<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.stealth on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.stealth/</link>
    <description>Recent content in attack.stealth on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.stealth/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>.RDP File Created By Uncommon Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_rdp_file_susp_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_rdp_file_susp_creation/</guid>
      <description>
        
          
            Detects creation of a file with an &#34;.rdp&#34; extension by an application that doesn&#39;t commonly create such files.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Abuse of Service Permissions to Hide Services Via Set-Service</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_hide_services_via_set_service/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_hide_services_via_set_service/</guid>
      <description>
        
          
            Detects usage of the &#34;Set-Service&#34; powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as &#34;sc.exe&#34;, &#34;Get-Service&#34;...etc. (Works only in powershell 7)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Abuse of Service Permissions to Hide Services Via Set-Service - PS</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_using_set_service_to_hide_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_using_set_service_to_hide_services/</guid>
      <description>
        
          
            Detects usage of the &#34;Set-Service&#34; powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as &#34;sc.exe&#34;, &#34;Get-Service&#34;...etc. (Works only in powershell 7)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Abusing Print Executable</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_print_remote_file_copy/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_print_remote_file_copy/</guid>
      <description>
        
          
            Attackers can use print.exe for remote file copy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Account Created And Deleted Within A Close Time Frame</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_account_created_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_account_created_deleted/</guid>
      <description>
        
          
            Detects when an account was created and deleted in a short period of time.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Account Disabled or Blocked for Sign in Attempts</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_blocked_account_attempt/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_blocked_account_attempt/</guid>
      <description>
        
          
            Detects when an account is disabled or blocked for sign in but tried to log in
          
          
        
      </description>
    </item>
    
    <item>
      <title>Account Tampering - Suspicious Failed Logon Reasons</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_failed_logon_reasons/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_failed_logon_reasons/</guid>
      <description>
        
          
            This method uses uncommon error codes on failed logons to determine suspicious activity and tampering with accounts that have been disabled or somehow restricted.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Activity From Anonymous IP Address</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_anonymous_ip_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_anonymous_ip_activity/</guid>
      <description>
        
          
            Identifies that users were active from an IP address that has been identified as an anonymous proxy IP address.
          
          
        
      </description>
    </item>
    
    <item>
      <title>AddinUtil.EXE Execution From Uncommon Directory</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_addinutil_uncommon_dir_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_addinutil_uncommon_dir_exec/</guid>
      <description>
        
          
            Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) from a non-standard directory.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Addition of SID History to Active Directory Object</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_add_sid_history/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_add_sid_history/</guid>
      <description>
        
          
            An attacker can use the SID history attribute to gain additional privileges.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Admin User Remote Logon</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_admin_rdp_login/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_admin_rdp_login/</guid>
      <description>
        
          
            Detect remote login by Administrator user (depending on internal pattern).
          
          
        
      </description>
    </item>
    
    <item>
      <title>ADS Zone.Identifier Deleted By Uncommon Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_zone_identifier_ads_uncommon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_zone_identifier_ads_uncommon/</guid>
      <description>
        
          
            Detects the deletion of the &#34;Zone.Identifier&#34; ADS by an uncommon process. Attackers can leverage this in order to bypass security restrictions that make use of the ADS such as Microsoft Office apps.
          
          
        
      </description>
    </item>
    
    <item>
      <title>AgentExecutor PowerShell Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_agentexecutor_potential_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_agentexecutor_potential_abuse/</guid>
      <description>
        
          
            Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy &#34;Bypass&#34; or any binary named &#34;powershell.exe&#34; located in the path provided by 6th positional argument
          
          
        
      </description>
    </item>
    
    <item>
      <title>Antivirus PrinterNightmare CVE-2021-34527 Exploit Detection</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-1675/av_exploit_cve_2021_34527_print_nightmare/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-1675/av_exploit_cve_2021_34527_print_nightmare/</guid>
      <description>
        
          
            Detects the suspicious file that is created from PoC code against Windows Print Spooler Remote Code Execution Vulnerability CVE-2021-34527 (PrinterNightmare), CVE-2021-1675 .
          
          
        
      </description>
    </item>
    
    <item>
      <title>Application AppID Uri Configuration Changes</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_app_appid_uri_changes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_app_appid_uri_changes/</guid>
      <description>
        
          
            Detects when a configuration change is made to an applications AppID URI.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Application URI Configuration Changes</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_app_uri_modifications/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_app_uri_modifications/</guid>
      <description>
        
          
            Detects when a configuration change is made to an applications URI.
URIs for domain names that no longer exist (dangling URIs), not using HTTPS, wildcards at the end of the domain, URIs that are no unique to that app, or URIs that point to domains you do not control should be investigated.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Application Using Device Code Authentication Flow</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_app_device_code_authentication/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_app_device_code_authentication/</guid>
      <description>
        
          
            Device code flow is an OAuth 2.0 protocol flow specifically for input constrained devices and is not used in all environments.
If this type of flow is seen in the environment and not being used in an input constrained device scenario, further investigation is warranted.
This can be a misconfigured application or potentially something malicious.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Applications That Are Using ROPC Authentication Flow</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_app_ropc_authentication/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_app_ropc_authentication/</guid>
      <description>
        
          
            Resource owner password credentials (ROPC) should be avoided if at all possible as this requires the user to expose their current password credentials to the application directly.
The application then uses those credentials to authenticate the user against the identity provider.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AppX Located in Known Staging Directory Added to Deployment Pipeline</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_appx_package_in_staging_directory/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_appx_package_in_staging_directory/</guid>
      <description>
        
          
            Detects an appx package that was added to the pipeline of the &#34;to be processed&#34; packages that is located in a known folder often used as a staging directory.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AppX Located in Uncommon Directory Added to Deployment Pipeline</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_uncommon_package_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_uncommon_package_locations/</guid>
      <description>
        
          
            Detects an appx package that was added to the pipeline of the &#34;to be processed&#34; packages that is located in uncommon locations.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AppX Package Deployment Failed Due to Signing Requirements</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_appx_package_deployment_failed_signing_requirements/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_appx_package_deployment_failed_signing_requirements/</guid>
      <description>
        
          
            Detects an appx package deployment / installation with the error code &#34;0x80073cff&#34; which indicates that the package didn&#39;t meet the signing requirements.

          
          
        
      </description>
    </item>
    
    <item>
      <title>APT PRIVATELOG Image Load Pattern</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/ta/privatelog/image_load_usp_svchost_clfsw32/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/ta/privatelog/image_load_usp_svchost_clfsw32/</guid>
      <description>
        
          
            Detects an image load pattern as seen when a tool named PRIVATELOG is used and rarely observed under legitimate circumstances
          
          
        
      </description>
    </item>
    
    <item>
      <title>APT27 - Emissary Panda Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt27/proc_creation_win_apt_apt27_emissary_panda/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt27/proc_creation_win_apt_apt27_emissary_panda/</guid>
      <description>
        
          
            Detects the execution of DLL side-loading malware used by threat group Emissary Panda aka APT27
          
          
        
      </description>
    </item>
    
    <item>
      <title>APT29 2018 Phishing Campaign CommandLine Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt29-cozybear/proc_creation_win_apt_apt29_phishing_campaign_indicators/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt29-cozybear/proc_creation_win_apt_apt29_phishing_campaign_indicators/</guid>
      <description>
        
          
            Detects indicators of APT 29 (Cozy Bear) phishing-campaign as reported by mandiant
          
          
        
      </description>
    </item>
    
    <item>
      <title>APT29 2018 Phishing Campaign File Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt29-cozybear/file_event_win_apt_cozy_bear_phishing_campaign_indicators/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt29-cozybear/file_event_win_apt_cozy_bear_phishing_campaign_indicators/</guid>
      <description>
        
          
            Detects indicators of APT 29 (Cozy Bear) phishing-campaign as reported by mandiant
          
          
        
      </description>
    </item>
    
    <item>
      <title>Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dotnet_arbitrary_dll_csproj_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dotnet_arbitrary_dll_csproj_execution/</guid>
      <description>
        
          
            Detects execution of arbitrary DLLs or unsigned code via a &#34;.csproj&#34; files via Dotnet.EXE.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Arbitrary File Download Via IMEWDBLD.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_imewbdld_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_imewbdld_download/</guid>
      <description>
        
          
            Detects usage of &#34;IMEWDBLD.exe&#34; to download arbitrary files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Arbitrary File Download Via MSEDGE_PROXY.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msedge_proxy_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msedge_proxy_download/</guid>
      <description>
        
          
            Detects usage of &#34;msedge_proxy.exe&#34; to download arbitrary files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Arbitrary File Download Via MSOHTMED.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msohtmed_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msohtmed_download/</guid>
      <description>
        
          
            Detects usage of &#34;MSOHTMED&#34; to download arbitrary files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Arbitrary File Download Via MSPUB.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mspub_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mspub_download/</guid>
      <description>
        
          
            Detects usage of &#34;MSPUB&#34; (Microsoft Publisher) to download arbitrary files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Arbitrary File Download Via PresentationHost.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_presentationhost_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_presentationhost_download/</guid>
      <description>
        
          
            Detects usage of &#34;PresentationHost&#34; which is a utility that runs &#34;.xbap&#34; (Browser Applications) files to download arbitrary files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Arbitrary File Download Via Squirrel.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_squirrel_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_squirrel_download/</guid>
      <description>
        
          
            Detects the usage of the &#34;Squirrel.exe&#34; to download arbitrary files. This binary is part of multiple Electron based software installations (Slack, Teams, Discord, etc.)

          
          
        
      </description>
    </item>
    
    <item>
      <title>Arbitrary MSI Download Via Devinit.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_devinit_lolbin_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_devinit_lolbin_usage/</guid>
      <description>
        
          
            Detects a certain command line flag combination used by &#34;devinit.exe&#34;, which can be abused as a LOLBIN to download arbitrary MSI packages on a Windows system
          
          
        
      </description>
    </item>
    
    <item>
      <title>Aruba Network Service Potential DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_aruba_networks_virtual_intranet_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_aruba_networks_virtual_intranet_access/</guid>
      <description>
        
          
            Detects potential DLL sideloading activity via the Aruba Networks Virtual Intranet Access &#34;arubanetsvc.exe&#34; process using DLL Search Order Hijacking
          
          
        
      </description>
    </item>
    
    <item>
      <title>ASLR Disabled Via Sysctl or Direct Syscall - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/lnx_auditd_disable_aslr_protection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/lnx_auditd_disable_aslr_protection/</guid>
      <description>
        
          
            Detects actions that disable Address Space Layout Randomization (ASLR) in Linux, including:
  - Use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000)
  - Modification of the /proc/sys/kernel/randomize_va_space file
  - Execution of the `sysctl` command to set `kernel.randomize_va_space=0`
Disabling ASLR is often used by attackers during exploit development or to bypass memory protection mechanisms.
A successful use of these methods can reduce the effectiveness of ASLR and make memory corruption attacks more reliable.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AspNetCompiler Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_aspnet_compiler_exectuion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_aspnet_compiler_exectuion/</guid>
      <description>
        
          
            Detects execution of &#34;aspnet_compiler.exe&#34; which can be abused to compile and execute C# code.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Assembly Loading Via CL_LoadAssembly.ps1</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cl_loadassembly/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cl_loadassembly/</guid>
      <description>
        
          
            Detects calls to &#34;LoadAssemblyFromPath&#34; or &#34;LoadAssemblyFromNS&#34; that are part of the &#34;CL_LoadAssembly.ps1&#34; script. This can be abused to load different assemblies and bypass App locker controls.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Atbroker Registry Change</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_susp_atbroker_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_susp_atbroker_change/</guid>
      <description>
        
          
            Detects creation/modification of Assistive Technology applications and persistence with usage of &#39;at&#39;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Atomic MacOS Stealer - Persistence Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/malware/atomic-macos-stealer/file_event_macos_malware_amos_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/malware/atomic-macos-stealer/file_event_macos_malware_amos_persistence/</guid>
      <description>
        
          
            Detects creation of persistence artifacts placed by Atomic MacOS Stealer in macOS systems. Recent Atomic MacOS Stealer variants have been observed dropping these to maintain persistent access after compromise.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Atypical Travel</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_atypical_travel/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_atypical_travel/</guid>
      <description>
        
          
            Identifies two sign-ins originating from geographically distant locations, where at least one of the locations may also be atypical for the user, given past behavior.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Audit CVE Event</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/microsoft-windows_audit_cve/win_audit_cve/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/microsoft-windows_audit_cve/win_audit_cve/</guid>
      <description>
        
          
            Detects events generated by user-mode applications when they call the CveEventWrite API when a known vulnerability is trying to be exploited.
MS started using this log in Jan. 2020 with CVE-2020-0601 (a Windows CryptoAPI vulnerability.
Unfortunately, that is about the only instance of CVEs being written to this log.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Authentications To Important Apps Using Single Factor Authentication</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_auth_to_important_apps_using_single_factor_auth/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_auth_to_important_apps_using_single_factor_auth/</guid>
      <description>
        
          
            Detect when authentications to important application(s) only required single-factor authentication
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_winrm_awl_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_winrm_awl_bypass/</guid>
      <description>
        
          
            Detects execution of attacker-controlled WsmPty.xsl or WsmTxt.xsl via winrm.vbs and copied cscript.exe (can be renamed)
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl - File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_winrm_awl_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_winrm_awl_bypass/</guid>
      <description>
        
          
            Detects execution of attacker-controlled WsmPty.xsl or WsmTxt.xsl via winrm.vbs and copied cscript.exe (can be renamed)
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS Bucket Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_bucket_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_bucket_deleted/</guid>
      <description>
        
          
            Detects the deletion of S3 buckets in AWS CloudTrail logs.
Monitoring the deletion of S3 buckets is critical for security and data integrity, as it may indicate potential data loss or unauthorized access attempts.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS IAM S3Browser LoginProfile Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_iam_s3browser_loginprofile_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_iam_s3browser_loginprofile_creation/</guid>
      <description>
        
          
            Detects S3 Browser utility performing reconnaissance looking for existing IAM Users without a LoginProfile defined then (when found) creating a LoginProfile.
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS IAM S3Browser Templated S3 Bucket Policy Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_iam_s3browser_templated_s3_bucket_policy_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_iam_s3browser_templated_s3_bucket_policy_creation/</guid>
      <description>
        
          
            Detects S3 browser utility creating Inline IAM policy containing default S3 bucket name placeholder value of &#34;&lt;YOUR-BUCKET-NAME&gt;&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS IAM S3Browser User or AccessKey Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_iam_s3browser_user_or_accesskey_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_iam_s3browser_user_or_accesskey_creation/</guid>
      <description>
        
          
            Detects S3 Browser utility creating IAM User or AccessKey.
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS Key Pair Import Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_ec2_import_key_pair_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_ec2_import_key_pair_activity/</guid>
      <description>
        
          
            Detects the import of SSH key pairs into AWS EC2, which may indicate an attacker attempting to gain unauthorized access to instances. This activity could lead to initial access, persistence, or privilege escalation, potentially compromising sensitive data and operations.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS Root Credentials</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_root_account_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_root_account_usage/</guid>
      <description>
        
          
            Detects AWS root account usage
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS SAML Provider Deletion Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_delete_saml_provider/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_delete_saml_provider/</guid>
      <description>
        
          
            Detects the deletion of an AWS SAML provider, potentially indicating malicious intent to disrupt administrative or security team access.
An attacker can remove the SAML provider for the information security team or a team of system administrators, to make it difficult for them to work and investigate at the time of the attack and after it.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS Successful Console Login Without MFA</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_console_login_success_without_mfa/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_console_login_success_without_mfa/</guid>
      <description>
        
          
            Detects successful AWS console logins that were performed without Multi-Factor Authentication (MFA).
This alert can be used to identify potential unauthorized access attempts, as logging in without MFA can indicate compromised credentials or misconfigured security settings.

          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS Suspicious SAML Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_susp_saml_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_susp_saml_activity/</guid>
      <description>
        
          
            Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS VPC Flow Logs Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_vpc_flow_logs_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_vpc_flow_logs_deleted/</guid>
      <description>
        
          
            Detects the deletion of one or more VPC Flow Logs in AWS Elastic Compute Cloud (EC2) through the DeleteFlowLogs API call.
Adversaries may delete flow logs to evade detection or remove evidence of network activity, hindering forensic investigations and visibility into malicious operations.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure AD Only Single Factor Authentication Required</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_only_single_factor_auth_required/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_only_single_factor_auth_required/</guid>
      <description>
        
          
            Detect when users are authenticating without MFA being required.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure AD Threat Intelligence</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_threat_intel/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_threat_intel/</guid>
      <description>
        
          
            Indicates user activity that is unusual for the user or consistent with known attack patterns.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Domain Federation Settings Modified</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_federation_modified/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_federation_modified/</guid>
      <description>
        
          
            Identifies when an user or application modified the federation settings on the domain.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Kubernetes Admission Controller</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_kubernetes_admission_controller/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_kubernetes_admission_controller/</guid>
      <description>
        
          
            Identifies when an admission controller is executed in Azure Kubernetes.
A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server.
The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster.
An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster.
For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod.
An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials.
An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Login Bypassing Conditional Access Policies</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/m365/audit/microsoft365_bypass_conditional_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/m365/audit/microsoft365_bypass_conditional_access/</guid>
      <description>
        
          
            Detects a successful login to the Microsoft Intune Company Portal which could allow bypassing Conditional Access Policies and InTune device trust using a tool like TokenSmith.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Owner Removed From Application or Service Principal</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_owner_removed_from_application_or_service_principal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_owner_removed_from_application_or_service_principal/</guid>
      <description>
        
          
            Identifies when a owner is was removed from a application or service principal in Azure.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Service Principal Created</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_service_principal_created/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_service_principal_created/</guid>
      <description>
        
          
            Identifies when a service principal is created in Azure.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Service Principal Removed</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_service_principal_removed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_service_principal_removed/</guid>
      <description>
        
          
            Identifies when a service principal was removed in Azure.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Subscription Permission Elevation Via ActivityLogs</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_subscription_permissions_elevation_via_activitylogs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_subscription_permissions_elevation_via_activitylogs/</guid>
      <description>
        
          
            Detects when a user has been elevated to manage all Azure Subscriptions.
This change should be investigated immediately if it isn&#39;t planned.
This setting could allow an attacker access to Azure subscriptions in your environment.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Subscription Permission Elevation Via AuditLogs</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_subscription_permissions_elevation_via_auditlogs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_subscription_permissions_elevation_via_auditlogs/</guid>
      <description>
        
          
            Detects when a user has been elevated to manage all Azure Subscriptions.
This change should be investigated immediately if it isn&#39;t planned.
This setting could allow an attacker access to Azure subscriptions in your environment.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Azure Unusual Authentication Interruption</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_unusual_authentication_interruption/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_unusual_authentication_interruption/</guid>
      <description>
        
          
            Detects when there is a interruption in the authentication process.
          
          
        
      </description>
    </item>
    
    <item>
      <title>BaaUpdate.exe Suspicious DLL Load</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_baaupdate_dll_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_baaupdate_dll_load/</guid>
      <description>
        
          
            Detects BitLocker Access Agent Update Utility (baaupdate.exe) loading DLLs from suspicious locations that are publicly writable which could indicate an attempt to lateral movement via BitLocker DCOM &amp; COM Hijacking.
This technique abuses COM Classes configured as INTERACTIVE USER to spawn processes in the context of the logged-on user&#39;s session. Specifically, it targets the BDEUILauncher Class (CLSID ab93b6f1-be76-4185-a488-a9001b105b94)
which can launch BaaUpdate.exe, which is vulnerable to COM Hijacking when started with input parameters. This allows attackers to execute code in the user&#39;s context without needing to steal credentials or use additional techniques to compromise the account.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Backup Catalog Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/microsoft_windows_backup/win_susp_backup_delete/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/microsoft_windows_backup/win_susp_backup_delete/</guid>
      <description>
        
          
            Detects backup catalog deletions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bad Opsec Defaults Sacrificial Processes With Improper Arguments</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_bad_opsec_sacrificial_processes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_bad_opsec_sacrificial_processes/</guid>
      <description>
        
          
            Detects attackers using tooling with bad opsec defaults.
E.g. spawning a sacrificial process to inject a capability into the process without taking into account how the process is normally run.
One trivial example of this is using rundll32.exe without arguments as a sacrificial process (default in CS, now highlighted by c2lint), running WerFault without arguments (Kraken - credit am0nsec), and other examples.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Base64 Encoded PowerShell Command Detected</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_frombase64string/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_frombase64string/</guid>
      <description>
        
          
            Detects usage of the &#34;FromBase64String&#34; function in the commandline which is used to decode a base64 encoded string
          
          
        
      </description>
    </item>
    
    <item>
      <title>Binary Padding - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_binary_padding/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_binary_padding/</guid>
      <description>
        
          
            Adversaries may use binary padding to add junk data and change the on-disk representation of malware.
This rule detect using dd and truncate to add a junk data to file.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Binary Padding - MacOS</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_binary_padding/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_binary_padding/</guid>
      <description>
        
          
            Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Binary Proxy Execution Via Dotnet-Trace.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution/</guid>
      <description>
        
          
            Detects commandline arguments for executing a child process via dotnet-trace.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitbucket User Login Failure</title>
      <link>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_user_login_failure_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_user_login_failure_detected/</guid>
      <description>
        
          
            Detects user authentication failure events.
Please note that this rule can be noisy and it is recommended to use with correlation based on &#34;author.name&#34; field.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitlocker Key Retrieval</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_bitlocker_key_retrieval/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_bitlocker_key_retrieval/</guid>
      <description>
        
          
            Monitor and alert for Bitlocker key retrieval.
          
          
        
      </description>
    </item>
    
    <item>
      <title>BitLockerTogo.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitlockertogo_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitlockertogo_execution/</guid>
      <description>
        
          
            Detects the execution of &#34;BitLockerToGo.EXE&#34;.
BitLocker To Go is BitLocker Drive Encryption on removable data drives. This feature includes the encryption of, USB flash drives, SD cards, External hard disk drives, Other drives that are formatted by using the NTFS, FAT16, FAT32, or exFAT file system.
This is a rarely used application and usage of it at all is worth investigating.
Malware such as Lumma stealer has been seen using this process as a target for process hollowing.

          
          
        
      </description>
    </item>
    
    <item>
      <title>BITS Transfer Job Download From Direct IP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_transfer_via_ip_address/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_transfer_via_ip_address/</guid>
      <description>
        
          
            Detects a BITS transfer job downloading file(s) from a direct IP address.
          
          
        
      </description>
    </item>
    
    <item>
      <title>BITS Transfer Job Download From File Sharing Domains</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_transfer_via_file_sharing_domains/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_transfer_via_file_sharing_domains/</guid>
      <description>
        
          
            Detects BITS transfer job downloading files from a file sharing domain.
          
          
        
      </description>
    </item>
    
    <item>
      <title>BITS Transfer Job Download To Potential Suspicious Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_trasnfer_susp_local_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_trasnfer_susp_local_folder/</guid>
      <description>
        
          
            Detects new BITS transfer job where the LocalName/Saved file is stored in a potentially suspicious location
          
          
        
      </description>
    </item>
    
    <item>
      <title>BITS Transfer Job Downloading File Potential Suspicious Extension</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_transfer_saving_susp_extensions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_transfer_saving_susp_extensions/</guid>
      <description>
        
          
            Detects new BITS transfer job saving local files with potential suspicious extensions
          
          
        
      </description>
    </item>
    
    <item>
      <title>BITS Transfer Job With Uncommon Or Suspicious Remote TLD</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_transfer_via_uncommon_tld/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_transfer_via_uncommon_tld/</guid>
      <description>
        
          
            Detects a suspicious download using the BITS client from a FQDN that is unusual. Adversaries may abuse BITS jobs to persistently execute or clean up after malicious payloads.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitsadmin to Uncommon IP Server Address</title>
      <link>https://detection.fyi/sigmahq/sigma/web/proxy_generic/proxy_ua_bitsadmin_susp_ip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/web/proxy_generic/proxy_ua_bitsadmin_susp_ip/</guid>
      <description>
        
          
            Detects Bitsadmin connections to IP addresses instead of FQDN names
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bitsadmin to Uncommon TLD</title>
      <link>https://detection.fyi/sigmahq/sigma/web/proxy_generic/proxy_ua_bitsadmin_susp_tld/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/web/proxy_generic/proxy_ua_bitsadmin_susp_tld/</guid>
      <description>
        
          
            Detects Bitsadmin connections to domains with uncommon TLDs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Browser Execution In Headless Mode</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_browsers_chromium_headless_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_browsers_chromium_headless_exec/</guid>
      <description>
        
          
            Detects execution of Chromium based browser in headless mode
          
          
        
      </description>
    </item>
    
    <item>
      <title>Bypass UAC via CMSTP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uac_bypass_cmstp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uac_bypass_cmstp/</guid>
      <description>
        
          
            Detect commandline usage of Microsoft Connection Manager Profile Installer (cmstp.exe) to install specially formatted local .INF files
          
          
        
      </description>
    </item>
    
    <item>
      <title>C# IL Code Compilation Via Ilasm.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ilasm_il_code_compilation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ilasm_il_code_compilation/</guid>
      <description>
        
          
            Detects the use of &#34;Ilasm.EXE&#34; in order to compile C# intermediate (IL) code to EXE or DLL.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Certificate Exported Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_export_pfx/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_export_pfx/</guid>
      <description>
        
          
            Detects the execution of the certutil with the &#34;exportPFX&#34; flag which allows the utility to export certificates.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Changes To PIM Settings</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_pim_change_settings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_pim_change_settings/</guid>
      <description>
        
          
            Detects when changes are made to PIM roles
          
          
        
      </description>
    </item>
    
    <item>
      <title>Changing Existing Service ImagePath Value Via Reg.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_service_imagepath_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_service_imagepath_change/</guid>
      <description>
        
          
            Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services.
Adversaries may use flaws in the permissions for registry to redirect from the originally specified executable to one that they control, in order to launch their own code at Service start.
Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services

          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco BGP Authentication Failures</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/bgp/cisco_bgp_md5_auth_failed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/bgp/cisco_bgp_md5_auth_failed/</guid>
      <description>
        
          
            Detects BGP failures which may be indicative of brute force attacks to manipulate routing
          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco Clear Logs</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_clear_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_clear_logs/</guid>
      <description>
        
          
            Clear command history in network OS which is used for defense evasion
          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco Duo Successful MFA Authentication Via Bypass Code</title>
      <link>https://detection.fyi/sigmahq/sigma/identity/cisco_duo/cisco_duo_mfa_bypass_via_bypass_code/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/identity/cisco_duo/cisco_duo_mfa_bypass_via_bypass_code/</guid>
      <description>
        
          
            Detects when a successful MFA authentication occurs due to the use of a bypass code.
A bypass code is a temporary passcode created by an administrator for a specific user to access a Duo-protected application. These are generally used as &#34;backup codes,&#34; so that enrolled users who are having problems with their mobile devices (e.g., mobile service is disrupted, the device is lost or stolen, etc.) or who temporarily can&#39;t use their enrolled devices (on a plane without mobile data services) can still access their Duo-protected systems.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco File Deletion</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_file_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/aaa/cisco_cli_file_deletion/</guid>
      <description>
        
          
            See what files are being deleted from flash file systems
          
          
        
      </description>
    </item>
    
    <item>
      <title>Cisco LDP Authentication Failures</title>
      <link>https://detection.fyi/sigmahq/sigma/network/cisco/ldp/cisco_ldp_md5_auth_failed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/cisco/ldp/cisco_ldp_md5_auth_failed/</guid>
      <description>
        
          
            Detects LDP failures which may be indicative of brute force attacks to manipulate MPLS labels
          
          
        
      </description>
    </item>
    
    <item>
      <title>Clearing Windows Console History</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_clearing_windows_console_history/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_clearing_windows_console_history/</guid>
      <description>
        
          
            Identifies when a user attempts to clear console history. An adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Cmd Launched with Hidden Start Flags to Suspicious Targets</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/</guid>
      <description>
        
          
            Detects cmd.exe executing commands with the &#34;start&#34; utility using &#34;/b&#34; (no window) or &#34;/min&#34; (minimized) flags.
To reduce false positives from standard background tasks, detection is restricted to scenarios where the target is a known script extension or located in suspicious temporary/public directories.
This technique was observed in Chaos, DarkSide, and Emotet malware campaigns.

