto Update Notif
- Windows Modify Registry Configure BitLocker
- Windows Modify Registry Default Icon Setting
- Windows Modify Registry Disable RDP
- Windows Modify Registry Disable Restricted Admin
- Windows Modify Registry Disable Toast Notifications
- Windows Modify Registry Disable Win Defender Raw Write Notif
- Windows Modify Registry Disable WinDefender Notifications
- Windows Modify Registry Disable Windows Security Center Notif
- Windows Modify Registry DisableRemoteDesktopAntiAlias
- Windows Modify Registry DisableSecuritySettings
- Windows Modify Registry Disabling WER Settings
- Windows Modify Registry DisAllow Windows App
- Windows Modify Registry Do Not Connect To Win Update
- Windows Modify Registry DontShowUI
- Windows Modify Registry EnableLinkedConnections
- Windows Modify Registry LongPathsEnabled
- Windows Modify Registry MaxConnectionPerServer
- Windows Modify Registry No Auto Reboot With Logon User
- Windows Modify Registry No Auto Update
- Windows Modify Registry NoChangingWallPaper
- Windows Modify Registry on Smart Card Group Policy
- Windows Modify Registry ProxyEnable
- Windows Modify Registry ProxyServer
- Windows Modify Registry Qakbot Binary Data Registry
- Windows Modify Registry Suppress Win Defender Notif
- Windows Modify Registry Tamper Protection
- Windows Modify Registry to Add or Modify Firewall Rule
- Windows Modify Registry UpdateServiceUrlAlternate
- Windows Modify Registry USeWuServer
- Windows Modify Registry Utilize ProgIDs
- Windows Modify Registry ValleyRAT C2 Config
- Windows Modify Registry ValleyRat PWN Reg Entry
- Windows Modify Registry With MD5 Reg Key Name
- Windows Modify Registry WuServer
- Windows Modify Registry wuStatusServer
- Windows Modify Show Compress Color And Info Tip Registry
- Windows Mshta Execution In Registry
- Windows New Custom Security Descriptor Set On EventLog Channel
- Windows New Default File Association Value Set
- Windows New EventLog ChannelAccess Registry Value Set
- Windows New InProcServer32 Added
- Windows Njrat Fileless Storage via Registry
- Windows Outlook Dialogs Disabled from Unusual Process
- Windows Outlook LoadMacroProviderOnBoot Persistence
- Windows Outlook Macro Security Modified
- Windows Outlook WebView Registry Modification
- Windows Phishing Recent ISO Exec Registry
- Windows Process Executed From Removable Media
- Windows Proxy Via Registry
- Windows RDP Server Registry Deletion
- Windows RDP Server Registry Entry Created
- Windows Registry BootExecute Modification
- Windows Registry Certificate Added
- Windows Registry Dotnet ETW Disabled Via ENV Variable
- Windows Registry Modification for Safe Mode Persistence
- Windows Registry Payload Injection
- Windows Registry SIP Provider Modification
- Windows Remote Access Software RMS Registry
- Windows Remote Services Allow Remote Assistance
- Windows Remote Services Rdp Enable
- Windows Routing and Remote Access Service Registry Key Change
- Windows RunMRU Command Execution
- Windows Service Creation Using Registry Entry
- Windows Service Deletion In Registry
- Windows Set Network Profile Category to Private via Registry
- Windows Snake Malware Registry Modification wav OpenWithProgIds
- Windows SnappyBee Create Test Registry
- Windows USBSTOR Registry Key Modification
- Windows WPDBusEnum Registry Key Modification
- WSReset UAC Bypass