Detection rules › By event
Microsoft-Windows-Sysmon event 7
Sigma (98)
- Abusable DLL Potential Sideloading From Suspicious Location
- Amsi.DLL Loaded Via LOLBIN Process
- Aruba Network Service Potential DLL Sideloading
- BaaUpdate.exe Suspicious DLL Load
- Clfs.SYS Loaded By Process Located In a Potential Suspicious Location
- CLR DLL Loaded Via Office Applications
- CredUI.DLL Loaded By Uncommon Process
- Diagnostic Library Sdiageng.DLL Loaded By Msdt.EXE
- DLL Load By System Process From Suspicious Locations
- DLL Loaded From Suspicious Location Via Cmspt.EXE
- DLL Sideloading Of ShellChromeAPI.DLL
- DotNET Assembly DLL Loaded Via Office Application
- DotNet CLR DLL Loaded By Scripting Applications
- Fax Service DLL Search Order Hijack
- GAC DLL Loaded Via Office Applications
- HackTool - SharpEvtMute DLL Load
- HackTool - SILENTTRINITY Stager DLL Load
- Load Of RstrtMgr.DLL By A Suspicious Process
- Load Of RstrtMgr.DLL By An Uncommon Process
- Microsoft Excel Add-In Loaded From Uncommon Location
- Microsoft Office DLL Sideload
- Microsoft VBA For Outlook Addin Loaded Via Outlook
- MMC Loading Script Engines DLLs
- PCRE.NET Package Image Load
- Potential 7za.DLL Sideloading
- Potential Antivirus Software DLL Sideloading
- Potential appverifUI.DLL Sideloading
- Potential AVKkid.DLL Sideloading
- Potential Azure Browser SSO Abuse
- Potential CCleanerDU.DLL Sideloading
- Potential CCleanerReactivator.DLL Sideloading
- Potential Chrome Frame Helper DLL Sideloading
- Potential DCOM InternetExplorer.Application DLL Hijack - Image Load
- Potential DLL Sideloading Of DBGCORE.DLL
- Potential DLL Sideloading Of DBGHELP.DLL
- Potential DLL Sideloading Of DbgModel.DLL
- Potential DLL Sideloading Of KeyScramblerIE.DLL Via KeyScrambler.EXE
- Potential DLL Sideloading Of Libcurl.DLL Via GUP.EXE
- Potential DLL Sideloading Of MpSvc.DLL
- Potential DLL Sideloading Of MsCorSvc.DLL
- Potential DLL Sideloading Of Non-Existent DLLs From System Folders
- Potential DLL Sideloading Using Coregen.exe
- Potential DLL Sideloading Via ClassicExplorer32.dll
- Potential DLL Sideloading Via comctl32.dll
- Potential DLL Sideloading Via JsSchHlp
- Potential DLL Sideloading Via VMware Xfer
- Potential EACore.DLL Sideloading
- Potential Edputil.DLL Sideloading
- Potential Goopdate.DLL Sideloading
- Potential Iviewers.DLL Sideloading
- Potential JLI.dll Side-Loading
- Potential Libvlc.DLL Sideloading
- Potential Mfdetours.DLL Sideloading
- Potential Mpclient.DLL Sideloading
- Potential Python DLL SideLoading
- Potential Rcdll.DLL Sideloading
- Potential RjvPlatform.DLL Sideloading From Default Location
- Potential RjvPlatform.DLL Sideloading From Non-Default Location
- Potential RoboForm.DLL Sideloading
- Potential ShellDispatch.DLL Sideloading
- Potential SmadHook.DLL Sideloading
- Potential SolidPDFCreator.DLL Sideloading
- Potential System DLL Sideloading From Non System Locations
- Potential Vivaldi_elf.DLL Sideloading
- Potential Waveedit.DLL Sideloading
- Potential Wazuh Security Platform DLL Sideloading
- Potential WWlib.DLL Sideloading
- Potentially Suspicious Volume Shadow Copy Vsstrace.dll Load
- PowerShell Core DLL Loaded By Non PowerShell Process
- PowerShell Core DLL Loaded Via Office Application
- Python Image Load By Non-Python Process
- Remote DLL Load Via Rundll32.EXE
- Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location
- Suspicious Renamed Comsvcs DLL Loaded By Rundll32
- Suspicious Unsigned Dbghelp/Dbgcore DLL Loaded
- Suspicious Unsigned Thor Scanner Execution
- Suspicious Volume Shadow Copy VSS_PS.dll Load
- Suspicious Volume Shadow Copy Vssapi.dll Load
- Suspicious WSMAN Provider Image Loads
- System Control Panel Item Loaded From Uncommon Location
- Third Party Software DLL Sideloading
- Time Travel Debugging Utility Usage - Image
- Trusted Path Bypass via Windows Directory Spoofing
- UAC Bypass Using Iscsicpl - ImageLoad
- UAC Bypass With Fake DLL
- Unsigned .node File Loaded
- Unsigned DLL Loaded by Windows Utility
- Unsigned Image Loaded Into LSASS Process
- Unsigned Mfdetours.DLL Sideloading
- Unsigned Module Loaded by ClickOnce Application
- VBA DLL Loaded Via Office Application
- VMGuestLib DLL Sideload
- VMMap Signed Dbghelp.DLL Potential Sideloading
- VMMap Unsigned Dbghelp.DLL Potential Sideloading
- WMI ActiveScriptEventConsumers Activity Via Scrcons.EXE DLL Load
- WMI Persistence - Command Line Event Consumer
- WMIC Loading Scripting Libraries
- Wmiprvse Wbemcomn DLL Hijack
Elastic (1)
Splunk (35)
- CMLUA Or CMSTPLUA UAC Bypass
- Loading Of Dynwrapx Module
- MS Scripting Process Loading Ldap Module
- MS Scripting Process Loading WMI Module
- MSI Module Loaded by Non-System Binary
- Spoolsv Suspicious Loaded Modules
- Sunburst Correlation DLL and Network Event
- UAC Bypass MMC Load Unsigned Dll
- UAC Bypass With Colorui COM Object
- Wbemprox COM Object Execution
- Windows BitDefender Submission Wizard DLL Sideloading
- Windows Credentials Access via VaultCli Module
- Windows DLL Module Loaded in Temp Dir
- Windows DLL Search Order Hijacking Hunt with Sysmon
- Windows DLL Side-Loading In Calc
- Windows Executable in Loaded Modules
- Windows Gather Victim Identity SAM Info
- Windows Hijack Execution Flow Version Dll Side Load
- Windows Input Capture Using Credential UI Dll
- Windows InstallUtil Credential Theft
- Windows Known Abused DLL Loaded Suspiciously
- Windows Known GraphicalProton Loaded Modules
- Windows MMC Loaded Script Engine DLL
- Windows NetSupport RMM DLL Loaded By Uncommon Process
- Windows Office Product Loaded MSHTML Module
- Windows Office Product Loading Taskschd DLL
- Windows Office Product Loading VBE7 DLL
- Windows Remote Access Software BRC4 Loaded Dll
- Windows Scheduled Task DLL Module Loaded
- Windows SpeechRuntime COM Hijacking DLL Load
- Windows SqlWriter SQLDumper DLL Sideload
- Windows Unsigned DLL Side-Loading
- Windows Unsigned DLL Side-Loading In Same Process Path
- Windows Unsigned MS DLL Side-Loading
- Windows Unusual Process Load Mozilla NSS-Mozglue Module