          
          
        
      </description>
    </item>
    
    <item>
      <title>CMSTP Execution Process Access</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_cmstp_execution_by_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_cmstp_execution_by_access/</guid>
      <description>
        
          
            Detects various indicators of Microsoft Connection Manager Profile Installer execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>CMSTP Execution Process Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmstp_execution_by_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmstp_execution_by_creation/</guid>
      <description>
        
          
            Detects various indicators of Microsoft Connection Manager Profile Installer execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>CMSTP Execution Registry Event</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_cmstp_execution_by_registry/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_cmstp_execution_by_registry/</guid>
      <description>
        
          
            Detects various indicators of Microsoft Connection Manager Profile Installer execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>CMSTP UAC Bypass via COM Object Access</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uac_bypass_cmstp_com_object_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uac_bypass_cmstp_com_object_access/</guid>
      <description>
        
          
            Detects UAC Bypass Attempt Using Microsoft Connection Manager Profile Installer Autoelevate-capable COM Objects (e.g. UACMe ID of 41, 43, 58 or 65)
          
          
        
      </description>
    </item>
    
    <item>
      <title>CobaltStrike Load by Rundll32</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_cobaltstrike_load_by_rundll32/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_cobaltstrike_load_by_rundll32/</guid>
      <description>
        
          
            Rundll32 can be use by Cobalt Strike with StartW function to load DLLs from the command line.
          
          
        
      </description>
    </item>
    
    <item>
      <title>CobaltStrike Named Pipe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_cobaltstrike/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_cobaltstrike/</guid>
      <description>
        
          
            Detects the creation of a named pipe as used by CobaltStrike
          
          
        
      </description>
    </item>
    
    <item>
      <title>CobaltStrike Named Pipe Pattern Regex</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_cobaltstrike_re/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_cobaltstrike_re/</guid>
      <description>
        
          
            Detects the creation of a named pipe matching a pattern used by CobaltStrike Malleable C2 profiles
          
          
        
      </description>
    </item>
    
    <item>
      <title>CobaltStrike Named Pipe Patterns</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_cobaltstrike_susp_pipe_patterns/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_cobaltstrike_susp_pipe_patterns/</guid>
      <description>
        
          
            Detects the creation of a named pipe with a pattern found in CobaltStrike malleable C2 profiles
          
          
        
      </description>
    </item>
    
    <item>
      <title>Code Execution via Pcwutl.dll</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pcwutl/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pcwutl/</guid>
      <description>
        
          
            Detects launch of executable by calling the LaunchApplication function from pcwutl.dll library.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Code Injection by ld.so Preload</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/builtin/lnx_ldso_preload_injection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/builtin/lnx_ldso_preload_injection/</guid>
      <description>
        
          
            Detects the ld.so preload persistence file. See `man ld.so` for more information.
          
          
        
      </description>
    </item>
    
    <item>
      <title>CodePage Modification Via MODE.COM To Russian Language</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mode_codepage_russian/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mode_codepage_russian/</guid>
      <description>
        
          
            Detects a CodePage modification using the &#34;mode.com&#34; utility to Russian language.
This behavior has been used by threat actors behind Dharma ransomware.

          
          
        
      </description>
    </item>
    
    <item>
      <title>COLDSTEEL Persistence Service Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/win_system_malware_coldsteel_persistence_service/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/win_system_malware_coldsteel_persistence_service/</guid>
      <description>
        
          
            Detects the creation of new services potentially related to COLDSTEEL RAT
          
          
        
      </description>
    </item>
    
    <item>
      <title>COLDSTEEL RAT Anonymous User Process Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/proc_creation_win_malware_coldsteel_anonymous_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/proc_creation_win_malware_coldsteel_anonymous_process/</guid>
      <description>
        
          
            Detects the creation of a process executing as user called &#34;ANONYMOUS&#34; seen used by the &#34;MileStone2016&#34; variant of COLDSTEEL
          
          
        
      </description>
    </item>
    
    <item>
      <title>COLDSTEEL RAT Cleanup Command Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/proc_creation_win_malware_coldsteel_cleanup/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/proc_creation_win_malware_coldsteel_cleanup/</guid>
      <description>
        
          
            Detects the creation of a &#34;rundll32&#34; process from the ColdSteel persistence service to initiate the cleanup command by calling one of its own exports. This functionality is not present in &#34;MileStone2017&#34; and some &#34;MileStone2016&#34; samples
          
          
        
      </description>
    </item>
    
    <item>
      <title>COLDSTEEL RAT Service Persistence Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/proc_creation_win_malware_coldsteel_service_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/proc_creation_win_malware_coldsteel_service_persistence/</guid>
      <description>
        
          
            Detects the creation of an &#34;svchost&#34; process with specific command line flags, that were seen present and used by ColdSteel RAT
          
          
        
      </description>
    </item>
    
    <item>
      <title>COM Object Execution via Xwizard.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_xwizard_runwizard_com_object_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_xwizard_runwizard_com_object_exec/</guid>
      <description>
        
          
            Detects the execution of Xwizard tool with the &#34;RunWizard&#34; flag and a GUID like argument.
This utility can be abused in order to run custom COM object created in the registry.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Commvault QLogin with PublicSharingUser and GUID Password (CVE-2025-57788)</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-57788/proc_creation_win_exploit_cve_2025_57788/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-57788/proc_creation_win_exploit_cve_2025_57788/</guid>
      <description>
        
          
            Detects a qlogin.exe command attempting to authenticate as the internal `_+_PublicSharingUser_` using a GUID as the password.
This could be an indicator of an attacker exploiting CVE-2025-57788 to gain initial access using leaked credentials.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Control Panel Items</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_control_panel_item/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_control_panel_item/</guid>
      <description>
        
          
            Detects the malicious use of a control panel item
          
          
        
      </description>
    </item>
    
    <item>
      <title>ConvertTo-SecureString Cmdlet Usage Via CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cmdline_convertto_securestring/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cmdline_convertto_securestring/</guid>
      <description>
        
          
            Detects usage of the &#34;ConvertTo-SecureString&#34; cmdlet via the commandline. Which is fairly uncommon and could indicate potential suspicious activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>CrashControl CrashDump Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_crashdump_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_crashdump_disabled/</guid>
      <description>
        
          
            Detects disabling the CrashDump per registry (as used by HermeticWiper)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Created Files by Microsoft Sync Center</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_creation_by_mobsync/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_creation_by_mobsync/</guid>
      <description>
        
          
            This rule detects suspicious files created by Microsoft Sync Center (mobsync)
          
          
        
      </description>
    </item>
    
    <item>
      <title>CreateDump Process Dump</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_createdump_lolbin_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_createdump_lolbin_execution/</guid>
      <description>
        
          
            Detects uses of the createdump.exe LOLOBIN utility to dump process memory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Creation Of a Suspicious ADS File Outside a Browser Download</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_creation_internet_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_creation_internet_file/</guid>
      <description>
        
          
            Detects the creation of a suspicious ADS (Alternate Data Stream) file by software other than browsers
          
          
        
      </description>
    </item>
    
    <item>
      <title>Creation Of Non-Existent System DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_create_non_existent_dlls/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_create_non_existent_dlls/</guid>
      <description>
        
          
            Detects creation of specific system DLL files that are  usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes.
Phantom DLL hijacking involves placing malicious DLLs with names of non-existent system binaries in locations where legitimate applications may search for them, leading to execution of the malicious DLLs.
Thus, the creation of such DLLs may indicate preparation for phantom DLL hijacking attacks.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Creation Of Pod In System Namespace</title>
      <link>https://detection.fyi/sigmahq/sigma/application/kubernetes/audit/kubernetes_audit_pod_in_system_namespace/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/kubernetes/audit/kubernetes_audit_pod_in_system_namespace/</guid>
      <description>
        
          
            Detects deployments of pods within the kube-system namespace, which could be intended to imitate system pods.
System pods, created by controllers such as Deployments or DaemonSets have random suffixes in their names.
Attackers can use this fact and name their backdoor pods as if they were created by these controllers to avoid detection.
Deployment of such a backdoor container e.g. named kube-proxy-bv61v, could be attempted in the kube-system namespace alongside the other administrative containers.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Creation of WerFault.exe/Wer.dll in Unusual Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_werfault_dll_hijacking/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_werfault_dll_hijacking/</guid>
      <description>
        
          
            Detects the creation of a file named &#34;WerFault.exe&#34; or &#34;wer.dll&#34; in an uncommon folder, which could be a sign of WerFault DLL hijacking.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Csc.EXE Execution Form Potentially Suspicious Parent</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_csc_susp_parent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_csc_susp_parent/</guid>
      <description>
        
          
            Detects a potentially suspicious parent of &#34;csc.exe&#34;, which could be a sign of payload delivery.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Curl Download And Execute Combination</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_curl_download_exec_combo/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_curl_download_exec_combo/</guid>
      <description>
        
          
            Adversaries can use curl to download payloads remotely and execute them. Curl is included by default in Windows 10 build 17063 and later.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Custom File Open Handler Executes PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_custom_file_open_handler_powershell_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_custom_file_open_handler_powershell_execution/</guid>
      <description>
        
          
            Detects the abuse of custom file open handler, executing powershell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Decode Base64 Encoded Text</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_base64_decode/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_base64_decode/</guid>
      <description>
        
          
            Detects usage of base64 utility to decode arbitrary base64-encoded text
          
          
        
      </description>
    </item>
    
    <item>
      <title>Decode Base64 Encoded Text -MacOs</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_base64_decode/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_base64_decode/</guid>
      <description>
        
          
            Detects usage of base64 utility to decode arbitrary base64-encoded text
          
          
        
      </description>
    </item>
    
    <item>
      <title>Deployment AppX Package Was Blocked By AppLocker</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_applocker_block/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_applocker_block/</guid>
      <description>
        
          
            Detects an appx package deployment that was blocked by AppLocker policy.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Detection of PowerShell Execution via Sqlps.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mssql_sqlps_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mssql_sqlps_susp_execution/</guid>
      <description>
        
          
            This rule detects execution of a PowerShell code through the sqlps.exe utility, which is included in the standard set of utilities supplied with the MSSQL Server.
Script blocks are not logged in this case, so this utility helps to bypass protection mechanisms based on the analysis of these logs.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Device Registration or Join Without MFA</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_device_registration_or_join_without_mfa/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_device_registration_or_join_without_mfa/</guid>
      <description>
        
          
            Monitor and alert for device registration or join events where MFA was not performed.
          
          
        
      </description>
    </item>
    
    <item>
      <title>DeviceCredentialDeployment Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_device_credential_deployment/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_device_credential_deployment/</guid>
      <description>
        
          
            Detects the execution of DeviceCredentialDeployment to hide a process from view.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Devtoolslauncher.exe Executes Specified Binary</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_devtoolslauncher/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_devtoolslauncher/</guid>
      <description>
        
          
            The Devtoolslauncher.exe executes other binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>DHCP Callout DLL Installation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dhcp_calloutdll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dhcp_calloutdll/</guid>
      <description>
        
          
            Detects the installation of a Callout DLL via CalloutDlls and CalloutEnabled parameter in Registry, which can be used to execute code in context of the DHCP server (restart required)
          
          
        
      </description>
    </item>
    
    <item>
      <title>DHCP Server Error Failed Loading the CallOut DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_dhcp_server/win_system_susp_dhcp_config_failed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_dhcp_server/win_system_susp_dhcp_config_failed/</guid>
      <description>
        
          
            This rule detects a DHCP server error in which a specified Callout DLL (in registry) could not be loaded
          
          
        
      </description>
    </item>
    
    <item>
      <title>DHCP Server Loaded the CallOut DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_dhcp_server/win_system_susp_dhcp_config/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_dhcp_server/win_system_susp_dhcp_config/</guid>
      <description>
        
          
            This rule detects a DHCP server in which a specified Callout DLL (in registry) was loaded
          
          
        
      </description>
    </item>
    
    <item>
      <title>Diagnostic Library Sdiageng.DLL Loaded By Msdt.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_sdiageng_load_by_msdt/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_sdiageng_load_by_msdt/</guid>
      <description>
        
          
            Detects both of CVE-2022-30190 (Follina) and DogWalk vulnerabilities exploiting msdt.exe binary to load the &#34;sdiageng.dll&#34; library
          
          
        
      </description>
    </item>
    
    <item>
      <title>Diamond Sleet APT DLL Sideloading Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/diamond-sleet/image_load_apt_diamond_sleet_side_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/diamond-sleet/image_load_apt_diamond_sleet_side_load/</guid>
      <description>
        
          
            Detects DLL sideloading activity seen used by Diamond Sleet APT
          
          
        
      </description>
    </item>
    
    <item>
      <title>Directory Removal Via Rmdir</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_rmdir_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_rmdir_execution/</guid>
      <description>
        
          
            Detects execution of the builtin &#34;rmdir&#34; command in order to delete directories.
Adversaries may delete files left behind by the actions of their intrusion activity.
Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces to indicate to what was done within a network and how.
Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary&#39;s footprint.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Administrative Share Creation at Startup</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_administrative_share/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_administrative_share/</guid>
      <description>
        
          
            Administrative shares are hidden network shares created by Microsoft Windows NT operating systems that grant system administrators remote access to every disk volume on a network-connected system
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable of ETW Trace - Powershell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_etw_trace_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_etw_trace_evasion/</guid>
      <description>
        
          
            Detects usage of powershell cmdlets to disable or remove ETW trace sessions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable Powershell Command History</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_disable_psreadline_command_history/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_disable_psreadline_command_history/</guid>
      <description>
        
          
            Detects scripts or commands that disabled the Powershell command history by removing psreadline module
          
          
        
      </description>
    </item>
    
    <item>
      <title>Diskshadow Script Mode - Execution From Potential Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_diskshadow_script_mode_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_diskshadow_script_mode_susp_location/</guid>
      <description>
        
          
            Detects execution of &#34;Diskshadow.exe&#34; in script mode using the &#34;/s&#34; flag where the script is located in a potentially suspicious location.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Diskshadow Script Mode - Uncommon Script Extension Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_diskshadow_script_mode_susp_ext/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_diskshadow_script_mode_susp_ext/</guid>
      <description>
        
          
            Detects execution of &#34;Diskshadow.exe&#34; in script mode to execute an script with a potentially uncommon extension.
Initial baselining of the allowed extension list is required.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Displaying Hidden Files Feature Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hide_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hide_file/</guid>
      <description>
        
          
            Detects modifications to the &#34;Hidden&#34; and &#34;ShowSuperHidden&#34; explorer registry values in order to disable showing of hidden files and system files.
This technique is abused by several malware families to hide their files from normal users.

          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Execution via Rasautou.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_rasautou_dll_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_rasautou_dll_execution/</guid>
      <description>
        
          
            Detects using Rasautou.exe for loading arbitrary .DLL specified in -d option and executes the export specified in -p.
          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Execution Via Register-cimprovider.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_cimprovider_dll_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_cimprovider_dll_load/</guid>
      <description>
        
          
            Detects using register-cimprovider.exe to execute arbitrary dll file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Load By System Process From Suspicious Locations</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_dll_load_system_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_dll_load_system_process/</guid>
      <description>
        
          
            Detects when a system process (i.e. located in system32, syswow64, etc.) loads a DLL from a suspicious location or a location with permissive permissions such as &#34;C:\Users\Public&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Loaded From Suspicious Location Via Cmspt.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_cmstp_load_dll_from_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_cmstp_load_dll_from_susp_location/</guid>
      <description>
        
          
            Detects cmstp loading &#34;dll&#34; or &#34;ocx&#34; files from suspicious locations
          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Loaded via CertOC.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certoc_load_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certoc_load_dll/</guid>
      <description>
        
          
            Detects when a user installs certificates by using CertOC.exe to loads the target DLL file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Names Used By SVR For GraphicalProton Backdoor</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/cozy-bear/image_load_apt_cozy_bear_graphical_proton_dlls/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/cozy-bear/image_load_apt_cozy_bear_graphical_proton_dlls/</guid>
      <description>
        
          
            Hunts known SVR-specific DLL names.
          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Search Order Hijackig Via Additional Space in Path</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_dll_sideloading_space_path/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_dll_sideloading_space_path/</guid>
      <description>
        
          
            Detects when an attacker create a similar folder structure to windows system folders such as (Windows, Program Files...)
but with a space in order to trick DLL load search order and perform a &#34;DLL Search Order Hijacking&#34; attack

          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Sideloading by VMware Xfer Utility</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dll_sideload_vmware_xfer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dll_sideload_vmware_xfer/</guid>
      <description>
        
          
            Detects execution of VMware Xfer utility (VMwareXferlogs.exe) from the non-default directory which may be an attempt to sideload arbitrary DLL
          
          
        
      </description>
    </item>
    
    <item>
      <title>DLL Sideloading Of ShellChromeAPI.DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_shell_chrome_api/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_shell_chrome_api/</guid>
      <description>
        
          
            Detects processes loading the non-existent DLL &#34;ShellChromeAPI&#34;. One known example is the &#34;DeviceEnroller&#34; binary in combination with the &#34;PhoneDeepLink&#34; flag tries to load this DLL.
Adversaries can drop their own renamed DLL and execute it via DeviceEnroller.exe using this parameter

          
          
        
      </description>
    </item>
    
    <item>
      <title>Dllhost.EXE Execution Anomaly</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dllhost_no_cli_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dllhost_no_cli_execution/</guid>
      <description>
        
          
            Detects a &#34;dllhost&#34; process spawning with no commandline arguments which is very rare to happen and could indicate process injection activity or malware mimicking similar system processes.
          
          
        
      </description>
    </item>
    
    <item>
      <title>DllUnregisterServer Function Call Via Msiexec.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_dll/</guid>
      <description>
        
          
            Detects MsiExec loading a DLL and calling its DllUnregisterServer function
          
          
        
      </description>
    </item>
    
    <item>
      <title>DMSA Link Attributes Modified</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_modification_of_dmsa_link_attribute/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_modification_of_dmsa_link_attribute/</guid>
      <description>
        
          
            Detects modification of dMSA link attributes (msDS-ManagedAccountPrecededByLink) via PowerShell scripts.
This command line pattern could be an indicator an attempt to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025.

          
          
        
      </description>
    </item>
    
    <item>
      <title>DMSA Service Account Created in Specific OUs - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_create_new_dmsasvc_account/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_create_new_dmsasvc_account/</guid>
      <description>
        
          
            Detects the creation of a dMSA service account using the New-ADServiceAccount cmdlet in certain OUs.
The fact that the cmdlet is used to create a dMSASvc account in a specific OU is highly suspicious.
It is a pattern trying to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025.
On top of that, if the user that is creating the dMSASvc account is not a legitimate administrator or does not have the necessary permissions,
it is a strong signal of an attempted or successful abuse of the BaDSuccessor vulnerability for privilege escalation within the Windows Server 2025 Active Directory environment.

          
          
        
      </description>
    </item>
    
    <item>
      <title>DNS Query Request By Regsvr32.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/dns_query/dns_query_win_regsvr32_dns_query/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/dns_query/dns_query_win_regsvr32_dns_query/</guid>
      <description>
        
          
            Detects DNS queries initiated by &#34;Regsvr32.exe&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>DNS Server Error Failed Loading the ServerLevelPluginDLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/dns_server/win_dns_server_susp_server_level_plugin_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/dns_server/win_dns_server_susp_server_level_plugin_dll/</guid>
      <description>
        
          
            Detects a DNS server error in which a specified plugin DLL (in registry) could not be loaded
          
          
        
      </description>
    </item>
    
    <item>
      <title>DNS-over-HTTPS Enabled by Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dns_over_https_enabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dns_over_https_enabled/</guid>
      <description>
        
          
            Detects when a user enables DNS-over-HTTPS.
This can be used to hide internet activity or be used to hide the process of exfiltrating data.
With this enabled organization will lose visibility into data such as query type, response and originating IP that are used to determine bad actors.

          
          
        
      </description>
    </item>
    
    <item>
      <title>DotNet CLR DLL Loaded By Scripting Applications</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_script_dotnet_clr_dll_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_script_dotnet_clr_dll_load/</guid>
      <description>
        
          
            Detects .NET CLR DLLs being loaded by scripting applications such as wscript or cscript. This could be an indication of potential suspicious execution.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Driver Added To Disallowed Images In HVCI - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hvci_disallowed_images/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_hvci_disallowed_images/</guid>
      <description>
        
          
            Detects changes to the &#34;HVCIDisallowedImages&#34; registry value to potentially add a driver to the list, in order to prevent it from loading.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Driver/DLL Installation Via Odbcconf.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_driver_install/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_driver_install/</guid>
      <description>
        
          
            Detects execution of &#34;odbcconf&#34; with &#34;INSTALLDRIVER&#34; which installs a new ODBC driver. Attackers abuse this to install and run malicious DLLs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Drop Binaries Into Spool Drivers Color Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_spool_drivers_color_drop/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_spool_drivers_color_drop/</guid>
      <description>
        
          
            Detects the creation of suspcious binary files inside the &#34;\windows\system32\spool\drivers\color\&#34; as seen in the blog referenced below
          
          
        
      </description>
    </item>
    
    <item>
      <title>DumpMinitool Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dumpminitool_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dumpminitool_execution/</guid>
      <description>
        
          
            Detects the use of &#34;DumpMinitool.exe&#34; a tool that allows the dump of process memory via the use of the &#34;MiniDumpWriteDump&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Dynamic .NET Compilation Via Csc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_csc_susp_dynamic_compilation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_csc_susp_dynamic_compilation/</guid>
      <description>
        
          
            Detects execution of &#34;csc.exe&#34; to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Dynamic CSharp Compile Artefact</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_csharp_compile_artefact/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_csharp_compile_artefact/</guid>
      <description>
        
          
            When C# is compiled dynamically, a .cmdline file will be created as a part of the process.
Certain processes are not typically observed compiling C# code, but can do so without touching disk.
This can be used to unpack a payload for execution

          
          
        
      </description>
    </item>
    
    <item>
      <title>Enable BPF Kprobes Tracing</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_bpf_kprob_tracing_enabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_bpf_kprob_tracing_enabled/</guid>
      <description>
        
          
            Detects common command used to enable bpf kprobes tracing
          
          
        
      </description>
    </item>
    
    <item>
      <title>Enable Local Manifest Installation With Winget</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_winget_enable_local_manifest/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_winget_enable_local_manifest/</guid>
      <description>
        
          
            Detects changes to the AppInstaller (winget) policy. Specifically the activation of the local manifest installation, which allows a user to install new packages via custom manifests.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Enabling COR Profiler Environment Variables</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_enabling_cor_profiler_env_variables/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_enabling_cor_profiler_env_variables/</guid>
      <description>
        
          
            Detects .NET Framework CLR and .NET Core CLR &#34;cor_enable_profiling&#34; and &#34;cor_profiler&#34; variables being set and configured.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Equation Group DLL_U Export Function Load</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/equationgroup/proc_creation_win_apt_equationgroup_dll_u_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/equationgroup/proc_creation_win_apt_equationgroup_dll_u_load/</guid>
      <description>
        
          
            Detects a specific export function name used by one of EquationGroup tools
          
          
        
      </description>
    </item>
    
    <item>
      <title>ETW Trace Evasion Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_trace_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_etw_trace_evasion/</guid>
      <description>
        
          
            Detects command line activity that tries to clear or disable any ETW trace log which could be a sign of logging evasion.

          
          
        
      </description>
    </item>
    
    <item>
      <title>EventLog EVTX File Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_event_log_files/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_event_log_files/</guid>
      <description>
        
          
            Detects the deletion of the event log files which may indicate an attempt to destroy forensic evidence
          
          
        
      </description>
    </item>
    
    <item>
      <title>EvilNum APT Golden Chickens Deployment Via OCX Files</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/evilnum/proc_creation_win_apt_evilnum_jul20/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/evilnum/proc_creation_win_apt_evilnum_jul20/</guid>
      <description>
        
          
            Detects Golden Chickens deployment method as used by Evilnum and described in ESET July 2020 report
          
          
        
      </description>
    </item>
    
    <item>
      <title>Exchange PowerShell Cmdlet History Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_exchange_powershell_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_exchange_powershell_logs/</guid>
      <description>
        
          
            Detects the deletion of the Exchange PowerShell cmdlet History logs which may indicate an attempt to destroy forensic evidence
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execute Code with Pester.bat</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pester_1/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pester_1/</guid>
      <description>
        
          
            Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execute Code with Pester.bat as Parent</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pester/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pester/</guid>
      <description>
        
          
            Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execute Files with Msdeploy.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_msdeploy/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_msdeploy/</guid>
      <description>
        
          
            Detects file execution using the msdeploy.exe lolbin
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execute From Alternate Data Streams</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_alternate_data_streams/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_alternate_data_streams/</guid>
      <description>
        
          
            Detects execution from an Alternate Data Stream (ADS). Adversaries may use NTFS file attributes to hide their malicious data in order to evade detection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execute Pcwrun.EXE To Leverage Follina</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pcwrun_follina/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pcwrun_follina/</guid>
      <description>
        
          
            Detects indirect command execution via Program Compatibility Assistant &#34;pcwrun.exe&#34; leveraging the follina (CVE-2022-30190) vulnerability
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execution DLL of Choice Using WAB.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_wab_dllpath_reg_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_wab_dllpath_reg_change/</guid>
      <description>
        
          
            This rule detects that the path to the DLL written in the registry is different from the default one. Launched WAB.exe tries to load the DLL from Registry.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execution Of Non-Existing File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_image_missing/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_image_missing/</guid>
      <description>
        
          
            Checks whether the image specified in a process creation event is not a full, absolute path (caused by process ghosting or other unorthodox methods to start a process)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execution of Suspicious File Type Extension</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_non_exe_image/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_non_exe_image/</guid>
      <description>
        
          
            Detects whether the image specified in a process creation event doesn&#39;t refer to an &#34;.exe&#34; (or other known executable extension) file. This can be caused by process ghosting or other unorthodox methods to start a process.
This rule might require some initial baselining to align with some third party tooling in the user environment.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Execution via stordiag.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_stordiag_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_stordiag_susp_child_process/</guid>
      <description>
        
          
            Detects the use of stordiag.exe to execute schtasks.exe systeminfo.exe and fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Execution via WorkFolders.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_workfolders/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_workfolders/</guid>
      <description>
        
          
            Detects using WorkFolders.exe to execute an arbitrary control.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Exploit for CVE-2015-1641</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2015/exploits/cve-2015-1641/proc_creation_win_exploit_cve_2015_1641/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2015/exploits/cve-2015-1641/proc_creation_win_exploit_cve_2015_1641/</guid>
      <description>
        
          
            Detects Winword starting uncommon sub process MicroScMgmt.exe as used in exploits for CVE-2015-1641
          
          
        
      </description>
    </item>
    
    <item>
      <title>Exploiting SetupComplete.cmd CVE-2019-1378</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/exploits/cve-2019-1378/proc_creation_win_exploit_cve_2019_1378/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/exploits/cve-2019-1378/proc_creation_win_exploit_cve_2019_1378/</guid>
      <description>
        
          
            Detects exploitation attempt of privilege escalation vulnerability via SetupComplete.cmd and PartnerSetupComplete.cmd described in CVE-2019-1378
          
          
        
      </description>
    </item>
    
    <item>
      <title>Explorer Process Tree Break</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_explorer_break_process_tree/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_explorer_break_process_tree/</guid>
      <description>
        
          
            Detects a command line process that uses explorer.exe to launch arbitrary commands or binaries,
which is similar to cmd.exe /c, only it breaks the process tree and makes its parent a new instance of explorer spawning from &#34;svchost&#34;

          
          
        
      </description>
    </item>
    
    <item>
      <title>Exports Registry Key To an Alternate Data Stream</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_regedit_export_to_ads/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_regedit_export_to_ads/</guid>
      <description>
        
          
            Exports the target Registry key and hides it in the specified alternate data stream.
          
          
        
      </description>
    </item>
    
    <item>
      <title>External Remote RDP Logon from Public IP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_successful_external_remote_rdp_login/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_successful_external_remote_rdp_login/</guid>
      <description>
        
          
            Detects successful logon from public IP address via RDP. This can indicate a publicly-exposed RDP port.
          
          
        
      </description>
    </item>
    
    <item>
      <title>External Remote SMB Logon from Public IP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_successful_external_remote_smb_login/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_successful_external_remote_smb_login/</guid>
      <description>
        
          
            Detects successful logon from public IP address via SMB. This can indicate a publicly-exposed SMB port.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Failed Authentications From Countries You Do Not Operate Out Of</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_failed_auth_from_countries_you_do_not_operate_out_of/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_failed_auth_from_countries_you_do_not_operate_out_of/</guid>
      <description>
        
          
            Detect failed authentications from countries you do not operate out of.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Failed Code Integrity Checks</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_codeintegrity_check_failure/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_codeintegrity_check_failure/</guid>
      <description>
        
          
            Detects code integrity failures such as missing page hashes or corrupted drivers due unauthorized modification. This could be a sign of tampered binaries.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Failed Logon From Public IP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_susp_failed_logon_source/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_susp_failed_logon_source/</guid>
      <description>
        
          
            Detects a failed logon attempt from a public IP. A login from a public IP can indicate a misconfigured firewall or network boundary.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Fax Service DLL Search Order Hijack</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_ualapi/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_ualapi/</guid>
      <description>
        
          
            The Fax service attempts to load ualapi.dll, which is non-existent. An attacker can then (side)load their own malicious DLL using this service.
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Decoded From Base64/Hex Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_decode/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_decode/</guid>
      <description>
        
          
            Detects the execution of certutil with either the &#34;decode&#34; or &#34;decodehex&#34; flags to decode base64 or hex encoded files. This can be abused by attackers to decode an encoded payload before execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Deleted Via Sysinternals SDelete</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_sysinternals_sdelete_file_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_sysinternals_sdelete_file_deletion/</guid>
      <description>
        
          
            Detects the deletion of files by the Sysinternals SDelete utility. It looks for the common name pattern used to rename files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Deletion</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_file_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_file_deletion/</guid>
      <description>
        
          
            Detects file deletion using &#34;rm&#34;, &#34;shred&#34; or &#34;unlink&#34; commands which are used often by adversaries to delete files left behind by the actions of their intrusion activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Deletion Via Del</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_del_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_del_execution/</guid>
      <description>
        
          
            Detects execution of the builtin &#34;del&#34;/&#34;erase&#34; commands in order to delete files.
Adversaries may delete files left behind by the actions of their intrusion activity.
Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces to indicate to what was done within a network and how.
Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary&#39;s footprint.

          
          
        
      </description>
    </item>
    
    <item>
      <title>File Download Using ProtocolHandler.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_protocolhandler_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_protocolhandler_download/</guid>
      <description>
        
          
            Detects usage of &#34;ProtocolHandler&#34; to download files. Downloaded files will be located in the cache folder (for example - %LOCALAPPDATA%\Microsoft\Windows\INetCache\IE)

          
          
        
      </description>
    </item>
    
    <item>
      <title>File Download Via Bitsadmin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download/</guid>
      <description>
        
          
            Detects usage of bitsadmin downloading a file
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Download Via Bitsadmin To A Suspicious Target Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download_susp_targetfolder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download_susp_targetfolder/</guid>
      <description>
        
          
            Detects usage of bitsadmin downloading a file to a suspicious target folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Download Via InstallUtil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_installutil_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_installutil_download/</guid>
      <description>
        
          
            Detects use of .NET InstallUtil.exe in order to download arbitrary files. The files will be written to &#34;%LOCALAPPDATA%\Microsoft\Windows\INetCache\IE\&#34;

          
          
        
      </description>
    </item>
    
    <item>
      <title>File Download Via Windows Defender MpCmpRun.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mpcmdrun_download_arbitrary_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mpcmdrun_download_arbitrary_file/</guid>
      <description>
        
          
            Detects the use of Windows Defender MpCmdRun.EXE to download files
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Download with Headless Browser</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_browsers_chromium_headless_file_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_browsers_chromium_headless_file_download/</guid>
      <description>
        
          
            Detects execution of chromium based browser in headless mode using the &#34;dump-dom&#34; command line to download files
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Encoded To Base64 Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_encode/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_encode/</guid>
      <description>
        
          
            Detects the execution of certutil with the &#34;encode&#34; flag to encode a file to base64. This can be abused by threat actors and attackers for data exfiltration
          
          
        
      </description>
    </item>
    
    <item>
      <title>File In Suspicious Location Encoded To Base64 Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_encode_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_encode_susp_location/</guid>
      <description>
        
          
            Detects the execution of certutil with the &#34;encode&#34; flag to encode a file to base64 where the files are located in potentially suspicious locations
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Time Attribute Change</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_change_file_time_attr/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_change_file_time_attr/</guid>
      <description>
        
          
            Detect file time attribute change to hide new or changes to existing files
          
          
        
      </description>
    </item>
    
    <item>
      <title>File Time Attribute Change - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_change_file_time_attr/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_change_file_time_attr/</guid>
      <description>
        
          
            Detect file time attribute change to hide new or changes to existing files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>File With Suspicious Extension Downloaded Via Bitsadmin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download_susp_extensions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download_susp_extensions/</guid>
      <description>
        
          
            Detects usage of bitsadmin downloading a file with a suspicious extension
          
          
        
      </description>
    </item>
    
    <item>
      <title>Files With System DLL Name In Unsuspected Locations</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_creation_system_dll_files/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_creation_system_dll_files/</guid>
      <description>
        
          
            Detects the creation of a file with the &#34;.dll&#34; extension that has the name of a System DLL in uncommon or unsuspected locations. (Outisde of &#34;System32&#34;, &#34;SysWOW64&#34;, etc.).
It is highly recommended to perform an initial baseline before using this rule in production.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Files With System Process Name In Unsuspected Locations</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_creation_system_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_creation_system_file/</guid>
      <description>
        
          
            Detects the creation of an executable with a system process name in folders other than the system ones (System32, SysWOW64, etc.).
It is highly recommended to perform an initial baseline before using this rule in production.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Filter Driver Unloaded Via Fltmc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver/</guid>
      <description>
        
          
            Detect filter driver unloading activity via fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Findstr Launching .lnk File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_findstr_lnk/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_findstr_lnk/</guid>
      <description>
        
          
            Detects usage of findstr to identify and execute a lnk file as seen within the HHS redirect attack
          
          
        
      </description>
    </item>
    
    <item>
      <title>Fireball Archer Install</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/fireball/proc_creation_win_malware_fireball/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/fireball/proc_creation_win_malware_fireball/</guid>
      <description>
        
          
            Detects Archer malware invocation via rundll32
          
          
        
      </description>
    </item>
    
    <item>
      <title>Flash Player Update from Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/web/proxy_generic/proxy_susp_flash_download_loc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/web/proxy_generic/proxy_susp_flash_download_loc/</guid>
      <description>
        
          
            Detects a flashplayer update from an unofficial location
          
          
        
      </description>
    </item>
    
    <item>
      <title>Forest Blizzard APT - Process Creation Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/proc_creation_win_apt_forest_blizzard_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/proc_creation_win_apt_forest_blizzard_activity/</guid>
      <description>
        
          
            Detects the execution of specific processes and command line combination.
These were seen being created by Forest Blizzard as described by MSFT.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Forfiles.EXE Child Process Masquerading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_forfiles_child_process_masquerading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_forfiles_child_process_masquerading/</guid>
      <description>
        
          
            Detects the execution of &#34;forfiles&#34; from a non-default location, in order to potentially spawn a custom &#34;cmd.exe&#34; from the current working directory.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Fsutil Suspicious Invocation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fsutil_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fsutil_usage/</guid>
      <description>
        
          
            Detects suspicious parameters of fsutil (deleting USN journal, configuring it with small size, etc).
Might be used by ransomwares during the attack (seen by NotPetya and others).

          
          
        
      </description>
    </item>
    
    <item>
      <title>Github New Secret Created</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_new_secret_created/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_new_secret_created/</guid>
      <description>
        
          
            Detects when a user creates action secret for the organization, environment, codespaces or repository.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Github Self Hosted Runner Changes Detected</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_self_hosted_runner_changes_detected/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_self_hosted_runner_changes_detected/</guid>
      <description>
        
          
            A self-hosted runner is a system that you deploy and manage to execute jobs from GitHub Actions on GitHub.com.
This rule detects changes to self-hosted runners configurations in the environment. The self-hosted runner configuration changes once detected,
it should be validated from GitHub UI because the log entry may not provide full context.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Github SSH Certificate Configuration Changed</title>
      <link>https://detection.fyi/sigmahq/sigma/application/github/audit/github_ssh_certificate_config_changed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/github/audit/github_ssh_certificate_config_changed/</guid>
      <description>
        
          
            Detects when changes are made to the SSH certificate configuration of the organization.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Goofy Guineapig Backdoor IOC</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/goofy-guineapig/file_event_win_malware_goofy_guineapig_file_indicators/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/goofy-guineapig/file_event_win_malware_goofy_guineapig_file_indicators/</guid>
      <description>
        
          
            Detects malicious indicators seen used by the Goofy Guineapig malware
          
          
        
      </description>
    </item>
    
    <item>
      <title>Google Cloud Kubernetes Admission Controller</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/gcp/audit/gcp_kubernetes_admission_controller/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/gcp/audit/gcp_kubernetes_admission_controller/</guid>
      <description>
        
          
            Identifies when an admission controller is executed in GCP Kubernetes.
A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server.
The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster.
An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster.
For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod. An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials.
An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Google Workspace Government Attack Warning</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/gcp/gworkspace/login/gcp_gworkspace_govattack/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/gcp/gworkspace/login/gcp_gworkspace_govattack/</guid>
      <description>
        
          
            Detects a login attempt in Google Workspace flagged as a potential attack by a government-backed threat actor
          
          
        
      </description>
    </item>
    
    <item>
      <title>Gpscript Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_gpscript/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_gpscript/</guid>
      <description>
        
          
            Detects the execution of the LOLBIN gpscript, which executes logon or startup scripts configured in Group Policy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Greedy File Deletion Using Del</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_del_greedy_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_del_greedy_deletion/</guid>
      <description>
        
          
            Detects execution of the &#34;del&#34; builtin command to remove files using greedy/wildcard expression. This is often used by malware to delete content of folders that perhaps contains the initial malware infection or to delete evidence.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Greenbug Espionage Group Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/greenbug/proc_creation_win_apt_greenbug_may20/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/greenbug/proc_creation_win_apt_greenbug_may20/</guid>
      <description>
        
          
            Detects tools and process executions used by Greenbug in their May 2020 campaign as reported by Symantec
          
          
        
      </description>
    </item>
    
    <item>
      <title>Guest Account Enabled Via Sysadminctl</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_sysadminctl_enable_guest_account/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_sysadminctl_enable_guest_account/</guid>
      <description>
        
          
            Detects attempts to enable the guest account using the sysadminctl utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>Guest User Invited By Non Approved Inviters</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_guest_invite_failure/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_guest_invite_failure/</guid>
      <description>
        
          
            Detects when a user that doesn&#39;t have permissions to invite a guest user attempts to invite one.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Guest Users Invited To Tenant By Non Approved Inviters</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_guest_users_invited_to_tenant_by_non_approved_inviters/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_guest_users_invited_to_tenant_by_non_approved_inviters/</guid>
      <description>
        
          
            Detects guest users being invited to tenant by non-approved inviters
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - CACTUSTORCH Remote Thread Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_hktl_cactustorch/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_hktl_cactustorch/</guid>
      <description>
        
          
            Detects remote thread creation from CACTUSTORCH as described in references.
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - CoercedPotato Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_coercedpotato/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_coercedpotato/</guid>
      <description>
        
          
            Detects the use of CoercedPotato, a tool for privilege escalation
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - CoercedPotato Named Pipe Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_coercedpotato/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_coercedpotato/</guid>
      <description>
        
          
            Detects the pattern of a pipe name as used by the hack tool CoercedPotato
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - Covenant PowerShell Launcher</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_covenant/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_covenant/</guid>
      <description>
        
          
            Detects suspicious command lines used in Covenant luanchers
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - CrackMapExec PowerShell Obfuscation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_crackmapexec_powershell_obfuscation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_crackmapexec_powershell_obfuscation/</guid>
      <description>
        
          
            The CrachMapExec pentesting framework implements a PowerShell obfuscation with some static strings detected by this rule.
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - DInjector PowerShell Cradle Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_dinjector/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_dinjector/</guid>
      <description>
        
          
            Detects the use of the Dinject PowerShell cradle based on the specific flags
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - EfsPotato Named Pipe Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_efspotato/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_efspotato/</guid>
      <description>
        
          
            Detects the pattern of a pipe name as used by the hack tool EfsPotato
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - F-Secure C3 Load by Rundll32</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_c3_rundll32_pattern/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_c3_rundll32_pattern/</guid>
      <description>
        
          
            F-Secure C3 produces DLLs with a default exported StartNodeRelay function.
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - GMER Rootkit Detector and Remover Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_gmer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_gmer/</guid>
      <description>
        
          
            Detects the execution GMER tool based on image and hash fields.
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - HollowReaper Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_hollowreaper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_hollowreaper/</guid>
      <description>
        
          
            Detects usage of HollowReaper, a process hollowing shellcode launcher used for stealth payload execution through process hollowing.
It replaces the memory of a legitimate process with custom shellcode, allowing the attacker to execute payloads under the guise of trusted binaries.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - Impersonate Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_impersonate/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_impersonate/</guid>
      <description>
        
          
            Detects execution of the Impersonate tool. Which can be used to manipulate tokens on a Windows computers remotely (PsExec/WmiExec) or interactively
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - Koh Default Named Pipe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_koh_default_pipe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_hktl_koh_default_pipe/</guid>
      <description>
        
          
            Detects creation of default named pipes used by the Koh tool
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - LittleCorporal Generated Maldoc Injection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_littlecorporal_generated_maldoc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_hktl_littlecorporal_generated_maldoc/</guid>
      <description>
        
          
            Detects the process injection of a LittleCorporal generated Maldoc.
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - LocalPotato Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_localpotato/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_localpotato/</guid>
      <description>
        
          
            Detects the execution of the LocalPotato POC based on basic PE metadata information and default CLI examples
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - NoFilter Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_hktl_nofilter/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_hktl_nofilter/</guid>
      <description>
        
          
            Detects execution of NoFilter, a tool for abusing the Windows Filtering Platform for privilege escalation via hardcoded policy name indicators

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - Potential CobaltStrike Process Injection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_hktl_cobaltstrike/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_hktl_cobaltstrike/</guid>
      <description>
        
          
            Detects a potential remote threat creation with certain characteristics which are typical for Cobalt Strike beacons
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - Powerup Write Hijack DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_hktl_powerup_dllhijacking/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_hktl_powerup_dllhijacking/</guid>
      <description>
        
          
            Powerup tool&#39;s Write Hijack DLL exploits DLL hijacking for privilege escalation.
In it&#39;s default mode, it builds a self deleting .bat file which executes malicious command.
The detection rule relies on creation of the malicious bat file (debug.bat by default).

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - PPID Spoofing SelectMyParent Tool Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_selectmyparent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_selectmyparent/</guid>
      <description>
        
          
            Detects the use of parent process ID spoofing tools like Didier Stevens tool SelectMyParent
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - RedMimicry Winnti Playbook Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_redmimicry_winnti_playbook/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_redmimicry_winnti_playbook/</guid>
      <description>
        
          
            Detects actions caused by the RedMimicry Winnti playbook a automated breach emulations utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SharpDPAPI Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharp_dpapi_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharp_dpapi_execution/</guid>
      <description>
        
          
            Detects the execution of the SharpDPAPI tool based on CommandLine flags and PE metadata.
SharpDPAPI is a C# port of some DPAPI functionality from the Mimikatz project.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SharpImpersonation Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharp_impersonation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharp_impersonation/</guid>
      <description>
        
          
            Detects execution of the SharpImpersonation tool. Which can be used to manipulate tokens on a Windows computers remotely (PsExec/WmiExec) or interactively
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - SharpUp PrivEsc Tool Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharpup/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sharpup/</guid>
      <description>
        
          
            Detects the use of SharpUp, a tool for local privilege escalation
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - Wmiexec Default Powershell Command</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_wmiexec_default_powershell/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_wmiexec_default_powershell/</guid>
      <description>
        
          
            Detects the execution of PowerShell with a specific flag sequence that is used by the Wmiexec script
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool - XORDump Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_xordump/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_xordump/</guid>
      <description>
        
          
            Detects suspicious use of XORDump process memory dumping utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>HackTool Named File Stream Created</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_hktl_generic_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_hktl_generic_download/</guid>
      <description>
        
          
            Detects the creation of a named file stream with the imphash of a well-known hack tool
          
          
        
      </description>
    </item>
    
    <item>
      <title>HH.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hh_chm_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hh_chm_execution/</guid>
      <description>
        
          
            Detects the execution of &#34;hh.exe&#34; to open &#34;.chm&#34; files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hidden Executable In NTFS Alternate Data Stream</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_ads_executable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_ads_executable/</guid>
      <description>
        
          
            Detects the creation of an ADS (Alternate Data Stream) that contains an executable by looking at a non-empty Imphash
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hidden Files and Directories</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_hidden_files_directories/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_hidden_files_directories/</guid>
      <description>
        
          
            Detects adversary creating hidden file or directory, by detecting directories or files with . as the first character
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hidden Flag Set On File/Directory Via Chflags - MacOS</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_chflags_hidden_flag/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_chflags_hidden_flag/</guid>
      <description>
        
          
            Detects the execution of the &#34;chflags&#34; utility with the &#34;hidden&#34; flag, in order to hide files on MacOS.
When a file or directory has this hidden flag set, it becomes invisible to the default file listing commands and in graphical file browsers.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Hidden User Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_create_hidden_account/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_create_hidden_account/</guid>
      <description>
        
          
            Detects creation of a hidden user account on macOS (UserID &lt; 500) or with IsHidden option
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hiding Files with Attrib.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_attrib_hiding_files/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_attrib_hiding_files/</guid>
      <description>
        
          
            Detects usage of attrib.exe to hide files from users.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hiding User Account Via SpecialAccounts Registry Key</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_special_accounts/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_special_accounts/</guid>
      <description>
        
          
            Detects modifications to the registry key &#34;HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist&#34; where the value is set to &#34;0&#34; in order to hide user account from being listed on the logon screen.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Hiding User Account Via SpecialAccounts Registry Key - CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_special_accounts_hide_user/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_special_accounts_hide_user/</guid>
      <description>
        
          
            Detects changes to the registry key &#34;HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist&#34; where the value is set to &#34;0&#34; in order to hide user account from being listed on the logon screen.

          
          
        
      </description>
    </item>
    
    <item>
      <title>HTML Help HH.EXE Suspicious Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hh_html_help_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hh_html_help_susp_child_process/</guid>
      <description>
        
          
            Detects a suspicious child process of a Microsoft HTML Help (HH.exe)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Huawei BGP Authentication Failures</title>
      <link>https://detection.fyi/sigmahq/sigma/network/huawei/bgp/huawei_bgp_auth_failed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/huawei/bgp/huawei_bgp_auth_failed/</guid>
      <description>
        
          
            Detects BGP failures which may be indicative of brute force attacks to manipulate routing.
          
          
        
      </description>
    </item>
    
    <item>
      <title>IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/icedid/proc_creation_win_malware_icedid_rundll32_dllregisterserver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/icedid/proc_creation_win_malware_icedid_rundll32_dllregisterserver/</guid>
      <description>
        
          
            Detects RunDLL32.exe executing a single digit DLL named &#34;1.dll&#34; with the export function &#34;DllRegisterServer&#34;. This behaviour was often seen used by malware and especially IcedID
          
          
        
      </description>
    </item>
    
    <item>
      <title>IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ie_security_zone_protocol_defaults_downgrade/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_ie_security_zone_protocol_defaults_downgrade/</guid>
      <description>
        
          
            Detects changes to Internet Explorer&#39;s (IE / Windows Internet properties) ZoneMap configuration of the &#34;HTTP&#34; and &#34;HTTPS&#34; protocols to point to the &#34;My Computer&#34; zone. This allows downloaded files from the Internet to be granted the same level of trust as files stored locally.

          
          
        
      </description>
    </item>
    
    <item>
      <title>IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols Via CLI</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_ie_security_zone_protocol_defaults_downgrade/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_ie_security_zone_protocol_defaults_downgrade/</guid>
      <description>
        
          
            Detects changes to Internet Explorer&#39;s (IE / Windows Internet properties) ZoneMap configuration of the &#34;HTTP&#34; and &#34;HTTPS&#34; protocols to point to the &#34;My Computer&#34; zone. This allows downloaded files from the Internet to be granted the same level of trust as files stored locally.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Ie4uinit Lolbin Use From Invalid Path</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_ie4uinit/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_ie4uinit/</guid>
      <description>
        
          
            Detect use of ie4uinit.exe to execute commands from a specially prepared ie4uinit.inf file from a directory other than the usual directories
          
          
        
      </description>
    </item>
    
    <item>
      <title>IIS WebServer Access Logs Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_iis_access_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_iis_access_logs/</guid>
      <description>
        
          
            Detects the deletion of IIS WebServer access logs which may indicate an attempt to destroy forensic evidence
          
          
        
      </description>
    </item>
    
    <item>
      <title>IIS WebServer Log Deletion via CommandLine Utilities</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iis_logs_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iis_logs_deletion/</guid>
      <description>
        
          
            Detects attempts to delete Internet Information Services (IIS) log files via command line utilities, which is a common defense evasion technique used by attackers to cover their tracks.
Threat actors often abuse vulnerabilities in web applications hosted on IIS servers to gain initial access and later delete IIS logs to evade detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>ImagingDevices Unusual Parent/Child Processes</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_imagingdevices_unusual_parents/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_imagingdevices_unusual_parents/</guid>
      <description>
        
          
            Detects unusual parent or children of the ImagingDevices.exe (Windows Contacts) process as seen being used with Bumblebee activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>Import LDAP Data Interchange Format File Via Ldifde.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ldifde_file_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ldifde_file_load/</guid>
      <description>
        
          
            Detects the execution of &#34;Ldifde.exe&#34; with the import flag &#34;-i&#34;. The can be abused to include HTTP-based arguments which will allow the arbitrary download of files from a remote server.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Important Windows Service Terminated Unexpectedly</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_service_terminated_unexpectedly/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_service_terminated_unexpectedly/</guid>
      <description>
        
          
            Detects important or interesting Windows services that got terminated unexpectedly.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Important Windows Service Terminated With Error</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_service_terminated_error_important/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_service_terminated_error_important/</guid>
      <description>
        
          
            Detects important or interesting Windows services that got terminated for whatever reason
          
          
        
      </description>
    </item>
    
    <item>
      <title>Impossible Travel</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_impossible_travel/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_impossible_travel/</guid>
      <description>
        
          
            Identifies user activities originating from geographically distant locations within a time period shorter than the time it takes to travel from the first location to the second.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Increased Failed Authentications Of Any Type</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_auth_failure_increase/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_auth_failure_increase/</guid>
      <description>
        
          
            Detects when sign-ins increased by 10% or greater.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Indirect Command Execution By Program Compatibility Wizard</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pcwrun/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pcwrun/</guid>
      <description>
        
          
            Detect indirect command execution via Program Compatibility Assistant pcwrun.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Indirect Command Execution From Script File Via Bash.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bash_file_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bash_file_execution/</guid>
      <description>
        
          
            Detects execution of Microsoft bash launcher without any flags to execute the content of a bash script directly.
This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Indirect Command Execution via SFTP ProxyCommand</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sftp_proxy_command_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sftp_proxy_command_execution/</guid>
      <description>
        
          
            Detects the use of SFTP.exe to execute commands indirectly via ProxyCommand parameter.
Threat actors were seen leveraging this legitimate Windows binary to bypass security controls and execute arbitrary commands while evading detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Indirect Inline Command Execution Via Bash.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bash_command_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bash_command_execution/</guid>
      <description>
        
          
            Detects execution of Microsoft bash launcher with the &#34;-c&#34; flag.
This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash.

          
          
        
      </description>
    </item>
    
    <item>
      <title>InfDefaultInstall.exe .inf Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_infdefaultinstall_execute_sct_scripts/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_infdefaultinstall_execute_sct_scripts/</guid>
      <description>
        
          
            Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Injected Browser Process Spawning Rundll32 - GuLoader Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/guloader/proc_creation_win_malware_guloader_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/guloader/proc_creation_win_malware_guloader_execution/</guid>
      <description>
        
          
            Detects the execution of installed GuLoader malware on the host.
GuLoader is initiating network connections via the rundll32.exe process that is spawned via a browser parent(injected) process.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Insensitive Subfolder Search Via Findstr.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_findstr_subfolder_search/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_findstr_subfolder_search/</guid>
      <description>
        
          
            Detects execution of findstr with the &#34;s&#34; and &#34;i&#34; flags for a &#34;subfolder&#34; and &#34;insensitive&#34; search respectively. Attackers sometimes leverage this built-in utility to search the system for interesting files or filter through results of commands.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Interactive Bash Suspicious Children</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_susp_interactive_bash/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_susp_interactive_bash/</guid>
      <description>
        
          
            Detects suspicious interactive bash as a parent to rather uncommon child processes
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invalid PIM License</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_invalid_license/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_invalid_license/</guid>
      <description>
        
          
            Identifies when an organization doesn&#39;t have the proper license for PIM and is out of compliance.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation CLIP&#43; Launcher</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_clip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_clip/</guid>
      <description>
        
          
            Detects Obfuscated use of Clip.exe to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation CLIP&#43; Launcher - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_clip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_clip/</guid>
      <description>
        
          
            Detects Obfuscated use of Clip.exe to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation CLIP&#43; Launcher - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_clip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_clip/</guid>
      <description>
        
          
            Detects Obfuscated use of Clip.exe to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation CLIP&#43; Launcher - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_clip_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_clip_services_security/</guid>
      <description>
        
          
            Detects Obfuscated use of Clip.exe to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation CLIP&#43; Launcher - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_clip_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_clip_services/</guid>
      <description>
        
          
            Detects Obfuscated use of Clip.exe to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation COMPRESS OBFUSCATION</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_compress/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_compress/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via COMPRESS OBFUSCATION
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation COMPRESS OBFUSCATION - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_compress/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_compress/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via COMPRESS OBFUSCATION
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation COMPRESS OBFUSCATION - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_compress/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_compress/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via COMPRESS OBFUSCATION
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation COMPRESS OBFUSCATION - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_compress_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_compress_services_security/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via COMPRESS OBFUSCATION
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation COMPRESS OBFUSCATION - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_compress_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_compress_services/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via COMPRESS OBFUSCATION
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Obfuscated IEX Invocation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_obfuscated_iex_commandline/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_obfuscated_iex_commandline/</guid>
      <description>
        
          
            Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_obfuscated_iex/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_obfuscated_iex/</guid>
      <description>
        
          
            Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_obfuscated_iex/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_obfuscated_iex/</guid>
      <description>
        
          
            Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the code block cited in the reference section below
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Obfuscated IEX Invocation - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_obfuscated_iex_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_obfuscated_iex_services_security/</guid>
      <description>
        
          
            Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the code block linked in the references
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Obfuscated IEX Invocation - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_obfuscated_iex_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_obfuscated_iex_services/</guid>
      <description>
        
          
            Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the code block linked in the references
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation RUNDLL LAUNCHER - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_rundll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_rundll/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via RUNDLL LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation RUNDLL LAUNCHER - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_rundll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_rundll/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via RUNDLL LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation RUNDLL LAUNCHER - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_rundll_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_rundll_services_security/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via RUNDLL LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation RUNDLL LAUNCHER - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_rundll_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_rundll_services/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via RUNDLL LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation STDIN&#43; Launcher</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_stdin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_stdin/</guid>
      <description>
        
          
            Detects Obfuscated use of stdin to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation STDIN&#43; Launcher - Powershell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_stdin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_stdin/</guid>
      <description>
        
          
            Detects Obfuscated use of stdin to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation STDIN&#43; Launcher - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_stdin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_stdin/</guid>
      <description>
        
          
            Detects Obfuscated use of stdin to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation STDIN&#43; Launcher - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_stdin_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_stdin_services_security/</guid>
      <description>
        
          
            Detects Obfuscated use of stdin to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation STDIN&#43; Launcher - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_stdin_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_stdin_services/</guid>
      <description>
        
          
            Detects Obfuscated use of stdin to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43; Launcher</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_var/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_var/</guid>
      <description>
        
          
            Detects Obfuscated use of Environment Variables to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43; Launcher - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_var/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_var/</guid>
      <description>
        
          
            Detects Obfuscated use of Environment Variables to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43; Launcher - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_var/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_var/</guid>
      <description>
        
          
            Detects Obfuscated use of Environment Variables to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43; Launcher - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_var_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_var_services_security/</guid>
      <description>
        
          
            Detects Obfuscated use of Environment Variables to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43; Launcher - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_var_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_var_services/</guid>
      <description>
        
          
            Detects Obfuscated use of Environment Variables to execute PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43;&#43; LAUNCHER OBFUSCATION</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_var/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_var/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via VAR++ LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43;&#43; LAUNCHER OBFUSCATION - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_var/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_var/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via VAR++ LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43;&#43; LAUNCHER OBFUSCATION - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_var/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_var/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via VAR++ LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43;&#43; LAUNCHER OBFUSCATION - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_var_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_var_services_security/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via VAR++ LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation VAR&#43;&#43; LAUNCHER OBFUSCATION - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_var_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_var_services/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via VAR++ LAUNCHER
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Stdin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_stdin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_stdin/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via Stdin in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Stdin - Powershell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_stdin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_stdin/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via Stdin in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Stdin - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_stdin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_stdin/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via Stdin in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Stdin - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_stdin_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_stdin_services_security/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via Stdin in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Stdin - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_stdin_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_stdin_services/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via Stdin in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Clip</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_use_clip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_use_clip/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Clip.exe in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Clip - Powershell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_use_clip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_use_clip/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Clip.exe in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Clip - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_use_clip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_use_clip/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Clip.exe in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Clip - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_use_clip_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_use_clip_services_security/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Clip.exe in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Clip - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_use_clip_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_use_clip_services/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Clip.exe in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use MSHTA</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_use_mhsta/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_invoke_obfuscation_via_use_mhsta/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use MSHTA in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use MSHTA - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_use_mhsta/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_use_mhsta/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use MSHTA in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use MSHTA - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_use_mhsta/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_use_mhsta/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use MSHTA in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use MSHTA - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_use_mshta_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_use_mshta_services_security/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use MSHTA in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use MSHTA - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_use_mshta_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_use_mshta_services/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use MSHTA in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Rundll32 - PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_use_rundll32/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_invoke_obfuscation_via_use_rundll32/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Rundll32 in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Rundll32 - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_use_rundll32/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_via_use_rundll32/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Rundll32 in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Rundll32 - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_use_rundll32_services_security/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_invoke_obfuscation_via_use_rundll32_services_security/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Rundll32 in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Invoke-Obfuscation Via Use Rundll32 - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_use_rundll32_services/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_invoke_obfuscation_via_use_rundll32_services/</guid>
      <description>
        
          
            Detects Obfuscated Powershell via use Rundll32 in Scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>JScript Compiler Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_jsc_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_jsc_execution/</guid>
      <description>
        
          
            Detects the execution of the &#34;jsc.exe&#34; (JScript Compiler).
Attacker might abuse this in order to compile JScript files on the fly and bypassing application whitelisting.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Juniper BGP Missing MD5</title>
      <link>https://detection.fyi/sigmahq/sigma/network/juniper/bgp/juniper_bgp_missing_md5/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/network/juniper/bgp/juniper_bgp_missing_md5/</guid>
      <description>
        
          
            Detects juniper BGP missing MD5 digest. Which may be indicative of brute force attacks to manipulate routing.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Kapeka Backdoor Execution Via RunDLL32.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/kapeka/proc_creation_win_malware_kapeka_backdoor_rundll32_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/kapeka/proc_creation_win_malware_kapeka_backdoor_rundll32_execution/</guid>
      <description>
        
          
            Detects Kapeka backdoor process execution pattern, where the dropper launch the backdoor binary by calling rundll32 and passing the backdoor&#39;s first export ordinal (#1) with a &#34;-d&#34; argument.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Kapeka Backdoor Loaded Via Rundll32.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/kapeka/image_load_malware_kapeka_backdoor_wll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/kapeka/image_load_malware_kapeka_backdoor_wll/</guid>
      <description>
        
          
            Detects the Kapeka Backdoor binary being loaded by rundll32.exe.
The Kapeka loader drops a backdoor, which is a DLL with the &#39;.wll&#39; extension masquerading as a Microsoft Word Add-In.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Kavremover Dropped Binary LOLBIN Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_kavremover_uncommon_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_kavremover_uncommon_execution/</guid>
      <description>
        
          
            Detects the execution of a signed binary dropped by Kaspersky Lab Products Remover (kavremover) which can be abused as a LOLBIN to execute arbitrary commands and binaries.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Kernel Memory Dump Via LiveKD</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_livekd_kernel_memory_dump/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_livekd_kernel_memory_dump/</guid>
      <description>
        
          
            Detects execution of LiveKD with the &#34;-m&#34; flag to potentially dump the kernel memory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Kubernetes Admission Controller Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/application/kubernetes/audit/kubernetes_audit_change_admission_controller/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/kubernetes/audit/kubernetes_audit_change_admission_controller/</guid>
      <description>
        
          
            Detects when a modification (create, update or replace) action is taken that affects mutating or validating webhook configurations, as they can be used by an adversary to achieve persistence or exfiltrate access credentials.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Kubernetes Events Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/application/kubernetes/audit/kubernetes_audit_events_deleted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/kubernetes/audit/kubernetes_audit_events_deleted/</guid>
      <description>
        
          
            Detects when events are deleted in Kubernetes.
An adversary may delete Kubernetes events in an attempt to evade detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Launch-VsDevShell.PS1 Proxy Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_launch_vsdevshell/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_launch_vsdevshell/</guid>
      <description>
        
          
            Detects the use of the &#39;Launch-VsDevShell.ps1&#39; Microsoft signed script to execute commands.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Lazarus APT DLL Sideloading Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/lazarus/image_load_apt_lazarus_side_load_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/lazarus/image_load_apt_lazarus_side_load_activity/</guid>
      <description>
        
          
            Detects sideloading of trojanized DLLs used in Lazarus APT campaign in the case of a Spanish aerospace company
          
          
        
      </description>
    </item>
    
    <item>
      <title>Lazarus System Binary Masquerading</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/ta/lazarus/proc_creation_win_apt_lazarus_binary_masquerading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/ta/lazarus/proc_creation_win_apt_lazarus_binary_masquerading/</guid>
      <description>
        
          
            Detects binaries used by the Lazarus group which use system names but are executed and launched from non-default location
          
          
        
      </description>
    </item>
    
    <item>
      <title>Legitimate Application Dropped Archive</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_archive/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_archive/</guid>
      <description>
        
          
            Detects programs on a Windows system that should not write an archive to disk
          
          
        
      </description>
    </item>
    
    <item>
      <title>Legitimate Application Dropped Executable</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_exe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_exe/</guid>
      <description>
        
          
            Detects programs on a Windows system that should not write executables to disk
          
          
        
      </description>
    </item>
    
    <item>
      <title>Legitimate Application Dropped Script</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_script/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_script/</guid>
      <description>
        
          
            Detects programs on a Windows system that should not write scripts to disk
          
          
        
      </description>
    </item>
    
    <item>
      <title>Legitimate Application Writing Files In Uncommon Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_in_uncommon_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_in_uncommon_location/</guid>
      <description>
        
          
            Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution.
Adversaries may leverage legitimate applications (Living off the Land Binaries - LOLBins) to drop or download malicious files to uncommon locations on the system to evade detection by security solutions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Linux Base64 Encoded Pipe to Shell</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_base64_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_base64_execution/</guid>
      <description>
        
          
            Detects suspicious process command line that uses base64 encoded input for execution with a shell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Linux Base64 Encoded Shebang In CLI</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_base64_shebang_cli/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_base64_shebang_cli/</guid>
      <description>
        
          
            Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded
          
          
        
      </description>
    </item>
    
    <item>
      <title>Linux Command History Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/builtin/lnx_shell_clear_cmd_history/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/builtin/lnx_shell_clear_cmd_history/</guid>
      <description>
        
          
            Detects commands that try to clear or tamper with the Linux command history.
This technique is used by threat actors in order to evade defenses and execute commands without them being recorded in files such as &#34;bash_history&#34; or &#34;zsh_history&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Linux Package Uninstall</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_remove_package/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_remove_package/</guid>
      <description>
        
          
            Detects linux package removal using builtin tools such as &#34;yum&#34;, &#34;apt&#34;, &#34;apt-get&#34; or &#34;dpkg&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Linux Shell Pipe to Shell</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_susp_pipe_shell/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_susp_pipe_shell/</guid>
      <description>
        
          
            Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell
          
          
        
      </description>
    </item>
    
    <item>
      <title>LiveKD Driver Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sysinternals_livekd_driver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sysinternals_livekd_driver/</guid>
      <description>
        
          
            Detects the creation of the LiveKD driver, which is used for live kernel debugging
          
          
        
      </description>
    </item>
    
    <item>
      <title>LiveKD Driver Creation By Uncommon Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sysinternals_livekd_driver_susp_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sysinternals_livekd_driver_susp_creation/</guid>
      <description>
        
          
            Detects the creation of the LiveKD driver by a process image other than &#34;livekd.exe&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>LiveKD Kernel Memory Dump File Created</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sysinternals_livekd_default_dump_name/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sysinternals_livekd_default_dump_name/</guid>
      <description>
        
          
            Detects the creation of a file that has the same name as the default LiveKD kernel memory dump.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Login to Disabled Account</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_login_to_disabled_account/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_login_to_disabled_account/</guid>
      <description>
        
          
            Detect failed attempts to sign in to disabled accounts.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Logon from a Risky IP Address</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/m365/threat_management/microsoft365_logon_from_risky_ip_address/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/m365/threat_management/microsoft365_logon_from_risky_ip_address/</guid>
      <description>
        
          
            Detects when a Microsoft Cloud App Security reported when a user signs into your sanctioned apps from a risky IP address.
          
          
        
      </description>
    </item>
    
    <item>
      <title>LOL-Binary Copied From System Directory</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_copy_system_dir_lolbin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_copy_system_dir_lolbin/</guid>
      <description>
        
          
            Detects a suspicious copy operation that tries to copy a known LOLBIN from system (System32, SysWOW64, WinSxS) directories to another on disk in order to bypass detections based on locations.

          
          
        
      </description>
    </item>
    
    <item>
      <title>LOLBIN Execution From Abnormal Drive</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_lolbin_exec_from_non_c_drive/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_lolbin_exec_from_non_c_drive/</guid>
      <description>
        
          
            Detects LOLBINs executing from an abnormal or uncommon drive such as a mounted ISO.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Lolbin Runexehelper Use As Proxy</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_runexehelper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_runexehelper/</guid>
      <description>
        
          
            Detect usage of the &#34;runexehelper.exe&#34; binary as a proxy to launch other programs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Lolbin Unregmp2.exe Use As Proxy</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_unregmp2/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_unregmp2/</guid>
      <description>
        
          
            Detect usage of the &#34;unregmp2.exe&#34; binary as a proxy to launch a custom version of &#34;wmpnscfg.exe&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Lummac Stealer Activity - Execution Of More.com And Vbc.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/lummac-stealer/proc_creation_win_malware_lummac_more_vbc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/lummac-stealer/proc_creation_win_malware_lummac_more_vbc/</guid>
      <description>
        
          
            Detects the execution of more.com and vbc.exe in the process tree.
This behavior was observed by a set of samples related to Lummac Stealer.
The Lummac payload is injected into the vbc.exe process.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Malicious DLL File Dropped in the Teams or OneDrive Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_iphlpapi_dll_sideloading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_iphlpapi_dll_sideloading/</guid>
      <description>
        
          
            Detects creation of a malicious DLL file in the location where the OneDrive or Team applications
Upon execution of the Teams or OneDrive application, the dropped malicious DLL file (&#34;iphlpapi.dll&#34;) is sideloaded

          
          
        
      </description>
    </item>
    
    <item>
      <title>Malicious DLL Load By Compromised 3CXDesktopApp</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/3cx-supply-chain/image_load_malware_3cx_compromise_susp_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/3cx-supply-chain/image_load_malware_3cx_compromise_susp_dll/</guid>
      <description>
        
          
            Detects DLL load activity of known compromised DLLs used in by the compromised 3CXDesktopApp
          
          
        
      </description>
    </item>
    
    <item>
      <title>Malicious Named Pipe Created</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_susp_malicious_namedpipes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/pipe_created/pipe_created_susp_malicious_namedpipes/</guid>
      <description>
        
          
            Detects the creation of a named pipe seen used by known APTs or malware.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Malicious PE Execution by Microsoft Visual Studio Debugger</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_use_of_vsjitdebugger_bin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_use_of_vsjitdebugger_bin/</guid>
      <description>
        
          
            There is an option for a MS VS Just-In-Time Debugger &#34;vsjitdebugger.exe&#34; to launch specified executable and attach a debugger.
This option may be used adversaries to execute malicious code by signed verified binary.
The debugger is installed alongside with Microsoft Visual Studio package.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_imds_malicious_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_imds_malicious_usage/</guid>
      <description>
        
          
            Detects when an instance identity has taken an action that isn&#39;t inside SSM.
This can indicate that a compromised EC2 instance is being used as a pivot point.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Malicious Windows Script Components File Execution by TAEF Detection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_use_of_te_bin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_use_of_te_bin/</guid>
      <description>
        
          
            Windows Test Authoring and Execution Framework (TAEF) framework allows you to run automation by executing tests files written on different languages (C, C#, Microsoft COM Scripting interfaces
Adversaries may execute malicious code (such as WSC file with VBScript, dll and so on) directly by running te.exe

          
          
        
      </description>
    </item>
    
    <item>
      <title>Malware Shellcode in Verclsid Target Process</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/hancitor/proc_access_win_malware_verclsid_shellcode/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/hancitor/proc_access_win_malware_verclsid_shellcode/</guid>
      <description>
        
          
            Detects a process access to verclsid.exe that injects shellcode from a Microsoft Office application / VBA macro
          
          
        
      </description>
    </item>
    
    <item>
      <title>ManageEngine Endpoint Central Dctask64.EXE Potential Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dctask64_arbitrary_command_and_dll_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dctask64_arbitrary_command_and_dll_execution/</guid>
      <description>
        
          
            Detects the execution of &#34;dctask64.exe&#34;, a signed binary by ZOHO Corporation part of ManageEngine Endpoint Central.
This binary can be abused for DLL injection, arbitrary command and process execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Masquerading as Linux Crond Process</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_masquerading_crond/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_masquerading_crond/</guid>
      <description>
        
          
            Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation.
Several different variations of this technique have been observed.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Mavinject Inject DLL Into Running Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_mavinject_process_injection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_mavinject_process_injection/</guid>
      <description>
        
          
            Detects process injection using the signed Windows tool &#34;Mavinject&#34; via the &#34;INJECTRUNNING&#34; flag
          
          
        
      </description>
    </item>
    
    <item>
      <title>MaxMpxCt Registry Value Changed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_optimize_file_sharing_network/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_optimize_file_sharing_network/</guid>
      <description>
        
          
            Detects changes to the &#34;MaxMpxCt&#34; registry value.
MaxMpxCt specifies the maximum outstanding network requests for the server per client, which is used when negotiating a Server Message Block (SMB) connection with a client. Note if the value is set beyond 125 older Windows 9x clients will fail to negotiate.
Ransomware threat actors and operators (specifically BlackCat) were seen increasing this value in order to handle a higher volume of traffic.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Measurable Increase Of Successful Authentications</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_auth_sucess_increase/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_auth_sucess_increase/</guid>
      <description>
        
          
            Detects when successful sign-ins increased by 10% or greater.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Meterpreter or Cobalt Strike Getsystem Service Installation - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_meterpreter_or_cobaltstrike_getsystem_service_install/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_meterpreter_or_cobaltstrike_getsystem_service_install/</guid>
      <description>
        
          
            Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation
          
          
        
      </description>
    </item>
    
    <item>
      <title>Meterpreter or Cobalt Strike Getsystem Service Installation - System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_meterpreter_or_cobaltstrike_getsystem_service_installation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_meterpreter_or_cobaltstrike_getsystem_service_installation/</guid>
      <description>
        
          
            Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft 365 - Impossible Travel Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/m365/threat_management/microsoft365_impossible_travel_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/m365/threat_management/microsoft365_impossible_travel_activity/</guid>
      <description>
        
          
            Detects when a Microsoft Cloud App Security reported a risky sign-in attempt due to a login associated with an impossible travel.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Defender Blocked from Loading Unsigned DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security_mitigations/win_security_mitigations_defender_load_unsigned_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security_mitigations/win_security_mitigations_defender_load_unsigned_dll/</guid>
      <description>
        
          
            Detects Code Integrity (CI) engine blocking Microsoft Defender&#39;s processes (MpCmdRun and NisSrv) from loading unsigned DLLs which may be an attempt to sideload arbitrary DLL
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Malware Protection Engine Crash</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/application_error/win_application_error_msmpeng_crash/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/application_error/win_application_error_msmpeng_crash/</guid>
      <description>
        
          
            This rule detects a suspicious crash of the Microsoft Malware Protection Engine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Malware Protection Engine Crash - WER</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/windows_error_reporting/win_application_msmpeng_crash_wer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/windows_error_reporting/win_application_msmpeng_crash_wer/</guid>
      <description>
        
          
            This rule detects a suspicious crash of the Microsoft Malware Protection Engine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Office DLL Sideload</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_office_dlls/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_office_dlls/</guid>
      <description>
        
          
            Detects DLL sideloading of DLLs that are part of Microsoft Office from non standard location
          
          
        
      </description>
    </item>
    
    <item>
      <title>Microsoft Sync Center Suspicious Network Connections</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_susp_outbound_mobsync_connection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_susp_outbound_mobsync_connection/</guid>
      <description>
        
          
            Detects suspicious connections from Microsoft Sync Center to non-private IPs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>MMC Executing Files with Reversed Extensions Using RTLO Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mmc_rlo_abuse_pattern/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mmc_rlo_abuse_pattern/</guid>
      <description>
        
          
            Detects malicious behavior where the MMC utility (`mmc.exe`) executes files with reversed extensions caused by Right-to-Left Override (RLO) abuse, disguising them as document formats.
          
          
        
      </description>
    </item>
    
    <item>
      <title>MMC Loading Script Engines DLLs</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_win_mmc_loads_script_engine_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_win_mmc_loads_script_engine_dll/</guid>
      <description>
        
          
            Detects when the Microsoft Management Console (MMC) loads the DLL libraries like vbscript, jscript etc which might indicate an attempt
to execute malicious scripts within a trusted system process for bypassing application whitelisting or defense evasion.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Modification of ld.so.preload</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_ld_so_preload_mod/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_ld_so_preload_mod/</guid>
      <description>
        
          
            Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Monitoring For Persistence Via BITS</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_potential_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_potential_persistence/</guid>
      <description>
        
          
            BITS will allow you to schedule a command to execute after a successful download to notify you that the job is finished.
When the job runs on the system the command specified in the BITS job will be executed.
This can be abused by actors to create a backdoor within the system and for persistence.
It will be chained in a BITS job to schedule the download of malware/additional binaries and execute the program after being downloaded.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Mount Execution With Hidepid Parameter</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_mount_hidepid/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_mount_hidepid/</guid>
      <description>
        
          
            Detects execution of the &#34;mount&#34; command with &#34;hidepid&#34; parameter to make invisible processes to other users from the system
          
          
        
      </description>
    </item>
    
    <item>
      <title>MpiExec Lolbin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_mpiexec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_mpiexec/</guid>
      <description>
        
          
            Detects a certain command line flag combination used by mpiexec.exe LOLBIN from HPC pack that can be used to execute any other binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>MSDT Execution Via Answer File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msdt_answer_file_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msdt_answer_file_exec/</guid>
      <description>
        
          
            Detects execution of &#34;msdt.exe&#34; using an answer file which is simulating the legitimate way of calling msdt via &#34;pcwrun.exe&#34; (For example from the compatibility tab).

          
          
        
      </description>
    </item>
    
    <item>
      <title>MSHTA Execution with Suspicious File Extensions</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_susp_execution/</guid>
      <description>
        
          
            Detects execution of mshta.exe with file types that looks like they do not typically represent HTA (HTML Application) content,
such as .png, .jpg, .zip, .pdf, and others, which are often polyglots. MSHTA is a legitimate Windows utility for executing HTML Applications
containing VBScript or JScript. Threat actors often abuse this lolbin utility to download and
execute malicious scripts disguised as benign files or hosted under misleading extensions to evade detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Mshtml.DLL RunHTMLApplication Suspicious Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_mshtml_runhtmlapplication/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_mshtml_runhtmlapplication/</guid>
      <description>
        
          
            Detects execution of commands that leverage the &#34;mshtml.dll&#34; RunHTMLApplication export to run arbitrary code via different protocol handlers (vbscript, javascript, file, http...)

          
          
        
      </description>
    </item>
    
    <item>
      <title>MSI Installation From Web</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/application/msiinstaller/win_msi_install_from_web/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/application/msiinstaller/win_msi_install_from_web/</guid>
      <description>
        
          
            Detects installation of a remote msi file from web.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Msiexec Quiet Installation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_install_quiet/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_install_quiet/</guid>
      <description>
        
          
            Adversaries may abuse msiexec.exe to proxy execution of malicious payloads.
Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi)

          
          
        
      </description>
    </item>
    
    <item>
      <title>MsiExec Web Install</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_web_install/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_web_install/</guid>
      <description>
        
          
            Detects suspicious msiexec process starts with web addresses as parameter
          
          
        
      </description>
    </item>
    
    <item>
      <title>Msxsl.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msxsl_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msxsl_execution/</guid>
      <description>
        
          
            Detects the execution of the MSXSL utility. This can be used to execute Extensible Stylesheet Language (XSL) files. These files are commonly used to describe the processing and rendering of data within XML files.
Adversaries can abuse this functionality to execute arbitrary files while potentially bypassing application whitelisting defenses.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Multifactor Authentication Denied</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_mfa_denies/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_mfa_denies/</guid>
      <description>
        
          
            User has indicated they haven&#39;t instigated the MFA prompt and could indicate an attacker has the password for the account.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Multifactor Authentication Interrupted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_mfa_interrupted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_mfa_interrupted/</guid>
      <description>
        
          
            Identifies user login with multifactor authentication failures, which might be an indication an attacker has the password for the account but can&#39;t pass the MFA challenge.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Network Connection Initiated By AddinUtil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_addinutil_initiated/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_addinutil_initiated/</guid>
      <description>
        
          
            Detects a network connection initiated by the Add-In deployment cache updating utility &#34;AddInutil.exe&#34;.
This could indicate a potential command and control communication as this tool doesn&#39;t usually initiate network activity.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Network Connection Initiated By Regsvr32.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_regsvr32_network_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_regsvr32_network_activity/</guid>
      <description>
        
          
            Detects a network connection initiated by &#34;Regsvr32.exe&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Network Connection Initiated Via Notepad.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_notepad/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_notepad/</guid>
      <description>
        
          
            Detects a network connection that is initiated by the &#34;notepad.exe&#34; process.
This might be a sign of process injection from a beacon process or something similar.
Notepad rarely initiates a network communication except when printing documents for example.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New BITS Job Created Via Bitsadmin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_job_via_bitsadmin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_job_via_bitsadmin/</guid>
      <description>
        
          
            Detects the creation of a new bits job by Bitsadmin
          
          
        
      </description>
    </item>
    
    <item>
      <title>New BITS Job Created Via PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_job_via_powershell/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/bits_client/win_bits_client_new_job_via_powershell/</guid>
      <description>
        
          
            Detects the creation of a new bits job by PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>New Capture Session Launched Via DXCap.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dxcap_arbitrary_binary_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dxcap_arbitrary_binary_execution/</guid>
      <description>
        
          
            Detects the execution of &#34;DXCap.EXE&#34; with the &#34;-c&#34; flag, which allows a user to launch any arbitrary binary or windows package through DXCap itself. This can be abused to potentially bypass application whitelisting.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New Country</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_new_coutry_region/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_new_coutry_region/</guid>
      <description>
        
          
            Detects sign-ins from new countries. The detection considers past activity locations to determine new and infrequent locations.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New DLL Registered Via Odbcconf.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_register_dll_regsvr/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_register_dll_regsvr/</guid>
      <description>
        
          
            Detects execution of &#34;odbcconf&#34; with &#34;REGSVR&#34; in order to register a new DLL (equivalent to running regsvr32). Attackers abuse this to install and run malicious DLLs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New DMSA Service Account Created in Specific OUs</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_create_new_dmsasvc_account/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_create_new_dmsasvc_account/</guid>
      <description>
        
          
            Detects the creation of a dMSASvc account using the New-ADServiceAccount cmdlet in certain OUs.
The fact that the Cmdlet is used to create a dMSASvc account in a specific OU is highly suspicious.
It is a pattern trying to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025.
On top of that, if the user that is creating the dMSASvc account is not a legitimate administrator or does not have the necessary permissions,
it is a strong signal of an attempted or successful abuse of the BaDSuccessor vulnerability for privilege escalation within the Windows Server 2025 Active Directory environment.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New DNS ServerLevelPluginDll Installed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dns_server_level_plugin_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dns_server_level_plugin_dll/</guid>
      <description>
        
          
            Detects the installation of a DNS plugin DLL via ServerLevelPluginDll parameter in registry, which can be used to execute code in context of the DNS server (restart required)
          
          
        
      </description>
    </item>
    
    <item>
      <title>New DNS ServerLevelPluginDll Installed Via Dnscmd.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dnscmd_install_new_server_level_plugin_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dnscmd_install_new_server_level_plugin_dll/</guid>
      <description>
        
          
            Detects the installation of a DNS plugin DLL via ServerLevelPluginDll parameter in registry, which can be used to execute code in context of the DNS server (restart required)
          
          
        
      </description>
    </item>
    
    <item>
      <title>New File Association Using Exefile</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_file_association_exefile/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_file_association_exefile/</guid>
      <description>
        
          
            Detects the abuse of the exefile handler in new file association. Used for bypass of security products.
          
          
        
      </description>
    </item>
    
    <item>
      <title>New or Renamed User Account with &#39;$&#39; Character</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_new_or_renamed_user_account_with_dollar_sign/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_new_or_renamed_user_account_with_dollar_sign/</guid>
      <description>
        
          
            Detects the creation of a user with the &#34;$&#34; character. This can be used by attackers to hide a user or trick detection systems that lack the parsing mechanisms.

          
          
        
      </description>
    </item>
    
    <item>
      <title>New Process Created Via Taskmgr.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_taskmgr_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_taskmgr_susp_child_process/</guid>
      <description>
        
          
            Detects the creation of a process via the Windows task manager. This might be an attempt to bypass UAC
          
          
        
      </description>
    </item>
    
    <item>
      <title>Node Process Executions</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_node_adobe_creative_cloud_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_node_adobe_creative_cloud_abuse/</guid>
      <description>
        
          
            Detects the execution of other scripts using the Node executable packaged with Adobe Creative Cloud
          
          
        
      </description>
    </item>
    
    <item>
      <title>NotPetya Ransomware Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/notpetya/proc_creation_win_malware_notpetya/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/notpetya/proc_creation_win_malware_notpetya/</guid>
      <description>
        
          
            Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and Windows eventlogs are cleared using wevtutil
          
          
        
      </description>
    </item>
    
    <item>
      <title>Nslookup PowerShell Download Cradle - ProcessCreation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_nslookup_poweshell_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_nslookup_poweshell_download/</guid>
      <description>
        
          
            Detects suspicious powershell download cradle using nslookup. This cradle uses nslookup to extract payloads from DNS records
          
          
        
      </description>
    </item>
    
    <item>
      <title>NTFS Alternate Data Stream</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_ntfs_ads_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_ntfs_ads_access/</guid>
      <description>
        
          
            Detects writing data into NTFS alternate data streams from powershell. Needs Script Block Logging.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Obfuscated PowerShell MSI Install via WindowsInstaller COM</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_comobject_msi/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_comobject_msi/</guid>
      <description>
        
          
            Detects the execution of obfuscated PowerShell commands that attempt to install MSI packages via the Windows Installer COM object (`WindowsInstaller.Installer`).
The technique involves manipulating strings to hide functionality, such as constructing class names using string insertion (e.g., &#39;indowsInstaller.Installer&#39;.Insert(0,&#39;W&#39;)) and correcting
malformed URLs (e.g., converting &#39;htps://&#39; to &#39;https://&#39;) at runtime. This behavior is commonly associated with malware loaders or droppers that aim to bypass static detection
by hiding intent in runtime-generated strings and using legitimate tools for code execution. The use of `InstallProduct` and COM object creation, particularly combined with
hidden window execution and suppressed UI, indicates an attempt to install software (likely malicious) without user interaction.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Odbcconf.EXE Suspicious DLL Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_exec_susp_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_exec_susp_locations/</guid>
      <description>
        
          
            Detects execution of &#34;odbcconf&#34; where the path of the DLL being registered is located in a potentially suspicious location.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Office Application Initiated Network Connection Over Uncommon Ports</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_office_uncommon_ports/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_office_uncommon_ports/</guid>
      <description>
        
          
            Detects an office suit application (Word, Excel, PowerPoint, Outlook) communicating to target systems over uncommon ports.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Okta New Admin Console Behaviours</title>
      <link>https://detection.fyi/sigmahq/sigma/identity/okta/okta_new_behaviours_admin_console/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/identity/okta/okta_new_behaviours_admin_console/</guid>
      <description>
        
          
            Detects when Okta identifies new activity in the Admin Console.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Old TLS1.0/TLS1.1 Protocol Version Enabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_tls_protocol_old_version_enabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_tls_protocol_old_version_enabled/</guid>
      <description>
        
          
            Detects applications or users re-enabling old TLS versions by setting the &#34;Enabled&#34; value to &#34;1&#34; for the &#34;Protocols&#34; registry key.
          
          
        
      </description>
    </item>
    
    <item>
      <title>OneNote Attachment File Dropped In Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_office_onenote_files_in_susp_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_office_onenote_files_in_susp_locations/</guid>
      <description>
        
          
            Detects creation of files with the &#34;.one&#34;/&#34;.onepkg&#34; extension in suspicious or uncommon locations. This could be a sign of attackers abusing OneNote attachments
          
          
        
      </description>
    </item>
    
    <item>
      <title>OneNote.EXE Execution of Malicious Embedded Scripts</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_onenote_embedded_script_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_onenote_embedded_script_execution/</guid>
      <description>
        
          
            Detects the execution of malicious OneNote documents that contain embedded scripts.
When a user clicks on a OneNote attachment and then on the malicious link inside the &#34;.one&#34; file, it exports and executes the malicious embedded script from specific directories.

          
          
        
      </description>
    </item>
    
    <item>
      <title>OpenCanary - SSH Login Attempt</title>
      <link>https://detection.fyi/sigmahq/sigma/application/opencanary/opencanary_ssh_login_attempt/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/opencanary/opencanary_ssh_login_attempt/</guid>
      <description>
        
          
            Detects instances where an SSH service on an OpenCanary node has had a login attempt.
          
          
        
      </description>
    </item>
    
    <item>
      <title>OpenCanary - SSH New Connection Attempt</title>
      <link>https://detection.fyi/sigmahq/sigma/application/opencanary/opencanary_ssh_new_connection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/opencanary/opencanary_ssh_new_connection/</guid>
      <description>
        
          
            Detects instances where an SSH service on an OpenCanary node has had a connection attempt.
          
          
        
      </description>
    </item>
    
    <item>
      <title>OpenCanary - Telnet Login Attempt</title>
      <link>https://detection.fyi/sigmahq/sigma/application/opencanary/opencanary_telnet_login_attempt/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/application/opencanary/opencanary_telnet_login_attempt/</guid>
      <description>
        
          
            Detects instances where a Telnet service on an OpenCanary node has had a login attempt.
          
          
        
      </description>
    </item>
    
    <item>
      <title>OpenWith.exe Executes Specified Binary</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_openwith/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_openwith/</guid>
      <description>
        
          
            The OpenWith.exe executes other binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>Operation Wocao Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/operation-wocao/proc_creation_win_apt_wocao/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/operation-wocao/proc_creation_win_apt_wocao/</guid>
      <description>
        
          
            Detects activity mentioned in Operation Wocao report
          
          
        
      </description>
    </item>
    
    <item>
      <title>Operation Wocao Activity - Security</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/operation-wocao/win_security_apt_wocao/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/operation-wocao/win_security_apt_wocao/</guid>
      <description>
        
          
            Detects activity mentioned in Operation Wocao report
          
          
        
      </description>
    </item>
    
    <item>
      <title>Outbound Network Connection Initiated By Cmstp.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_cmstp_initiated_connection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_cmstp_initiated_connection/</guid>
      <description>
        
          
            Detects a network connection initiated by Cmstp.EXE
Its uncommon for &#34;cmstp.exe&#34; to initiate an outbound network connection. Investigate the source of such requests to determine if they are malicious.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Outbound Network Connection To Public IP Via Winlogon</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_winlogon_net_connections/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_winlogon_net_connections/</guid>
      <description>
        
          
            Detects a &#34;winlogon.exe&#34; process that initiate network communications with public IP addresses
          
          
        
      </description>
    </item>
    
    <item>
      <title>Outlook EnableUnsafeClientMailRules Setting Enabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_outlook_enable_unsafe_client_mail_rules/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_outlook_enable_unsafe_client_mail_rules/</guid>
      <description>
        
          
            Detects an attacker trying to enable the outlook security setting &#34;EnableUnsafeClientMailRules&#34; which allows outlook to run applications or execute macros
          
          
        
      </description>
    </item>
    
    <item>
      <title>Password Protected ZIP File Opened</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_opened_encrypted_zip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_opened_encrypted_zip/</guid>
      <description>
        
          
            Detects the extraction of password protected ZIP archives. See the filename variable for more details on which file has been opened.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Password Protected ZIP File Opened (Email Attachment)</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_opened_encrypted_zip_outlook/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_opened_encrypted_zip_outlook/</guid>
      <description>
        
          
            Detects the extraction of password protected ZIP archives. See the filename variable for more details on which file has been opened.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Password Protected ZIP File Opened (Suspicious Filenames)</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_opened_encrypted_zip_filename/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_opened_encrypted_zip_filename/</guid>
      <description>
        
          
            Detects the extraction of password protected ZIP archives with suspicious file names. See the filename variable for more details on which file has been opened.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Password Provided In Command Line Of Net.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_net_use_password_plaintext/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_net_use_password_plaintext/</guid>
      <description>
        
          
            Detects a when net.exe is called with a password in the command line
          
          
        
      </description>
    </item>
    
    <item>
      <title>Password Reset By User Account</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_user_password_change/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_user_password_change/</guid>
      <description>
        
          
            Detect when a user has reset their password in Azure AD
          
          
        
      </description>
    </item>
    
    <item>
      <title>Payload Decoded and Decrypted via Built-in Utilities</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_payload_decoded_and_decrypted/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_payload_decoded_and_decrypted/</guid>
      <description>
        
          
            Detects when a built-in utility is used to decode and decrypt a payload after a macOS disk image (DMG) is executed. Malware authors may attempt to evade detection and trick users into executing malicious code by encoding and encrypting their payload and placing it in a disk image file. This behavior is consistent with adware or malware families such as Bundlore and Shlayer.
          
          
        
      </description>
    </item>
    
    <item>
      <title>PDF File Created By RegEdit.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_regedit_print_as_pdf/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_regedit_print_as_pdf/</guid>
      <description>
        
          
            Detects the creation of a file with the &#34;.pdf&#34; extension by the &#34;RegEdit.exe&#34; process.
This indicates that a user is trying to print/save a registry key as a PDF in order to potentially extract sensitive information and bypass defenses.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Pikabot Fake DLL Extension Execution Via Rundll32.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/pikabot/proc_creation_win_malware_pikabot_rundll32_uncommon_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/pikabot/proc_creation_win_malware_pikabot_rundll32_uncommon_extension/</guid>
      <description>
        
          
            Detects specific process tree behavior linked to &#34;rundll32&#34; executions, wherein the associated DLL lacks a common &#34;.dll&#34; extension, often signaling potential Pikabot activity.

          
          
        
      </description>
    </item>
    
    <item>
      <title>PIM Alert Setting Changes To Disabled</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_pim_alerts_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_pim_alerts_disabled/</guid>
      <description>
        
          
            Detects when PIM alerts are set to disabled.
          
          
        
      </description>
    </item>
    
    <item>
      <title>PIM Approvals And Deny Elevation</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_pim_activation_approve_deny/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_pim_activation_approve_deny/</guid>
      <description>
        
          
            Detects when a PIM elevation is approved or denied. Outside of normal operations should be investigated.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Ping Hex IP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ping_hex_ip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ping_hex_ip/</guid>
      <description>
        
          
            Detects a ping command that uses a hex encoded IP address
          
          
        
      </description>
    </item>
    
    <item>
      <title>Pingback Backdoor Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/pingback/proc_creation_win_malware_pingback_backdoor/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/pingback/proc_creation_win_malware_pingback_backdoor/</guid>
      <description>
        
          
            Detects the use of Pingback backdoor that creates ICMP tunnel for C2 as described in the trustwave report
          
          
        
      </description>
    </item>
    
    <item>
      <title>Pingback Backdoor DLL Loading Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/pingback/image_load_malware_pingback_backdoor/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/pingback/image_load_malware_pingback_backdoor/</guid>
      <description>
        
          
            Detects the use of Pingback backdoor that creates ICMP tunnel for C2 as described in the trustwave report
          
          
        
      </description>
    </item>
    
    <item>
      <title>Pingback Backdoor File Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/pingback/file_event_win_malware_pingback_backdoor/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/pingback/file_event_win_malware_pingback_backdoor/</guid>
      <description>
        
          
            Detects the use of Pingback backdoor that creates ICMP tunnel for C2 as described in the trustwave report
          
          
        
      </description>
    </item>
    
    <item>
      <title>Possible Privilege Escalation via Weak Service Permissions</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_change_sevice_image_path_by_non_admin/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_change_sevice_image_path_by_non_admin/</guid>
      <description>
        
          
            Detection of sc.exe utility spawning by user with Medium integrity level to change service ImagePath or FailureCommand
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential 7za.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_7za/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_7za/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;7za.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Access Token Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_access_token_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_access_token_abuse/</guid>
      <description>
        
          
            Detects potential token impersonation and theft. Example, when using &#34;DuplicateToken(Ex)&#34; and &#34;ImpersonateLoggedOnUser&#34; with the &#34;LOGON32_LOGON_NEW_CREDENTIALS flag&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Antivirus Software DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_antivirus/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_antivirus/</guid>
      <description>
        
          
            Detects potential DLL sideloading of DLLs that are part of antivirus software suchas McAfee, Symantec...etc
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Application Whitelisting Bypass via Dnx.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dnx_execute_csharp_code/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dnx_execute_csharp_code/</guid>
      <description>
        
          
            Detects the execution of Dnx.EXE. The Dnx utility allows for the execution of C# code.
Attackers might abuse this in order to bypass application whitelisting.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential appverifUI.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_appverifui/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_appverifui/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;appverifUI.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential APT-C-12 BlueMushroom DLL Load Activity Via Regsvr32</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/apc-c-12/proc_creation_win_apt_aptc12_bluemushroom/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/apc-c-12/proc_creation_win_apt_aptc12_bluemushroom/</guid>
      <description>
        
          
            Detects potential BlueMushroom DLL loading activity via regsvr32 from AppData Local
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Arbitrary Code Execution Via Node.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_node_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_node_abuse/</guid>
      <description>
        
          
            Detects the execution node.exe which is shipped with multiple software such as VMware, Adobe...etc. In order to execute arbitrary code. For example to establish reverse shell as seen in Log4j attacks...etc
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Arbitrary Command Execution Using Msdt.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msdt_arbitrary_command_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msdt_arbitrary_command_execution/</guid>
      <description>
        
          
            Detects processes leveraging the &#34;ms-msdt&#34; handler or the &#34;msdt.exe&#34; binary to execute arbitrary commands as seen in the follina (CVE-2022-30190) vulnerability
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Arbitrary Command Execution Via FTP.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ftp_arbitrary_command_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ftp_arbitrary_command_execution/</guid>
      <description>
        
          
            Detects execution of &#34;ftp.exe&#34; script with the &#34;-s&#34; or &#34;/s&#34; flag and any child processes ran by &#34;ftp.exe&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Arbitrary DLL Load Using Winword</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_winword_dll_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_winword_dll_load/</guid>
      <description>
        
          
            Detects potential DLL sideloading using the Microsoft Office winword process via the &#39;/l&#39; flag.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Arbitrary File Download Using Office Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_arbitrary_cli_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_arbitrary_cli_download/</guid>
      <description>
        
          
            Detects potential arbitrary file download using a Microsoft Office application
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Arbitrary File Download Via Cmdl32.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmdl32_arbitrary_file_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmdl32_arbitrary_file_download/</guid>
      <description>
        
          
            Detects execution of Cmdl32 with the &#34;/vpn&#34; and &#34;/lan&#34; flags.
Attackers can abuse this utility in order to download arbitrary files via a configuration file.
Inspect the location and the content of the file passed as an argument in order to determine if it is suspicious.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential AVKkid.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_avkkid/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_avkkid/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;AVKkid.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Azure Browser SSO Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_azure_microsoft_account_token_provider_dll_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_azure_microsoft_account_token_provider_dll_load/</guid>
      <description>
        
          
            Detects abusing Azure Browser SSO by requesting OAuth 2.0 refresh tokens for an Azure-AD-authenticated Windows user (i.e. the machine is joined to Azure AD and a user logs in with their Azure AD account) wanting to perform SSO authentication in the browser.
An attacker can use this to authenticate to Azure AD in a browser as that user.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Baby Shark Malware Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/malware/babyshark/proc_creation_win_malware_babyshark/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/malware/babyshark/proc_creation_win_malware_babyshark/</guid>
      <description>
        
          
            Detects activity that could be related to Baby Shark malware
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Base64 Decoded From Images</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_tail_base64_decode_from_image/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_tail_base64_decode_from_image/</guid>
      <description>
        
          
            Detects the use of tail to extract bytes at an offset from an image and then decode the base64 value to create a new file with the decoded content. The detected execution is a bash one-liner.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Binary Impersonating Sysinternals Tools</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_tools_masquerading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_tools_masquerading/</guid>
      <description>
        
          
            Detects binaries that use the same name as legitimate sysinternals tools to evade detection.
This rule looks for the execution of binaries that are named similarly to Sysinternals tools.
Adversary may rename their malicious tools as legitimate Sysinternals tools to evade detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Binary Proxy Execution Via Cdb.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cdb_arbitrary_command_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cdb_arbitrary_command_execution/</guid>
      <description>
        
          
            Detects usage of &#34;cdb.exe&#34; to launch arbitrary processes or commands from a debugger script file
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Binary Proxy Execution Via VSDiagnostics.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vsdiagnostics_execution_proxy/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vsdiagnostics_execution_proxy/</guid>
      <description>
        
          
            Detects execution of &#34;VSDiagnostics.exe&#34; with the &#34;start&#34; command in order to launch and proxy arbitrary binaries.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential BlackByte Ransomware Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/blackbyte/proc_creation_win_malware_blackbyte_ransomware/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/blackbyte/proc_creation_win_malware_blackbyte_ransomware/</guid>
      <description>
        
          
            Detects command line patterns used by BlackByte ransomware in different operations
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Bumblebee Remote Thread Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2022/malware/bumblebee/create_remote_thread_win_malware_bumblebee/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2022/malware/bumblebee/create_remote_thread_win_malware_bumblebee/</guid>
      <description>
        
          
            Detects remote thread injection events based on action seen used by bumblebee
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential CCleanerDU.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_ccleaner_du/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_ccleaner_du/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;CCleanerDU.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential CCleanerReactivator.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_ccleaner_reactivator/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_ccleaner_reactivator/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;CCleanerReactivator.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Chrome Frame Helper DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_chrome_frame_helper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_chrome_frame_helper/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;chrome_frame_helper.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential COLDSTEEL Persistence Service DLL Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/file_event_win_malware_coldsteel_service_dll_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/file_event_win_malware_coldsteel_service_dll_creation/</guid>
      <description>
        
          
            Detects the creation of a file in a specific location and with a specific name related to COLDSTEEL RAT
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential COLDSTEEL Persistence Service DLL Load</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/image_load_malware_coldsteel_persistence_service_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/image_load_malware_coldsteel_persistence_service_dll/</guid>
      <description>
        
          
            Detects a suspicious DLL load by an &#34;svchost&#34; process based on location and name that might be related to ColdSteel RAT. This DLL location and name has been seen used by ColdSteel as the service DLL for its persistence mechanism

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential COLDSTEEL RAT File Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/file_event_win_malware_coldsteel_renamed_cmd/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/coldsteel/file_event_win_malware_coldsteel_renamed_cmd/</guid>
      <description>
        
          
            Detects the creation of a file named &#34;dllhost.exe&#34; in the &#34;C:\users\public\Documents\&#34; directory. Seen being used by the COLDSTEEL RAT in some of its variants.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Command Line Path Traversal Evasion Attempt</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_commandline_path_traversal_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_commandline_path_traversal_evasion/</guid>
      <description>
        
          
            Detects potential evasion or obfuscation attempts using bogus path traversal via the commandline
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Commandline Obfuscation Using Escape Characters</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_cli_obfuscation_escape_char/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_cli_obfuscation_escape_char/</guid>
      <description>
        
          
            Detects potential commandline obfuscation using known escape characters
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img/</guid>
      <description>
        
          
            Detects potential commandline obfuscation using unicode characters.
Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Compromised 3CXDesktopApp Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/3cx-supply-chain/proc_creation_win_malware_3cx_compromise_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/3cx-supply-chain/proc_creation_win_malware_3cx_compromise_execution/</guid>
      <description>
        
          
            Detects execution of known compromised version of 3CXDesktopApp
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Compromised 3CXDesktopApp Update Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/3cx-supply-chain/proc_creation_win_malware_3cx_compromise_susp_update/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/3cx-supply-chain/proc_creation_win_malware_3cx_compromise_susp_update/</guid>
      <description>
        
          
            Detects the 3CXDesktopApp updater downloading a known compromised version of the 3CXDesktopApp software
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential CVE-2023-36884 Exploitation Dropped File</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/exploits/cve-2023-36884/file_event_win_exploit_cve_2023_36884_office_windows_html_rce_file_patterns/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/exploits/cve-2023-36884/file_event_win_exploit_cve_2023_36884_office_windows_html_rce_file_patterns/</guid>
      <description>
        
          
            Detects a specific file being created in the recent folder of Office. These files have been seen being dropped during potential exploitations of CVE-2023-36884
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/exploits/cve-2024-3400/paloalto_globalprotect_exploit_cve_2024_3400_command_injection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/exploits/cve-2024-3400/paloalto_globalprotect_exploit_cve_2024_3400_command_injection/</guid>
      <description>
        
          
            Detects potential exploitation attempts of CVE-2024-3400 - an OS command injection in Palo Alto GlobalProtect.
This detection looks for suspicious strings that indicate a potential directory traversal attempt or command injection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Data Stealing Via Chromium Headless Debugging</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_browsers_chromium_headless_debugging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_browsers_chromium_headless_debugging/</guid>
      <description>
        
          
            Detects chromium based browsers starting in headless and debugging mode and pointing to a user profile. This could be a sign of data stealing or remote control
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 1</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_emoji_usage_in_cli_1/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_emoji_usage_in_cli_1/</guid>
      <description>
        
          
            Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 2</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_emoji_usage_in_cli_2/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_emoji_usage_in_cli_2/</guid>
      <description>
        
          
            Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 3</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_emoji_usage_in_cli_3/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_emoji_usage_in_cli_3/</guid>
      <description>
        
          
            Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 4</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_emoji_usage_in_cli_4/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_emoji_usage_in_cli_4/</guid>
      <description>
        
          
            Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Defense Evasion Via Binary Rename</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_binary/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_binary/</guid>
      <description>
        
          
            Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Defense Evasion Via Raw Disk Access By Uncommon Tools</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/raw_access_thread/raw_access_thread_susp_disk_access_using_uncommon_tools/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/raw_access_thread/raw_access_thread_susp_disk_access_using_uncommon_tools/</guid>
      <description>
        
          
            Detects raw disk access using uncommon tools or tools that are located in suspicious locations (heavy filtering is required), which could indicate possible defense evasion attempts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Defense Evasion Via Rename Of Highly Relevant Binaries</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_binary_highly_relevant/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_binary_highly_relevant/</guid>
      <description>
        
          
            Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Defense Evasion Via Right-to-Left Override</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_right_to_left_override/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_right_to_left_override/</guid>
      <description>
        
          
            Detects the presence of the &#34;u202+E&#34; character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence.
This character is used as an obfuscation and masquerading techniques by adversaries to trick users into opening malicious files.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Devil Bait Malware Reconnaissance</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/devil-bait/proc_creation_win_malware_devil_bait_output_redirect/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/devil-bait/proc_creation_win_malware_devil_bait_output_redirect/</guid>
      <description>
        
          
            Detects specific process behavior observed with Devil Bait samples
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Devil Bait Related Indicator</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/devil-bait/file_event_win_malware_devil_bait_script_drop/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/devil-bait/file_event_win_malware_devil_bait_script_drop/</guid>
      <description>
        
          
            Detects the creation of &#34;.xml&#34; and &#34;.txt&#34; files in folders of the &#34;\AppData\Roaming\Microsoft&#34; directory by uncommon processes. This behavior was seen common across different Devil Bait samples and stages as described by the NCSC
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Injection Or Execution Using Tracker.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_tracker/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_tracker/</guid>
      <description>
        
          
            Detects potential DLL injection and execution using &#34;Tracker.exe&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Of DBGCORE.DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_dbgcore/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_dbgcore/</guid>
      <description>
        
          
            Detects DLL sideloading of &#34;dbgcore.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Of DBGHELP.DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_dbghelp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_dbghelp/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;dbghelp.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Of DbgModel.DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_dbgmodel/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_dbgmodel/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;DbgModel.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Of KeyScramblerIE.DLL Via KeyScrambler.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_keyscrambler/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_keyscrambler/</guid>
      <description>
        
          
            Detects potential DLL side loading of &#34;KeyScramblerIE.dll&#34; by &#34;KeyScrambler.exe&#34;.
Various threat actors and malware have been found side loading a masqueraded &#34;KeyScramblerIE.dll&#34; through &#34;KeyScrambler.exe&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Of Libcurl.DLL Via GUP.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_gup_libcurl/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_gup_libcurl/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;libcurl.dll&#34; by the &#34;gup.exe&#34; process from an uncommon location
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Of MpSvc.DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_mpsvc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_mpsvc/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;MpSvc.dll&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Of MsCorSvc.DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_mscorsvc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_mscorsvc/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;mscorsvc.dll&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Of Non-Existent DLLs From System Folders</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_non_existent_dlls/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_non_existent_dlls/</guid>
      <description>
        
          
            Detects loading of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes, potentially indicating phantom DLL hijacking attempts.
Phantom DLL hijacking involves placing malicious DLLs with names of non-existent system binaries in locations where legitimate applications may search for them, leading to execution of the malicious DLLs.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Using Coregen.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_coregen/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_coregen/</guid>
      <description>
        
          
            Detect usage of the &#34;coregen.exe&#34; (Microsoft CoreCLR Native Image Generator) binary to sideload arbitrary DLLs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Via ClassicExplorer32.dll</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_classicexplorer32/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_classicexplorer32/</guid>
      <description>
        
          
            Detects potential DLL sideloading using ClassicExplorer32.dll from the Classic Shell software
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Via comctl32.dll</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_comctl32/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_comctl32/</guid>
      <description>
        
          
            Detects potential DLL sideloading using comctl32.dll to obtain system privileges
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Via DeviceEnroller.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_deviceenroller_dll_sideloading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_deviceenroller_dll_sideloading/</guid>
      <description>
        
          
            Detects the use of the PhoneDeepLink parameter to potentially sideload a DLL file that does not exist. This non-existent DLL file is named &#34;ShellChromeAPI.dll&#34;.
Adversaries can drop their own renamed DLL and execute it via DeviceEnroller.exe using this parameter

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Via JsSchHlp</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_jsschhlp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_jsschhlp/</guid>
      <description>
        
          
            Detects potential DLL sideloading using JUSTSYSTEMS Japanese word processor
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential DLL Sideloading Via VMware Xfer</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vmware_xfer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vmware_xfer/</guid>
      <description>
        
          
            Detects loading of a DLL by the VMware Xfer utility from the non-default directory which may be an attempt to sideload arbitrary DLL
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Dridex Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/malware/dridex/proc_creation_win_malware_dridex/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/malware/dridex/proc_creation_win_malware_dridex/</guid>
      <description>
        
          
            Detects potential Dridex acitvity via specific process patterns
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential EACore.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_eacore/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_eacore/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;EACore.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Edputil.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_edputil/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_edputil/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;edputil.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Emotet Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/malware/emotet/proc_creation_win_malware_emotet/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/malware/emotet/proc_creation_win_malware_emotet/</guid>
      <description>
        
          
            Detects all Emotet like process executions that are not covered by the more generic rules
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Emotet Rundll32 Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/emotet/proc_creation_win_malware_emotet_rundll32_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/emotet/proc_creation_win_malware_emotet_rundll32_execution/</guid>
      <description>
        
          
            Detecting Emotet DLL loading by looking for rundll32.exe processes with command lines ending in ,RunDLL or ,Control_RunDLL
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential EmpireMonkey Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/empiremonkey/proc_creation_win_apt_empiremonkey/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2019/ta/empiremonkey/proc_creation_win_apt_empiremonkey/</guid>
      <description>
        
          
            Detects potential EmpireMonkey APT activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Encoded PowerShell Patterns In CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_encoding_patterns/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_encoding_patterns/</guid>
      <description>
        
          
            Detects specific combinations of encoding methods in PowerShell via the commandline
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Exploitation Attempt From Office Application</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-40444/proc_creation_win_exploit_cve_2021_40444_office_directory_traversal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-40444/proc_creation_win_exploit_cve_2021_40444_office_directory_traversal/</guid>
      <description>
        
          
            Detects Office applications executing a child process that includes directory traversal patterns. This could be an attempt to exploit CVE-2022-30190 (MSDT RCE) or CVE-2021-40444 (MSHTML RCE)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Exploitation of RCE Vulnerability CVE-2025-33053</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-33053/proc_creation_win_exploit_cve_2025_33053/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-33053/proc_creation_win_exploit_cve_2025_33053/</guid>
      <description>
        
          
            Detects potential exploitation of remote code execution vulnerability CVE-2025-33053
which involves unauthorized code execution via WebDAV through external control of file names or paths.
The exploit abuses legitimate utilities like iediagcmd.exe or CustomShellHost.exe  by manipulating
their working directories to point to attacker-controlled WebDAV servers, causing them to execute
malicious executables (like route.exe) from the WebDAV path instead of legitimate system binaries
through Process.Start() search order manipulation.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Image Load</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-33053/image_load_win_exploit_cve_2025_33053/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-33053/image_load_win_exploit_cve_2025_33053/</guid>
      <description>
        
          
            Detects potential exploitation of remote code execution vulnerability CVE-2025-33053
by monitoring suspicious image loads from WebDAV paths. The exploit involves malicious executables from
attacker-controlled WebDAV servers loading the Windows system DLLs like gdi32.dll, netapi32.dll, etc.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Process Access</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-33053/proc_access_win_exploit_cve_2025_33053/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-33053/proc_access_win_exploit_cve_2025_33053/</guid>
      <description>
        
          
            Detects potential exploitation of remote code execution vulnerability CVE-2025-33053
by looking for process access that involves legitimate Windows executables (iediagcmd.exe, CustomShellHost.exe)
accessing suspicious executables hosted on WebDAV shares. This indicates an attacker may be exploiting
Process.Start() search order manipulation to execute malicious code from attacker-controlled WebDAV servers
instead of legitimate system binaries. The vulnerability allows unauthorized code execution through
external control of file names or paths via WebDAV.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Fake Instance Of Hxtsr.EXE Executed</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hxtsr_masquerading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hxtsr_masquerading/</guid>
      <description>
        
          
            HxTsr.exe is a Microsoft compressed executable file called Microsoft Outlook Communications.
HxTsr.exe is part of Outlook apps, because it resides in a hidden &#34;WindowsApps&#34; subfolder of &#34;C:\Program Files&#34;.
Any instances of hxtsr.exe not in this folder may be malware camouflaging itself as HxTsr.exe

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential File Download Via MS-AppInstaller Protocol Handler</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_ms_appinstaller_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_ms_appinstaller_download/</guid>
      <description>
        
          
            Detects usage of the &#34;ms-appinstaller&#34; protocol handler via command line to potentially download arbitrary files via AppInstaller.EXE
The downloaded files are temporarly stored in &#34;:\Users\%username%\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\INetCache\&lt;RANDOM-8-CHAR-DIRECTORY&gt;&#34;

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential File Extension Spoofing Using Right-to-Left Override</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_right_to_left_override_extension_spoofing/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_right_to_left_override_extension_spoofing/</guid>
      <description>
        
          
            Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Goofy Guineapig GoolgeUpdate Process Anomaly</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/goofy-guineapig/proc_creation_win_malware_goofy_guineapig_googleupdate_uncommon_child_instance/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/goofy-guineapig/proc_creation_win_malware_goofy_guineapig_googleupdate_uncommon_child_instance/</guid>
      <description>
        
          
            Detects &#34;GoogleUpdate.exe&#34; spawning a new instance of itself in an uncommon location as seen used by the Goofy Guineapig backdoor
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Goopdate.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_goopdate/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_goopdate/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;goopdate.dll&#34;, a DLL used by googleupdate.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_hidden_dir_index_allocation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_hidden_dir_index_allocation/</guid>
      <description>
        
          
            Detects the creation of hidden file/folder with the &#34;::$index_allocation&#34; stream. Which can be used as a technique to prevent access to folder and files from tooling such as &#34;explorer.exe&#34; and &#34;powershell.exe&#34;

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream - CLI</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_hidden_dir_index_allocation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_hidden_dir_index_allocation/</guid>
      <description>
        
          
            Detects command line containing reference to the &#34;::$index_allocation&#34; stream, which can be used as a technique to prevent access to folders or files from tooling such as &#34;explorer.exe&#34; or &#34;powershell.exe&#34;

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Homoglyph Attack Using Lookalike Characters</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_homoglyph_cyrillic_lookalikes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_homoglyph_cyrillic_lookalikes/</guid>
      <description>
        
          
            Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters.
This is used as an obfuscation and masquerading techniques. Only &#34;perfect&#34; homoglyphs are included; these are characters that
are indistinguishable from ASCII characters and thus may make excellent candidates for homoglyph attack characters.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Homoglyph Attack Using Lookalike Characters in Filename</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_homoglyph_filename/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_homoglyph_filename/</guid>
      <description>
        
          
            Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters.
This is used as an obfuscation and masquerading techniques. Only &#34;perfect&#34; homoglyphs are included; these are characters that
are indistinguishable from ASCII characters and thus may make excellent candidates for homoglyph attack characters.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential In-Memory Execution Using Reflection.Assembly</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_dotnet_assembly_from_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_dotnet_assembly_from_file/</guid>
      <description>
        
          
            Detects usage of &#34;Reflection.Assembly&#34; load functions to dynamically load assemblies in memory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Initial Access via DLL Search Order Hijacking</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_initial_access_dll_search_order_hijacking/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_initial_access_dll_search_order_hijacking/</guid>
      <description>
        
          
            Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious module via DLL search order hijacking.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Iviewers.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_iviewers/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_iviewers/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;iviewers.dll&#34; (OLE/COM Object Interface Viewer)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential JLI.dll Side-Loading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_jli/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_jli/</guid>
      <description>
        
          
            Detects potential DLL side-loading of jli.dll.
JLI.dll has been observed being side-loaded by Java processes by various threat actors, including APT41, XWorm,
and others in order to load malicious payloads in context of legitimate Java processes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Kapeka Decrypted Backdoor Indicator</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/kapeka/file_event_win_malware_kapeka_backdoor_indicators/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/kapeka/file_event_win_malware_kapeka_backdoor_indicators/</guid>
      <description>
        
          
            Detects the presence of a file that is decrypted backdoor binary dropped by the Kapeka Dropper, which disguises itself as a hidden file under a folder named &#34;Microsoft&#34; within &#34;CSIDL_COMMON_APPDATA&#34; or &#34;CSIDL_LOCAL_APPDATA&#34;, depending on the process privileges.
The file, typically 5-6 characters long with a random combination of consonants and vowels followed by a &#34;.wll&#34; extension to pose as a legitimate file to evade detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential LethalHTA Technique Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_lethalhta_technique/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_lethalhta_technique/</guid>
      <description>
        
          
            Detects potential LethalHTA technique where the &#34;mshta.exe&#34; is spawned by an &#34;svchost.exe&#34; process
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Libvlc.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_libvlc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_libvlc/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;libvlc.dll&#34;, a DLL that is legitimately used by &#34;VLC.exe&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Linux Process Code Injection Via DD Utility</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_dd_process_injection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_dd_process_injection/</guid>
      <description>
        
          
            Detects the injection of code by overwriting the memory map of a Linux process using the &#34;dd&#34; Linux command.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential LSASS Process Dump Via Procdump</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_procdump_lsass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_procdump_lsass/</guid>
      <description>
        
          
            Detects potential credential harvesting attempts through LSASS memory dumps using ProcDump.
This rule identifies suspicious command-line patterns that combine memory dump flags (-ma, -mm, -mp) with LSASS-related process markers.
LSASS (Local Security Authority Subsystem Service) contains sensitive authentication data including plaintext passwords, NTLM hashes, and Kerberos tickets in memory.
Attackers commonly dump LSASS memory to extract credentials for lateral movement and privilege escalation.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Malicious AppX Package Installation Attempts</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_mal_appx_names/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_mal_appx_names/</guid>
      <description>
        
          
            Detects potential installation or installation attempts of known malicious appx packages
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Manage-bde.wsf Abuse To Proxy Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_manage_bde/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_manage_bde/</guid>
      <description>
        
          
            Detects potential abuse of the &#34;manage-bde.wsf&#34; script as a LOLBIN to proxy execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Memory Dumping Activity Via LiveKD</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_livekd_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_livekd_execution/</guid>
      <description>
        
          
            Detects execution of LiveKD based on PE metadata or image name
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Meterpreter/CobaltStrike Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_meterpreter_getsystem/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_meterpreter_getsystem/</guid>
      <description>
        
          
            Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service starting
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential MFA Bypass Using Legacy Client Authentication</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_suspicious_signin_bypassing_mfa/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_suspicious_signin_bypassing_mfa/</guid>
      <description>
        
          
            Detects successful authentication from potential clients using legacy authentication via user agent strings. This could be a sign of MFA bypass using a password spray attack.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Mfdetours.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_mfdetours/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_mfdetours/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;mfdetours.dll&#34;. While using &#34;mftrace.exe&#34; it can be abused to attach to an arbitrary process and force load any DLL named &#34;mfdetours.dll&#34; from the current directory of execution.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Mftrace.EXE Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mftrace_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mftrace_child_process/</guid>
      <description>
        
          
            Detects child processes of the &#34;Trace log generation tool for Media Foundation Tools&#34; (Mftrace.exe) which can abused to execute arbitrary binaries.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Mpclient.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_windows_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_windows_defender/</guid>
      <description>
        
          
            Detects potential sideloading of &#34;mpclient.dll&#34; by Windows Defender processes (&#34;MpCmdRun&#34; and &#34;NisSrv&#34;) from their non-default directory.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Mpclient.DLL Sideloading Via Defender Binaries</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mpcmdrun_dll_sideload_defender/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mpcmdrun_dll_sideload_defender/</guid>
      <description>
        
          
            Detects potential sideloading of &#34;mpclient.dll&#34; by Windows Defender processes (&#34;MpCmdRun&#34; and &#34;NisSrv&#34;) from their non-default directory.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Mpclient.DLL Sideloading Via OfflineScannerShell.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_offlinescannershell_mpclient_sideloading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_offlinescannershell_mpclient_sideloading/</guid>
      <description>
        
          
            Detects execution of Windows Defender &#34;OfflineScannerShell.exe&#34; from its non standard directory.
The &#34;OfflineScannerShell.exe&#34; binary is vulnerable to DLL side loading and will load any DLL named &#34;mpclient.dll&#34; from the current working directory.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential MsiExec Masquerading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_masquerading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_masquerading/</guid>
      <description>
        
          
            Detects the execution of msiexec.exe from an uncommon directory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential MuddyWater APT Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/muddywater/proc_creation_win_apt_muddywater_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/muddywater/proc_creation_win_apt_muddywater_activity/</guid>
      <description>
        
          
            Detects potential Muddywater APT activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Notepad&#43;&#43; CVE-2025-49144 Exploitation</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-49144/proc_creation_win_exploit_cve_2025_49144/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-49144/proc_creation_win_exploit_cve_2025_49144/</guid>
      <description>
        
          
            Detects potential exploitation of CVE-2025-49144, a local privilege escalation vulnerability in Notepad++ installers (v8.8.1 and prior) where the installer calls regsvr32.exe without specifying the full path.
This allows an attacker to execute arbitrary code with elevated privileges by placing a malicious regsvr32.exe alongside this Legitimate Notepad++ installer.
The vulnerability is triggered when the installer attempts to register the NppShell.dll file, which is a component of Notepad++.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential NTLM Coercion Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_ntlm_coercion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_ntlm_coercion/</guid>
      <description>
        
          
            Detects possible NTLM coercion via certutil using the &#39;syncwithWU&#39; flag
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Obfuscated Ordinal Call Via Rundll32</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_obfuscated_ordinal_call/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_obfuscated_ordinal_call/</guid>
      <description>
        
          
            Detects execution of &#34;rundll32&#34; with potential obfuscated ordinal calls
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Password Spraying Attempt Using Dsacls.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dsacls_password_spray/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dsacls_password_spray/</guid>
      <description>
        
          
            Detects possible password spraying attempts using Dsacls
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PendingFileRenameOperations Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_pendingfilerenameoperations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_pendingfilerenameoperations/</guid>
      <description>
        
          
            Detect changes to the &#34;PendingFileRenameOperations&#34; registry key from uncommon or suspicious images locations to stage currently used files for rename or deletion after reboot.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Persistence Attempt Via Existing Service Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_service_tamper_for_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_service_tamper_for_persistence/</guid>
      <description>
        
          
            Detects the modification of an existing service in order to execute an arbitrary payload when the service is started or killed as a potential method for persistence.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Pikabot Hollowing Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/pikabot/proc_creation_win_malware_pikabot_rundll32_hollowing/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/pikabot/proc_creation_win_malware_pikabot_rundll32_hollowing/</guid>
      <description>
        
          
            Detects the execution of rundll32 that leads to the invocation of legitimate Windows binaries.
The malware Pikabot has been seen to use this technique for process hollowing through hard-coded Windows binaries

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/pikabot/proc_creation_win_malware_pikabot_combined_commands_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/pikabot/proc_creation_win_malware_pikabot_combined_commands_execution/</guid>
      <description>
        
          
            Detects the execution of concatenated commands via &#34;cmd.exe&#34;. Pikabot often executes a combination of multiple commands via the command handler &#34;cmd /c&#34; in order to download and execute additional payloads.
Commands such as &#34;curl&#34;, &#34;wget&#34; in order to download extra payloads. &#34;ping&#34; and &#34;timeout&#34; are abused to introduce delays in the command execution and &#34;Rundll32&#34; is also used to execute malicious DLL files.
In the observed Pikabot infections, a combination of the commands described above are used to orchestrate the download and execution of malicious DLL files.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PlugX Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/plugx/proc_creation_win_malware_plugx_susp_exe_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/plugx/proc_creation_win_malware_plugx_susp_exe_locations/</guid>
      <description>
        
          
            Detects the execution of an executable that is typically used by PlugX for DLL side loading starting from an uncommon location
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PowerShell Command Line Obfuscation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cmdline_special_characters/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cmdline_special_characters/</guid>
      <description>
        
          
            Detects the PowerShell command lines with special characters
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PowerShell Execution Via DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_powershell_execution_via_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_powershell_execution_via_dll/</guid>
      <description>
        
          
            Detects potential PowerShell execution from a DLL instead of the usual PowerShell process as seen used in PowerShdll.
This detection assumes that PowerShell commands are passed via the CommandLine.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PowerShell Obfuscation Using Alias Cmdlets</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_set_alias/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_set_alias/</guid>
      <description>
        
          
            Detects Set-Alias or New-Alias cmdlet usage. Which can be use as a mean to obfuscate PowerShell scripts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PowerShell Obfuscation Using Character Join</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_alias_obfscuation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_alias_obfscuation/</guid>
      <description>
        
          
            Detects specific techniques often seen used inside of PowerShell scripts to obfscuate Alias creation
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PowerShell Obfuscation Via Reversed Commands</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cmdline_reversed_strings/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cmdline_reversed_strings/</guid>
      <description>
        
          
            Detects the presence of reversed PowerShell commands in the CommandLine. This is often used as a method of obfuscation by attackers
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PowerShell Obfuscation Via WCHAR/CHAR</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_obfuscation_via_utf8/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_obfuscation_via_utf8/</guid>
      <description>
        
          
            Detects suspicious encoded character syntax often used for defense evasion
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential PrintNightmare Exploitation Attempt</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-1675/file_delete_win_exploit_cve_2021_1675_print_nightmare/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-1675/file_delete_win_exploit_cve_2021_1675_print_nightmare/</guid>
      <description>
        
          
            Detect DLL deletions from Spooler Service driver folder. This might be a potential exploitation attempt of CVE-2021-1675
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Privilege Escalation Attempt Via .Exe.Local Technique</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_system32_local_folder_privilege_escalation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_system32_local_folder_privilege_escalation/</guid>
      <description>
        
          
            Detects potential privilege escalation attempt via the creation of the &#34;*.Exe.Local&#34; folder inside the &#34;System32&#34; directory in order to sideload &#34;comctl32.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Privilege Escalation via Service Permissions Weakness</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_privilege_escalation_via_service_key/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_privilege_escalation_via_service_key/</guid>
      <description>
        
          
            Detect modification of services configuration (ImagePath, FailureCommand and ServiceDLL) in registry by processes with Medium integrity level
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Process Execution Proxy Via CL_Invocation.ps1</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cl_invocation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cl_invocation/</guid>
      <description>
        
          
            Detects calls to &#34;SyncInvoke&#34; that is part of the &#34;CL_Invocation.ps1&#34; script to proxy execution using &#34;System.Diagnostics.Process&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Process Hollowing Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_tampering/proc_tampering_susp_process_hollowing/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_tampering/proc_tampering_susp_process_hollowing/</guid>
      <description>
        
          
            Detects when a memory process image does not match the disk image, indicative of process hollowing.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Process Injection Via Msra.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msra_process_injection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msra_process_injection/</guid>
      <description>
        
          
            Detects potential process injection via Microsoft Remote Asssistance (Msra.exe) by looking at suspicious child processes spawned from the aforementioned process. It has been a target used by many threat actors and used for discovery and persistence tactics
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Provisioning Registry Key Abuse For Binary Proxy Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_provlaunch_provisioning_command/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_provlaunch_provisioning_command/</guid>
      <description>
        
          
            Detects potential abuse of the provisioning registry key for indirect command execution through &#34;Provlaunch.exe&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Provisioning Registry Key Abuse For Binary Proxy Execution - REG</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_provisioning_command_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_provisioning_command_abuse/</guid>
      <description>
        
          
            Detects potential abuse of the provisioning registry key for indirect command execution through &#34;Provlaunch.exe&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Provlaunch.EXE Binary Proxy Execution Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_provlaunch_potential_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_provlaunch_potential_abuse/</guid>
      <description>
        
          
            Detects child processes of &#34;provlaunch.exe&#34; which might indicate potential abuse to proxy execution.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Python DLL SideLoading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_python/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_python/</guid>
      <description>
        
          
            Detects potential DLL sideloading of Python DLL files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Qakbot Rundll32 Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_rundll32_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_rundll32_execution/</guid>
      <description>
        
          
            Detects specific process tree behavior of a &#34;rundll32&#34; execution often linked with potential Qakbot activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Ransomware or Unauthorized MBR Tampering Via Bcdedit.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bcdedit_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bcdedit_susp_execution/</guid>
      <description>
        
          
            Detects potential malicious and unauthorized usage of bcdedit.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Raspberry Robin Aclui Dll SideLoading</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/raspberry-robin/image_load_malware_raspberry_robin_side_load_aclui_oleview/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/raspberry-robin/image_load_malware_raspberry_robin_side_load_aclui_oleview/</guid>
      <description>
        
          
            Detects potential sideloading of malicious &#34;aclui.dll&#34; by OleView.This behavior was observed in Raspberry-Robin variants reported by chekpoint research on Feburary 2024.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Raspberry Robin CPL Execution Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/raspberry-robin/proc_creation_win_malware_raspberry_robin_rundll32_shell32_cpl_exection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/malware/raspberry-robin/proc_creation_win_malware_raspberry_robin_rundll32_shell32_cpl_exection/</guid>
      <description>
        
          
            Detects the execution of a &#34;.CPL&#34; file located in the user temp directory via the Shell32 DLL &#34;Control_RunDLL&#34; export function.
This behavior was observed in multiple Raspberry-Robin variants.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Rcdll.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_rcdll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_rcdll/</guid>
      <description>
        
          
            Detects potential DLL sideloading of rcdll.dll
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential ReflectDebugger Content Execution Via WerFault.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_werfault_reflect_debugger_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_werfault_reflect_debugger_exec/</guid>
      <description>
        
          
            Detects execution of &#34;WerFault.exe&#34; with the &#34;-pr&#34; commandline flag that is used to run files stored in the ReflectDebugger key which could be used to store the path to the malware in order to masquerade the execution flow
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Register_App.Vbs LOLScript Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolscript_register_app/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolscript_register_app/</guid>
      <description>
        
          
            Detects potential abuse of the &#34;register_app.vbs&#34; script that is part of the Windows SDK. The script offers the capability to register new VSS/VDS Provider as a COM+ application. Attackers can use this to install malicious DLLs for persistence and execution.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Registry Persistence Attempt Via DbgManagedDebugger</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dbgmanageddebugger_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_dbgmanageddebugger_persistence/</guid>
      <description>
        
          
            Detects the addition of the &#34;Debugger&#34; value to the &#34;DbgManagedDebugger&#34; key in order to achieve persistence. Which will get invoked when an application crashes
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Regsvr32 Commandline Flag Anomaly</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_flags_anomaly/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_flags_anomaly/</guid>
      <description>
        
          
            Detects a potential command line flag anomaly related to &#34;regsvr32&#34; in which the &#34;/i&#34; flag is used without the &#34;/n&#34; which should be uncommon.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Remote SquiblyTwo Technique Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_squiblytwo_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_squiblytwo_bypass/</guid>
      <description>
        
          
            Detects potential execution of the SquiblyTwo technique that leverages Windows Management Instrumentation (WMI)
to execute malicious code remotely. This technique bypasses application whitelisting by using wmic.exe to process
malicious XSL (eXtensible Stylesheet Language) scripts that can contain embedded JScript or VBScript.
The attack typically works by fetching XSL content from a remote source (using HTTP/HTTPS) and executing it
with full trust privileges directly in memory, avoiding disk-based detection mechanisms. This is a common
LOLBin (Living Off The Land Binary) technique used for defense evasion and code execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential RemoteFXvGPUDisablement.EXE Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_classic/posh_pc_remotefxvgpudisablement_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_classic/posh_pc_remotefxvgpudisablement_abuse/</guid>
      <description>
        
          
            Detects PowerShell module creation where the module Contents are set to &#34;function Get-VMRemoteFXPhysicalVideoAdapter&#34;. This could be a sign of potential abuse of  the &#34;RemoteFXvGPUDisablement.exe&#34; binary which is known to be vulnerable to module load-order hijacking.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_remotefxvgpudisablement_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_remotefxvgpudisablement_abuse/</guid>
      <description>
        
          
            Detects PowerShell module creation where the module Contents are set to &#34;function Get-VMRemoteFXPhysicalVideoAdapter&#34;. This could be a sign of potential abuse of the &#34;RemoteFXvGPUDisablement.exe&#34; binary which is known to be vulnerable to module load-order hijacking.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell ScriptBlock</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_remotefxvgpudisablement_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_remotefxvgpudisablement_abuse/</guid>
      <description>
        
          
            Detects PowerShell module creation where the module Contents are set to &#34;function Get-VMRemoteFXPhysicalVideoAdapter&#34;. This could be a sign of potential abuse of the &#34;RemoteFXvGPUDisablement.exe&#34; binary which is known to be vulnerable to module load-order hijacking.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential RjvPlatform.DLL Sideloading From Default Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_rjvplatform_default_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_rjvplatform_default_location/</guid>
      <description>
        
          
            Detects loading of &#34;RjvPlatform.dll&#34; by the &#34;SystemResetPlatform.exe&#34; binary which can be abused as a method of DLL side loading since the &#34;$SysReset&#34; directory isn&#39;t created by default.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential RjvPlatform.DLL Sideloading From Non-Default Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_rjvplatform_non_default_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_rjvplatform_non_default_location/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;RjvPlatform.dll&#34; by &#34;SystemResetPlatform.exe&#34; located in a non-default location.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential RoboForm.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_robform/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_robform/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;roboform.dll&#34;, a DLL used by RoboForm Password Manager
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Rundll32 Execution With DLL Stored In ADS</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_ads_stored_dll_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_ads_stored_dll_execution/</guid>
      <description>
        
          
            Detects execution of rundll32 where the DLL being called is stored in an Alternate Data Stream (ADS).
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Script Proxy Execution Via CL_Mutexverifiers.ps1</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cl_mutexverifiers/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_cl_mutexverifiers/</guid>
      <description>
        
          
            Detects the use of the Microsoft signed script &#34;CL_mutexverifiers&#34; to proxy the execution of additional PowerShell script commands
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Secure Deletion with SDelete</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_sdelete_potential_secure_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_sdelete_potential_secure_deletion/</guid>
      <description>
        
          
            Detects files that have extensions commonly seen while SDelete is used to wipe files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential ShellDispatch.DLL Functionality Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_shelldispatch_potential_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_shelldispatch_potential_abuse/</guid>
      <description>
        
          
            Detects potential &#34;ShellDispatch.dll&#34; functionality abuse to execute arbitrary binaries via &#34;ShellExecute&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential ShellDispatch.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_shelldispatch/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_shelldispatch/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;ShellDispatch.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Signing Bypass Via Windows Developer Features</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_systemsettingsadminflows_turn_on_dev_features/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_systemsettingsadminflows_turn_on_dev_features/</guid>
      <description>
        
          
            Detects when a user enable developer features such as &#34;Developer Mode&#34; or &#34;Application Sideloading&#34;. Which allows the user to install untrusted packages.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Signing Bypass Via Windows Developer Features - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_turn_on_dev_features/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_turn_on_dev_features/</guid>
      <description>
        
          
            Detects when the enablement of developer features such as &#34;Developer Mode&#34; or &#34;Application Sideloading&#34;. Which allows the user to install untrusted packages.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential SmadHook.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_smadhook/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_smadhook/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;SmadHook.dll&#34;, a DLL used by SmadAV antivirus
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential SolidPDFCreator.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_solidpdfcreator/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_solidpdfcreator/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;SolidPDFCreator.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Activity Using SeCEdit</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/</guid>
      <description>
        
          
            Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious BPF Activity - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/builtin/lnx_potential_susp_ebpf_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/builtin/lnx_potential_susp_ebpf_activity/</guid>
      <description>
        
          
            Detects the presence of &#34;bpf_probe_write_user&#34; BPF helper-generated warning messages. Which could be a sign of suspicious eBPF activity on the system.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Child Process Of 3CXDesktopApp</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/3cx-supply-chain/proc_creation_win_malware_3cx_compromise_susp_children/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/3cx-supply-chain/proc_creation_win_malware_3cx_compromise_susp_children/</guid>
      <description>
        
          
            Detects potential suspicious child processes of &#34;3CXDesktopApp.exe&#34;. Which could be related to the 3CXDesktopApp supply chain compromise
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Mofcomp Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mofcomp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mofcomp_execution/</guid>
      <description>
        
          
            Detects execution of the &#34;mofcomp&#34; utility as a child of a suspicious shell or script running utility or by having a suspicious path in the commandline.
The &#34;mofcomp&#34; utility parses a file containing MOF statements and adds the classes and class instances defined in the file to the WMI repository.
Attackers abuse this utility to install malicious MOF scripts

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Windows Feature Enabled</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_enable_susp_windows_optional_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_enable_susp_windows_optional_feature/</guid>
      <description>
        
          
            Detects usage of the built-in PowerShell cmdlet &#34;Enable-WindowsOptionalFeature&#34; used as a Deployment Image Servicing and Management tool.
Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Windows Feature Enabled - ProcCreation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_enable_susp_windows_optional_feature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_enable_susp_windows_optional_feature/</guid>
      <description>
        
          
            Detects usage of the built-in PowerShell cmdlet &#34;Enable-WindowsOptionalFeature&#34; used as a Deployment Image Servicing and Management tool.
Similar to DISM.exe, this cmdlet is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Suspicious Winget Package Installation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_winget_susp_package_source/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_winget_susp_package_source/</guid>
      <description>
        
          
            Detects potential suspicious winget package installation from a suspicious source.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential SysInternals ProcDump Evasion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_procdump_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_procdump_evasion/</guid>
      <description>
        
          
            Detects uses of the SysInternals ProcDump utility in which ProcDump or its output get renamed, or a dump file is moved or copied to a different name
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential System DLL Sideloading From Non System Locations</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_from_non_system_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_from_non_system_location/</guid>
      <description>
        
          
            Detects DLL sideloading of DLLs usually located in system locations (System32, SysWOW64, etc.).
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Vcruntime140 DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vcruntime140/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vcruntime140/</guid>
      <description>
        
          
            Detects potential DLL sideloading of vcruntime140.dll, a common C++ runtime library.
Threat actors have been observed using DLL sideloading techniques to load malicious payloads under the guise of legitimate applications such as SqlWriter, SqlDumper etc.
Notably, APT29 has been documented leveraging WinELOADER to sideload vcruntime140.dll for executing malicious code.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Vivaldi_elf.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vivaldi_elf/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vivaldi_elf/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;vivaldi_elf.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Waveedit.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_waveedit/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_waveedit/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;waveedit.dll&#34;, which is part of the Nero WaveEditor audio editing software.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Wazuh Security Platform DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_wazuh/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_wazuh/</guid>
      <description>
        
          
            Detects potential DLL side loading of DLLs that are part of the Wazuh security platform
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential WerFault ReflectDebugger Registry Value Abuse</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_reflectdebugger/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_reflectdebugger/</guid>
      <description>
        
          
            Detects potential WerFault &#34;ReflectDebugger&#34; registry value abuse for persistence.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential Winnti Dropper Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_redmimicry_winnti_filedrop/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_redmimicry_winnti_filedrop/</guid>
      <description>
        
          
            Detects files dropped by Winnti as described in RedMimicry Winnti playbook
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potential WWlib.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_wwlib/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_wwlib/</guid>
      <description>
        
          
            Detects potential DLL sideloading of &#34;wwlib.dll&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Over Permissive Permissions Granted Using Dsacls.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dsacls_abuse_permissions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dsacls_abuse_permissions/</guid>
      <description>
        
          
            Detects usage of Dsacls to grant over permissive permissions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious ASP.NET Compilation Via AspNetCompiler</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_aspnet_compiler_susp_paths/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_aspnet_compiler_susp_paths/</guid>
      <description>
        
          
            Detects execution of &#34;aspnet_compiler.exe&#34; with potentially suspicious paths for compilation.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Cabinet File Expansion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_expand_cabinet_files/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_expand_cabinet_files/</guid>
      <description>
        
          
            Detects the expansion or decompression of cabinet files from potentially suspicious or uncommon locations, e.g. seen in Iranian MeteorExpress related attacks
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Child Process Of ClickOnce Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dfsvc_suspicious_child_processes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dfsvc_suspicious_child_processes/</guid>
      <description>
        
          
            Detects potentially suspicious child processes of a ClickOnce deployment application
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Child Process Of DiskShadow.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_diskshadow_child_process_susp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_diskshadow_child_process_susp/</guid>
      <description>
        
          
            Detects potentially suspicious child processes of &#34;Diskshadow.exe&#34;. This could be an attempt to bypass parent/child relationship detection or application whitelisting rules.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Child Process of KeyScrambler.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_keyscrambler_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_keyscrambler_susp_child_process/</guid>
      <description>
        
          
            Detects potentially suspicious child processes of KeyScrambler.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Child Process Of Regsvr32</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_child_process/</guid>
      <description>
        
          
            Detects potentially suspicious child processes of &#34;regsvr32.exe&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Child Process Of VsCode</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vscode_child_processes_anomalies/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vscode_child_processes_anomalies/</guid>
      <description>
        
          
            Detects uncommon or suspicious child processes spawning from a VsCode &#34;code.exe&#34; process. This could indicate an attempt of persistence via VsCode tasks or terminal profiles.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Child Processes Spawned by ConHost</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_susp_winshell_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_susp_winshell_child_process/</guid>
      <description>
        
          
            Detects suspicious child processes related to Windows Shell utilities spawned by `conhost.exe`, which could indicate malicious activity using trusted system components.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious CMD Shell Output Redirect</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_redirection_susp_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_redirection_susp_folder/</guid>
      <description>
        
          
            Detects inline Windows shell commands redirecting output via the &#34;&gt;&#34; symbol to a suspicious location.
This technique is sometimes used by malicious actors in order to redirect the output of reconnaissance commands such as &#34;hostname&#34; and &#34;dir&#34; to files for future exfiltration.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious DLL Registered Via Odbcconf.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_register_dll_regsvr_susp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_register_dll_regsvr_susp/</guid>
      <description>
        
          
            Detects execution of &#34;odbcconf&#34; with the &#34;REGSVR&#34; action where the DLL in question doesn&#39;t contain a &#34;.dll&#34; extension. Which is often used as a method to evade defenses.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious DMP/HDMP File Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_dump_file_susp_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_dump_file_susp_creation/</guid>
      <description>
        
          
            Detects the creation of a file with the &#34;.dmp&#34;/&#34;.hdmp&#34; extension by a shell or scripting application such as &#34;cmd&#34;, &#34;powershell&#34;, etc. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It&#39;s best to determine the source of the crash.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Execution From Parent Process In Public Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_execution_from_public_folder_as_parent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_execution_from_public_folder_as_parent/</guid>
      <description>
        
          
            Detects a potentially suspicious execution of a parent process located in the &#34;\Users\Public&#34; folder executing a child process containing references to shell or scripting binaries and commandlines.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Execution From Tmp Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_susp_execution_tmp_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_susp_execution_tmp_folder/</guid>
      <description>
        
          
            Detects a potentially suspicious execution of a process located in the &#39;/tmp/&#39; folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regasm_regsvcs_uncommon_location_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regasm_regsvcs_uncommon_location_execution/</guid>
      <description>
        
          
            Detects potentially suspicious execution of the Regasm/Regsvcs utilities from a potentially suspicious location
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Execution Of Regasm/Regsvcs With Uncommon Extension</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regasm_regsvcs_uncommon_extension_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regasm_regsvcs_uncommon_extension_execution/</guid>
      <description>
        
          
            Detects potentially suspicious execution of the Regasm/Regsvcs utilities with an uncommon extension.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious File Download From ZIP TLD</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_zip_tld_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_zip_tld_download/</guid>
      <description>
        
          
            Detects the download of a file with a potentially suspicious extension from a .zip top level domain.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious GoogleUpdate Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_googleupdate_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_googleupdate_susp_child_process/</guid>
      <description>
        
          
            Detects potentially suspicious child processes of &#34;GoogleUpdate.exe&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Office Document Executed From Trusted Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_exec_from_trusted_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_exec_from_trusted_locations/</guid>
      <description>
        
          
            Detects the execution of an Office application that points to a document that is located in a trusted location. Attackers often used this to avoid macro security and execute their malicious code.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Ping/Copy Command Combination</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_ping_copy_combined_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_ping_copy_combined_execution/</guid>
      <description>
        
          
            Detects uncommon and potentially suspicious one-liner command containing both &#34;ping&#34; and &#34;copy&#34; at the same time, which is usually used by malware.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Regsvr32 HTTP IP Pattern</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_http_ip_pattern/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_http_ip_pattern/</guid>
      <description>
        
          
            Detects regsvr32 execution to download and install DLLs located remotely where the address is an IP address.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Regsvr32 HTTP/FTP Pattern</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_network_pattern/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_network_pattern/</guid>
      <description>
        
          
            Detects regsvr32 execution to download/install/register new DLLs that are hosted on Web or FTP servers.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Rundll32 Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_activity/</guid>
      <description>
        
          
            Detects suspicious execution of rundll32, with specific calls to some DLLs with known LOLBIN functionalities
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Rundll32.EXE Execution of UDL File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_udl_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_udl_exec/</guid>
      <description>
        
          
            Detects the execution of rundll32.exe with the oledb32.dll library to open a UDL file.
Threat actors can abuse this technique as a phishing vector to capture authentication credentials or other sensitive data.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Self Extraction Directive File Created</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_executable_detected/file_executable_detected_win_susp_embeded_sed_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_executable_detected/file_executable_detected_win_susp_embeded_sed_file/</guid>
      <description>
        
          
            Detects the creation of a binary file with the &#34;.sed&#34; extension. The &#34;.sed&#34; extension stand for Self Extraction Directive files.
These files are used by the &#34;iexpress.exe&#34; utility in order to create self extracting packages.
Attackers were seen abusing this utility and creating PE files with embedded &#34;.sed&#34; entries.
Usually &#34;.sed&#34; files are simple ini files and not PE binaries.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Windows App Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_appx_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_appx_execution/</guid>
      <description>
        
          
            Detects potentially suspicious child process of applications launched from inside the WindowsApps directory. This could be a sign of a rogue &#34;.appx&#34; package installation/execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Potentially Suspicious Wuauclt Network Connection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_wuauclt_network_connection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_wuauclt_network_connection/</guid>
      <description>
        
          
            Detects the use of the Windows Update Client binary (wuauclt.exe) to proxy execute code and making network connections.
One could easily make the DLL spawn a new process and inject to it to proxy the network connection and bypass this rule.

          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Base64 Encoded FromBase64String Cmdlet</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_frombase64string/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_frombase64string/</guid>
      <description>
        
          
            Detects usage of a base64 encoded &#34;FromBase64String&#34; cmdlet in a process command line
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Base64 Encoded Invoke Keyword</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_invoke/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_invoke/</guid>
      <description>
        
          
            Detects UTF-8 and UTF-16 Base64 encoded powershell &#39;Invoke-&#39; calls
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Base64 Encoded Reflective Assembly Load</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_reflection_assembly_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_reflection_assembly_load/</guid>
      <description>
        
          
            Detects base64 encoded .NET reflective loading of Assembly
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Base64 Encoded WMI Classes</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_wmi_classes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_wmi_classes/</guid>
      <description>
        
          
            Detects calls to base64 encoded WMI class such as &#34;Win32_ShadowCopy&#34;, &#34;Win32_ScheduledJob&#34;, etc.
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Console History Logs Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_powershell_command_history/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_powershell_command_history/</guid>
      <description>
        
          
            Detects the deletion of the PowerShell console History logs which may indicate an attempt to destroy forensic evidence
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Core DLL Loaded Via Office Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_office_powershell_dll_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_office_powershell_dll_load/</guid>
      <description>
        
          
            Detects PowerShell core DLL being loaded by an Office Product
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Decompress Commands</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_decompress_commands/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_decompress_commands/</guid>
      <description>
        
          
            A General detection for specific decompress commands in PowerShell logs. This could be an adversary decompressing files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Deleted Mounted Share</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_mounted_share_deletion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_mounted_share_deletion/</guid>
      <description>
        
          
            Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation
          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Detect Virtualization Environment</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_detect_vm_env/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_detect_vm_env/</guid>
      <description>
        
          
            Adversaries may employ various system checks to detect and avoid virtualization and analysis environments.
This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox

          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Executed From Headless ConHost Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_headless_powershell/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_headless_powershell/</guid>
      <description>
        
          
            Detects the use of powershell commands from headless ConHost window.
The &#34;--headless&#34; flag hides the windows from the user upon execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Logging Disabled Via Registry Key Tampering</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_powershell_logging_disabled/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_powershell_logging_disabled/</guid>
      <description>
        
          
            Detects changes to the registry for the currently logged-in user. In order to disable PowerShell module logging, script block logging or transcription and script execution logging
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell MSI Install via WindowsInstaller COM From Remote Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_comobject_msi_remote/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_comobject_msi_remote/</guid>
      <description>
        
          
            Detects the execution of PowerShell commands that attempt to install MSI packages via the
Windows Installer COM object (`WindowsInstaller.Installer`) hosted remotely.
This could be indication of malicious software deployment or lateral movement attempts using Windows Installer functionality.
And the usage of WindowsInstaller COM object rather than msiexec could be an attempt to bypass the detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Script Change Permission Via Set-Acl</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_set_acl/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_set_acl/</guid>
      <description>
        
          
            Detects PowerShell execution to set the ACL of a file or a folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell Set-Acl On Windows Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_set_acl_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_set_acl_susp_location/</guid>
      <description>
        
          
            Detects PowerShell scripts to set the ACL to a file in the Windows folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell ShellCode</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_shellcode_b64/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_shellcode_b64/</guid>
      <description>
        
          
            Detects Base64 encoded Shellcode
          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Store File In Alternate Data Stream</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_store_file_in_alternate_data_stream/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_store_file_in_alternate_data_stream/</guid>
      <description>
        
          
            Storing files in Alternate Data Stream (ADS) similar to Astaroth malware.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Timestomp</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_timestomp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_timestomp/</guid>
      <description>
        
          
            Adversaries may modify file time attributes to hide new or changes to existing files.
Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Powershell Token Obfuscation - Process Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_token_obfuscation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_token_obfuscation/</guid>
      <description>
        
          
            Detects TOKEN OBFUSCATION technique from Invoke-Obfuscation
          
          
        
      </description>
    </item>
    
    <item>
      <title>PowerShell WMI Win32_Product Install MSI</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_win32_product_install_msi/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_win32_product_install_msi/</guid>
      <description>
        
          
            Detects the execution of an MSI file using PowerShell and the WMI Win32_Product class
          
          
        
      </description>
    </item>
    
    <item>
      <title>Prefetch File Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_prefetch/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_prefetch/</guid>
      <description>
        
          
            Detects the deletion of a prefetch file which may indicate an attempt to destroy forensic evidence
          
          
        
      </description>
    </item>
    
    <item>
      <title>PrintBrm ZIP Creation of Extraction</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_printbrm/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_printbrm/</guid>
      <description>
        
          
            Detects the execution of the LOLBIN PrintBrm.exe, which can be used to create or extract ZIP files. PrintBrm.exe should not be run on a normal workstation.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Privileged Account Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_privileged_account_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_privileged_account_creation/</guid>
      <description>
        
          
            Detects when a new admin is created.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Procdump Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_procdump/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_procdump/</guid>
      <description>
        
          
            Detects usage of the SysInternals Procdump utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>Process Access via TrolleyExpress Exclusion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_citrix_trolleyexpress_procdump/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_citrix_trolleyexpress_procdump/</guid>
      <description>
        
          
            Detects a possible process memory dump that uses the white-listed Citrix TrolleyExpress.exe filename as a way to dump the lsass process memory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Process Creation Using Sysnative Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_sysnative/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_sysnative/</guid>
      <description>
        
          
            Detects process creation events that use the Sysnative folder (common for CobaltStrike spawns)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Process Deletion of Its Own Executable</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_own_image/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_own_image/</guid>
      <description>
        
          
            Detects the deletion of a process&#39;s executable by itself. This is usually not possible without workarounds and may be used by malware to hide its traces.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Process Execution From A Potentially Suspicious Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_execution_path/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_execution_path/</guid>
      <description>
        
          
            Detects a potentially suspicious execution from an uncommon folder.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Process Launched Without Image Name</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_no_image_name/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_no_image_name/</guid>
      <description>
        
          
            Detect the use of processes with no name (&#34;.exe&#34;), which can be used to evade Image-based detections.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Process Memory Dump Via Comsvcs.DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_process_dump_via_comsvcs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_process_dump_via_comsvcs/</guid>
      <description>
        
          
            Detects a process memory dump via &#34;comsvcs.dll&#34; using rundll32, covering multiple different techniques (ordinal, minidump function, etc.)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Process Memory Dump Via Dotnet-Dump</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dotnetdump_memory_dump/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dotnetdump_memory_dump/</guid>
      <description>
        
          
            Detects the execution of &#34;dotnet-dump&#34; with the &#34;collect&#34; flag. The execution could indicate potential process dumping of critical processes such as LSASS.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Process Proxy Execution Via Squirrel.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_squirrel_proxy_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_squirrel_proxy_execution/</guid>
      <description>
        
          
            Detects the usage of the &#34;Squirrel.exe&#34; binary to execute arbitrary processes. This binary is part of multiple Electron based software installations (Slack, Teams, Discord, etc.)

          
          
        
      </description>
    </item>
    
    <item>
      <title>Program Executed Using Proxy/Local Command Via SSH.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ssh_proxy_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_ssh_proxy_execution/</guid>
      <description>
        
          
            Detect usage of the &#34;ssh.exe&#34; binary as a proxy to launch other programs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Proxy Execution via Vshadow</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vshadow_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vshadow_exec/</guid>
      <description>
        
          
            Detects the invocation of vshadow.exe with the -exec parameter that executes a specified script or command after the shadow copies are created but before the VShadow tool exits.
VShadow is a command-line tool that you can use to create and manage volume shadow copies. While legitimate backup or administrative scripts may use this flag,
attackers can leverage this parameter to proxy the execution of malware.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Proxy Execution Via Wuauclt.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wuauclt_dll_loading/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wuauclt_dll_loading/</guid>
      <description>
        
          
            Detects the use of the Windows Update Client binary (wuauclt.exe) for proxy execution.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Ps.exe Renamed SysInternals Tool</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/ta/dragonfly/proc_creation_win_apt_ta17_293a_ps/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2017/ta/dragonfly/proc_creation_win_apt_ta17_293a_ps/</guid>
      <description>
        
          
            Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report
          
          
        
      </description>
    </item>
    
    <item>
      <title>PSScriptPolicyTest Creation By Uncommon Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_ps_script_policy_test_creation_by_uncommon_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_ps_script_policy_test_creation_by_uncommon_process/</guid>
      <description>
        
          
            Detects the creation of the &#34;PSScriptPolicyTest&#34; PowerShell script by an uncommon process. This file is usually generated by Microsoft Powershell to test against Applocker.
          
          
        
      </description>
    </item>
    
    <item>
      <title>PUA - AdvancedRun Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_advancedrun/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_advancedrun/</guid>
      <description>
        
          
            Detects the execution of AdvancedRun utility
          
          
        
      </description>
    </item>
    
    <item>
      <title>PUA - AdvancedRun Suspicious Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_advancedrun_priv_user/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_advancedrun_priv_user/</guid>
      <description>
        
          
            Detects the execution of AdvancedRun utility in the context of the TrustedInstaller, SYSTEM, Local Service or Network Service accounts
          
          
        
      </description>
    </item>
    
    <item>
      <title>PUA - DefenderCheck Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_defendercheck/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_defendercheck/</guid>
      <description>
        
          
            Detects the use of DefenderCheck, a tool to evaluate the signatures used in Microsoft Defender. It can be used to figure out the strings / byte chains used in Microsoft Defender to detect a tool and thus used for AV evasion.
          
          
        
      </description>
    </item>
    
    <item>
      <title>PUA - Potential PE Metadata Tamper Using Rcedit</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_rcedit_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_rcedit_execution/</guid>
      <description>
        
          
            Detects the use of rcedit to potentially alter executable PE metadata properties, which could conceal efforts to rename system utilities for defense evasion.
          
          
        
      </description>
    </item>
    
    <item>
      <title>PUA - Process Hacker Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_process_hacker/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_process_hacker/</guid>
      <description>
        
          
            Detects the execution of Process Hacker based on binary metadata information (Image, Hash, Imphash, etc).
Process Hacker is a tool to view and manipulate processes, kernel options and other low level options.
Threat actors abused older vulnerable versions to manipulate system processes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>PUA - System Informer Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_system_informer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_system_informer/</guid>
      <description>
        
          
            Detects the execution of System Informer, a task manager tool to view and manipulate processes, kernel options and other low level operations
          
          
        
      </description>
    </item>
    
    <item>
      <title>Publisher Attachment File Dropped In Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_office_publisher_files_in_susp_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_office_publisher_files_in_susp_locations/</guid>
      <description>
        
          
            Detects creation of files with the &#34;.pub&#34; extension in suspicious or uncommon locations. This could be a sign of attackers abusing Publisher documents
          
          
        
      </description>
    </item>
    
    <item>
      <title>Pubprn.vbs Proxy Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pubprn/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_pubprn/</guid>
      <description>
        
          
            Detects the use of the &#39;Pubprn.vbs&#39; Microsoft signed script to execute commands.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Python Image Load By Non-Python Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_python_image_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_python_image_load/</guid>
      <description>
        
          
            Detects the image load of &#34;Python Core&#34; by a non-Python process. This might be indicative of a execution of executable that has been bundled from Python code.
Various tools like Py2Exe, PyInstaller, and cx_Freeze are used to bundle Python code into standalone executables.
Threat actors often use these tools to bundle malicious Python scripts into executables, sometimes to obfuscate the code or to bypass security measures.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Python One-Liners with Base64 Decoding</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_python_base64_encoded_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_python_base64_encoded_execution/</guid>
      <description>
        
          
            Detects Python one-liners that use base64 decoding functions in command line executions.
Malicious scripts or attackers often use python one-liners to decode and execute base64-encoded payloads, which is a common technique for obfuscation and evasion.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Python One-Liners with Base64 Decoding - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_python_base64_encoded_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_python_base64_encoded_execution/</guid>
      <description>
        
          
            Detects the use of Python&#39;s base64 decoding functions in command line executions on Linux systems.
Malicious scripts often use python one-liners to decode and execute base64-encoded payloads, which is a common technique for obfuscation and evasion.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Qakbot Regsvr32 Calc Pattern</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_regsvr32_calc_pattern/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_regsvr32_calc_pattern/</guid>
      <description>
        
          
            Detects a specific command line of &#34;regsvr32&#34; where the &#34;calc&#34; keyword is used in conjunction with the &#34;/s&#34; flag. This behavior is often seen used by Qakbot
          
          
        
      </description>
    </item>
    
    <item>
      <title>Qakbot Rundll32 Exports Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_rundll32_exports/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_rundll32_exports/</guid>
      <description>
        
          
            Detects specific process tree behavior of a &#34;rundll32&#34; execution with exports linked with Qakbot activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Qakbot Rundll32 Fake DLL Extension Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_rundll32_fake_dll_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/qakbot/proc_creation_win_malware_qakbot_rundll32_fake_dll_execution/</guid>
      <description>
        
          
            Detects specific process tree behavior of a &#34;rundll32&#34; execution where the DLL doesn&#39;t have the &#34;.dll&#34; extension. This is often linked with potential Qakbot activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Rare Remote Thread Creation By Uncommon Source Image</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_susp_relevant_source_image/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_susp_relevant_source_image/</guid>
      <description>
        
          
            Detects uncommon processes creating remote threads.
          
          
        
      </description>
    </item>
    
    <item>
      <title>RedSun - Conhost.exe Spawned by TieringEngineService.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/proc_creation_win_redsun_conhost_via_tiering_engine/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/proc_creation_win_redsun_conhost_via_tiering_engine/</guid>
      <description>
        
          
            Detects two stages of the RedSun post-exploitation process chain that deliver a SYSTEM-level shell to the attacker&#39;s interactive session.
Observed process chain
  services.exe
    → TieringEngineService.exe
      → conhost.exe             (SYSTEM, CommandLine: bare path, no arguments)
        → cmd.exe / shell       (SYSTEM, TerminalSessionId = attacker&#39;s session)

Stage 1 — TieringEngineService.exe spawns argument-less conhost.exe:
  After winning the oplock + Cloud Files mount point race, the malicious TieringEngineService.exe (RedSun.exe copied to System32, started via CoCreateInstance
  / services.exe) detects it is NT AUTHORITY\SYSTEM and calls LaunchConsoleInSessionId().
  This opens \\.\pipe\REDSUN, reads the attacker&#39;s session ID, duplicates the SYSTEM token, re-stamps it with that session ID via SetTokenInformation(TokenSessionId), then
  calls CreateProcessAsUser to spawn conhost.exe with no arguments.

Stage 2 — Shell spawned from rogue conhost.exe (EDR sources with GrandParentImage):
  The rogue SYSTEM conhost.exe spawns a shell (cmd.exe, PowerShell, etc.) as SYSTEM in the attacker&#39;s interactive session.
  On EDR sources that expose GrandParentImage, the full three-level chain (TieringEngineService.exe → conhost.exe → shell) can be matched directly.
  The legitimate TieringEngineService.exe is a headless COM server that is unlikely to spawn conhost.exe under normal conditions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RedSun - Named Pipe Created</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/pipe_created_win_exploit_redsun_named_pipe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/pipe_created_win_exploit_redsun_named_pipe/</guid>
      <description>
        
          
            Detects the creation of a named pipe with the hardcoded name &#34;REDSUN&#34;.
The RedSun exploit tool uses a pipe with this name for synchronisation and command communication between its components during the Cloud Files API + oplock-based AV bypass and privilege escalation chain.
RedSun creates the pipe as \\??\pipe\REDSUN.
The pipe server listens for the token-duplicated elevated process to connect and respond, completing the privilege escalation from user to SYSTEM.
Presence of this pipe name indicates active or recent RedSun execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RedSun - TieringEngineService.exe Detected as EICAR Test File</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/win_defender_exploit_redsun_tiering_engine_detected_as_eicar/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/win_defender_exploit_redsun_tiering_engine_detected_as_eicar/</guid>
      <description>
        
          
            Detects Windows Defender (EventID 1119 - Remediation Action Failed) flagging TieringEngineService.exe
dropped in a characteristic RS-{GUID} temporary directory, or the RedSun.exe process itself being present.
This covers the staging pattern used by RedSun, a Cloud Files API and opportunistic lock (oplock) based
AV bypass/privilege escalation tool.

RedSun works as follows:
  1. Registers a Cloud Files sync root and creates a Cloud Files placeholder for TieringEngineService.exe under %TEMP%\RS-{GUID}\
  2. The placeholder file carries EICAR test file content (Virus:DOS/EICAR_Test_File) to reliably trigger
     a Defender scan and remediation attempt
  3. Requests a batch oplock (FSCTL_REQUEST_BATCH_OPLOCK) on the placeholder file
  4. When Defender attempts to scan/quarantine the file, the oplock triggers - holding the file open
  5. During the oplock break window, RedSun swaps the mount point (junction) to redirect
     \\?\C:\Windows\System32 to the attacker-controlled temp path
  6. This races the AV/OS into executing the malicious TieringEngineService.exe with elevated privileges

          
          
        
      </description>
    </item>
    
    <item>
      <title>RedSun - TieringEngineService.exe Staged in RS-Prefixed Temp Dir</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/file_event_win_exploit_redsun_indicators/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/exploits/redsun/file_event_win_exploit_redsun_indicators/</guid>
      <description>
        
          
            Detects the creation of a file named TieringEngineService.exe inside a directory whose path contains the RS- prefix characteristic
of RedSun&#39;s staging directory (e.g. %TEMP%\RS-{GUID}\TieringEngineService.exe).
RedSun registers a Cloud Files sync root under this RS-prefixed path and drops a masqueraded placeholder there as part of its oplock-based AV bypass and privilege escalation chain.

The RS-{GUID} directory name is generated by RedSun itself and has no legitimate system usage,
making the combination of this path prefix and the TieringEngineService.exe filename a highly
specific indicator of RedSun activity.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RegAsm.EXE Execution Without CommandLine Flags or Files</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regasm_no_flag_or_dll_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regasm_no_flag_or_dll_execution/</guid>
      <description>
        
          
            Detects the execution of &#34;RegAsm.exe&#34; without a commandline flag or file, which might indicate potential process injection activity.
Usually &#34;RegAsm.exe&#34; should point to a dedicated DLL file or call the help with the &#34;/?&#34; flag.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RegAsm.EXE Initiating Network Connection To Public IP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_regasm_network_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_regasm_network_activity/</guid>
      <description>
        
          
            Detects &#34;RegAsm.exe&#34; initiating a network connection to public IP adresses
          
          
        
      </description>
    </item>
    
    <item>
      <title>REGISTER_APP.VBS Proxy Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_register_app/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_register_app/</guid>
      <description>
        
          
            Detects the use of a Microsoft signed script &#39;REGISTER_APP.VBS&#39; to register a VSS/VDS Provider as a COM+ application.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Modification for OCI DLL Redirection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_potential_oci_dll_redirection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_potential_oci_dll_redirection/</guid>
      <description>
        
          
            Detects registry modifications related to &#39;OracleOciLib&#39; and &#39;OracleOciLibPath&#39; under &#39;MSDTC&#39; settings.
Threat actors may modify these registry keys to redirect the loading of &#39;oci.dll&#39; to a malicious DLL, facilitating phantom DLL hijacking via the MSDTC service.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry Persistence via Service in Safe Mode</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode/</guid>
      <description>
        
          
            Detects the modification of the registry to allow a driver or service to persist in Safe Mode.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Registry-Free Process Scope COR_PROFILER</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_cor_profiler/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_cor_profiler/</guid>
      <description>
        
          
            Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR.
The COR_PROFILER is a .NET Framework feature which allows developers to specify an unmanaged (or external of .NET) profiling DLL to be loaded into each .NET process that loads the Common Language Runtime (CLR).
These profiliers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR.
(Citation: Microsoft Profiling Mar 2017)
(Citation: Microsoft COR_PROFILER Feb 2013)

          
          
        
      </description>
    </item>
    
    <item>
      <title>Regsvr32 DLL Execution With Suspicious File Extension</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_extensions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_extensions/</guid>
      <description>
        
          
            Detects the execution of REGSVR32.exe with DLL files masquerading as other files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Regsvr32 DLL Execution With Uncommon Extension</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_uncommon_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_uncommon_extension/</guid>
      <description>
        
          
            Detects a &#34;regsvr32&#34; execution where the DLL doesn&#39;t contain a common file extension.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Regsvr32 Execution From Highly Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_exec_path_2/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_exec_path_2/</guid>
      <description>
        
          
            Detects execution of regsvr32 where the DLL is located in a highly suspicious locations
          
          
        
      </description>
    </item>
    
    <item>
      <title>Regsvr32 Execution From Potential Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_exec_path_1/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_exec_path_1/</guid>
      <description>
        
          
            Detects execution of regsvr32 where the DLL is located in a potentially suspicious location.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Access Tool - NetSupport Execution From Unusual Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_netsupport_susp_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_netsupport_susp_exec/</guid>
      <description>
        
          
            Detects execution of client32.exe (NetSupport RAT) from an unusual location (outside of &#39;C:\Program Files&#39;)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Access Tool - Renamed MeshAgent Execution - MacOS</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_remote_access_tools_renamed_meshagent_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_remote_access_tools_renamed_meshagent_execution/</guid>
      <description>
        
          
            Detects the execution of a renamed instance of the Remote Monitoring and Management (RMM) tool, MeshAgent.
RMM tools such as MeshAgent are commonly utilized by IT administrators for legitimate remote support and system management.
However, malicious actors may exploit these tools by renaming them to bypass detection mechanisms, enabling unauthorized access and control over compromised systems.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Access Tool - Renamed MeshAgent Execution - Windows</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_renamed_meshagent_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_renamed_meshagent_execution/</guid>
      <description>
        
          
            Detects the execution of a renamed instance of the Remote Monitoring and Management (RMM) tool, MeshAgent.
RMM tools such as MeshAgent are commonly utilized by IT administrators for legitimate remote support and system management.
However, malicious actors may exploit these tools by renaming them to bypass detection mechanisms, enabling unauthorized access and control over compromised systems.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Access Tool - RURAT Execution From Unusual Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_rurat_non_default_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_rurat_non_default_location/</guid>
      <description>
        
          
            Detects execution of Remote Utilities RAT (RURAT) from an unusual location (outside of &#39;C:\Program Files&#39;)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote AppX Package Downloaded from File Sharing or CDN Domain</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_appx_downloaded_from_file_sharing_domains/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_appx_downloaded_from_file_sharing_domains/</guid>
      <description>
        
          
            Detects an appx package that was added to the pipeline of the &#34;to be processed&#34; packages which was downloaded from a file sharing or CDN domain.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote CHM File Download/Execution Via HH.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hh_chm_remote_download_or_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hh_chm_remote_download_or_execution/</guid>
      <description>
        
          
            Detects the usage of &#34;hh.exe&#34; to execute/download remotely hosted &#34;.chm&#34; files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Code Execute via Winrm.vbs</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_winrm_execution_via_scripting_api_winrm_vbs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_winrm_execution_via_scripting_api_winrm_vbs/</guid>
      <description>
        
          
            Detects an attempt to execute code or create service on remote host via winrm.vbs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote File Download Via Findstr.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_findstr_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_findstr_download/</guid>
      <description>
        
          
            Detects execution of &#34;findstr&#34; with specific flags and a remote share path. This specific set of CLI flags would allow &#34;findstr&#34; to download the content of the file located on the remote share as described in the LOLBAS entry.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Thread Creation By Uncommon Source Image</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_susp_uncommon_source_image/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_susp_uncommon_source_image/</guid>
      <description>
        
          
            Detects uncommon processes creating remote threads.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Thread Creation In Uncommon Target Image</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_susp_uncommon_target_image/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_susp_uncommon_target_image/</guid>
      <description>
        
          
            Detects uncommon target processes for remote thread creation
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Thread Creation Ttdinject.exe Proxy</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_ttdinjec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_ttdinjec/</guid>
      <description>
        
          
            Detects a remote thread creation of Ttdinject.exe used as proxy
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote Thread Creation Via PowerShell In Uncommon Target</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_powershell_susp_targets/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_powershell_susp_targets/</guid>
      <description>
        
          
            Detects the creation of a remote thread from a Powershell process in an uncommon target process
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remote XSL Execution Via Msxsl.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msxsl_remote_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msxsl_remote_execution/</guid>
      <description>
        
          
            Detects the execution of the &#34;msxsl&#34; binary with an &#34;http&#34; keyword in the command line. This might indicate a potential remote execution of XSL files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>RemoteFXvGPUDisablement Abuse Via AtomicTestHarnesses</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_remotefxvgpudisablement_abuse/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_remotefxvgpudisablement_abuse/</guid>
      <description>
        
          
            Detects calls to the AtomicTestHarnesses &#34;Invoke-ATHRemoteFXvGPUDisablementCommand&#34; which is designed to abuse the &#34;RemoteFXvGPUDisablement.exe&#34; binary to run custom PowerShell code via module load-order hijacking.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remotely Hosted HTA File Executed Via Mshta.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_http/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_http/</guid>
      <description>
        
          
            Detects execution of the &#34;mshta&#34; utility with an argument containing the &#34;http&#34; keyword, which could indicate that an attacker is executing a remotely hosted malicious hta file
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remove Exported Mailbox from Exchange Webserver</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/msexchange/win_exchange_proxyshell_remove_mailbox_export/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/msexchange/win_exchange_proxyshell_remove_mailbox_export/</guid>
      <description>
        
          
            Detects removal of an exported Exchange mailbox which could be to cover tracks from ProxyShell exploit
          
          
        
      </description>
    </item>
    
    <item>
      <title>Remove Scheduled Cron Task/Job</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_crontab_removal/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_crontab_removal/</guid>
      <description>
        
          
            Detects usage of the &#39;crontab&#39; utility to remove the current crontab.
This is a common occurrence where cryptocurrency miners compete against each other by removing traces of other miners to hijack the maximum amount of resources possible

          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed AutoHotkey.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_autohotkey/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_autohotkey/</guid>
      <description>
        
          
            Detects execution of a renamed autohotkey.exe binary based on PE metadata fields
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed AutoIt Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_autoit/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_autoit/</guid>
      <description>
        
          
            Detects the execution of a renamed AutoIt2.exe or AutoIt3.exe.
AutoIt is a scripting language and automation tool for Windows systems. While primarily used for legitimate automation tasks, it can be misused in cyber attacks.
Attackers can leverage AutoIt to create and distribute malware, including keyloggers, spyware, and botnets. A renamed AutoIt executable is particularly suspicious.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed BrowserCore.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_browsercore/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_browsercore/</guid>
      <description>
        
          
            Detects process creation with a renamed BrowserCore.exe (used to extract Azure tokens)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed CreateDump Utility Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_createdump/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_createdump/</guid>
      <description>
        
          
            Detects uses of a renamed legitimate createdump.exe LOLOBIN utility to dump process memory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed CURL.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_curl/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_curl/</guid>
      <description>
        
          
            Detects the execution of a renamed &#34;CURL.exe&#34; binary based on the PE metadata fields
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed FTP.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_ftp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_ftp/</guid>
      <description>
        
          
            Detects the execution of a renamed &#34;ftp.exe&#34; binary based on the PE metadata fields
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Jusched.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_jusched/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_jusched/</guid>
      <description>
        
          
            Detects the execution of a renamed &#34;jusched.exe&#34; as seen used by the cobalt group
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Mavinject.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_mavinject/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_mavinject/</guid>
      <description>
        
          
            Detects the execution of a renamed version of the &#34;Mavinject&#34; process. Which can be abused to perform process injection using the &#34;/INJECTRUNNING&#34; flag
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed MegaSync Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_megasync/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_megasync/</guid>
      <description>
        
          
            Detects the execution of a renamed MegaSync.exe as seen used by ransomware families like Nefilim, Sodinokibi, Pysa, and Conti.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Microsoft Teams Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_msteams/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_msteams/</guid>
      <description>
        
          
            Detects the execution of a renamed Microsoft Teams binary.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Msdt.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_msdt/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_msdt/</guid>
      <description>
        
          
            Detects the execution of a renamed &#34;Msdt.exe&#34; binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed NetSupport RAT Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_netsupport_rat/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_netsupport_rat/</guid>
      <description>
        
          
            Detects the execution of a renamed &#34;client32.exe&#34; (NetSupport RAT) via Imphash, Product and OriginalFileName strings
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed NirCmd.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_nircmd/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_nircmd/</guid>
      <description>
        
          
            Detects the execution of a renamed &#34;NirCmd.exe&#34; binary based on the PE metadata fields.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Office Binary Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_office_processes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_office_processes/</guid>
      <description>
        
          
            Detects the execution of a renamed office binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed PAExec Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_paexec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_paexec/</guid>
      <description>
        
          
            Detects execution of renamed version of PAExec. Often used by attackers
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed PingCastle Binary Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_pingcastle/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_pingcastle/</guid>
      <description>
        
          
            Detects the execution of a renamed &#34;PingCastle&#34; binary based on the PE metadata fields.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Plink Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_plink/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_plink/</guid>
      <description>
        
          
            Detects the execution of a renamed version of the Plink binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Powershell Under Powershell Channel</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_classic/posh_pc_renamed_powershell/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_classic/posh_pc_renamed_powershell/</guid>
      <description>
        
          
            Detects a renamed Powershell execution, which is a common technique used to circumvent security controls and bypass detection logic that&#39;s dependent on process names and process paths.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed ProcDump Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_sysinternals_procdump/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_sysinternals_procdump/</guid>
      <description>
        
          
            Detects the execution of a renamed ProcDump executable.
This often done by attackers or malware in order to evade defensive mechanisms.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Remote Utilities RAT (RURAT) Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_rurat/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_rurat/</guid>
      <description>
        
          
            Detects execution of renamed Remote Utilities (RURAT) via Product PE header field
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Schtasks Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_schtasks_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_schtasks_execution/</guid>
      <description>
        
          
            Detects the execution of renamed schtasks.exe binary, which is a legitimate Windows utility used for scheduling tasks.
One of the very common persistence techniques is schedule malicious tasks using schtasks.exe.
Since, it is heavily abused, it is also heavily monitored by security products. To evade detection, threat actors may rename the schtasks.exe binary to schedule their malicious tasks.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed Vmnat.exe Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_vmnat/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_vmnat/</guid>
      <description>
        
          
            Detects renamed vmnat.exe or portable version that can be used for DLL side-loading
          
          
        
      </description>
    </item>
    
    <item>
      <title>Renamed ZOHO Dctask64 Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_dctask64/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_dctask64/</guid>
      <description>
        
          
            Detects a renamed &#34;dctask64.exe&#34; execution, a signed binary by ZOHO Corporation part of ManageEngine Endpoint Central.
This binary can be abused for DLL injection, arbitrary command and process execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Response File Execution Via Odbcconf.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_response_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_response_file/</guid>
      <description>
        
          
            Detects execution of &#34;odbcconf&#34; with the &#34;-f&#34; flag in order to load a response file which might contain a malicious action.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Rhadamanthys Stealer Module Launch Via Rundll32.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/rhadamanthys/proc_creation_win_malware_rhadamanthys_stealer_dll_launch/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/malware/rhadamanthys/proc_creation_win_malware_rhadamanthys_stealer_dll_launch/</guid>
      <description>
        
          
            Detects the use of Rundll32 to launch an NSIS module that serves as the main stealer capability of Rhadamanthys infostealer, as observed in reports and samples in early 2023
          
          
        
      </description>
    </item>
    
    <item>
      <title>Roles Activated Too Frequently</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_role_frequent_activation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_role_frequent_activation/</guid>
      <description>
        
          
            Identifies when the same privilege role has multiple activations by the same user.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Roles Activation Doesn&#39;t Require MFA</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_role_no_mfa_required/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_role_no_mfa_required/</guid>
      <description>
        
          
            Identifies when a privilege role can be activated without performing mfa.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Roles Are Not Being Used</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_role_not_used/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_role_not_used/</guid>
      <description>
        
          
            Identifies when a user has been assigned a privilege role and are not using that role.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Roles Assigned Outside PIM</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_role_assigned_outside_of_pim/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_role_assigned_outside_of_pim/</guid>
      <description>
        
          
            Identifies when a privilege role assignment has taken place outside of PIM and may indicate an attack.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Root Account Enable Via Dsenableroot</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_dsenableroot_enable_root_account/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_dsenableroot_enable_root_account/</guid>
      <description>
        
          
            Detects attempts to enable the root account via &#34;dsenableroot&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Run PowerShell Script from ADS</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_run_script_from_ads/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_run_script_from_ads/</guid>
      <description>
        
          
            Detects PowerShell script execution from Alternate Data Stream (ADS)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Rundll32 Execution With Uncommon DLL Extension</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_uncommon_dll_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_uncommon_dll_extension/</guid>
      <description>
        
          
            Detects the execution of rundll32 with a command line that doesn&#39;t contain a common extension
          
          
        
      </description>
    </item>
    
    <item>
      <title>Rundll32 Execution Without CommandLine Parameters</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_no_params/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_no_params/</guid>
      <description>
        
          
            Detects suspicious start of rundll32.exe without any parameters as found in CobaltStrike beacon activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>Rundll32 InstallScreenSaver Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_installscreensaver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_installscreensaver/</guid>
      <description>
        
          
            An attacker may execute an application as a SCR File using rundll32.exe desk.cpl,InstallScreenSaver
          
          
        
      </description>
    </item>
    
    <item>
      <title>Rundll32 Internet Connection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_rundll32_net_connections/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_rundll32_net_connections/</guid>
      <description>
        
          
            Detects a rundll32 that communicates with public IP addresses
          
          
        
      </description>
    </item>
    
    <item>
      <title>Rundll32 Spawned Via Explorer.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_parent_explorer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_parent_explorer/</guid>
      <description>
        
          
            Detects execution of &#34;rundll32.exe&#34; with a parent process of Explorer.exe. This has been observed by variants of Raspberry Robin, as first reported by Red Canary.
          
          
        
      </description>
    </item>
    
    <item>
      <title>RunDLL32 Spawning Explorer</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_spawn_explorer/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_spawn_explorer/</guid>
      <description>
        
          
            Detects RunDLL32.exe spawning explorer.exe as child, which is very uncommon, often observes Gamarue spawning the explorer.exe process in an unusual way
          
          
        
      </description>
    </item>
    
    <item>
      <title>Rundll32 UNC Path Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_unc_path/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_unc_path/</guid>
      <description>
        
          
            Detects rundll32 execution where the DLL is located on a remote location (share)
          
          
        
      </description>
    </item>
    
    <item>
      <title>RunMRU Registry Key Deletion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_runmru/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_runmru/</guid>
      <description>
        
          
            Detects deletion of the RunMRU registry key, which stores the history of commands executed via the Run dialog.
In the clickfix techniques, the phishing lures instruct users to open a run dialog through (Win + R) and execute malicious commands.
Adversaries may delete this key to cover their tracks after executing commands.

          
          
        
      </description>
    </item>
    
    <item>
      <title>RunMRU Registry Key Deletion - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_runmru/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_runmru/</guid>
      <description>
        
          
            Detects attempts to delete the RunMRU registry key, which stores the history of commands executed via the run dialog.
In the clickfix techniques, the phishing lures instruct users to open a run dialog through (Win + R) and execute malicious commands.
Adversaries may delete this key to cover their tracks after executing commands.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Scheduled Task Creation Masquerading as System Processes</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_system_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_system_process/</guid>
      <description>
        
          
            Detects the creation of scheduled tasks that involve system processes, which may indicate malicious actors masquerading as or abusing these processes to execute payloads or maintain persistence.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Scheduled Task Creation with Curl and PowerShell Execution Combo</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_curl_and_powershell_combo/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_curl_and_powershell_combo/</guid>
      <description>
        
          
            Detects the creation of a scheduled task using schtasks.exe, potentially in combination with curl for downloading payloads and PowerShell for executing them.
This facilitates executing malicious payloads or connecting with C&amp;C server persistently without dropping the malware sample on the host.

          
          
        
      </description>
    </item>
    
    <item>
      <title>SCR File Write Event</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_new_scr_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_new_scr_file/</guid>
      <description>
        
          
            Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an &#34;.SCR&#34; file using &#34;rundll32.exe desk.cpl,InstallScreenSaver&#34; for example.
          
          
        
      </description>
    </item>
    
    <item>
      <title>ScreenConnect - SlashAndGrab Exploitation Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/slashandgrab-exploitation-in-wild/file_event_win_apt_unknown_exploitation_indicators/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/slashandgrab-exploitation-in-wild/file_event_win_apt_unknown_exploitation_indicators/</guid>
      <description>
        
          
            Detects indicators of exploitation by threat actors during exploitation of the &#34;SlashAndGrab&#34; vulnerability related to ScreenConnect as reported Team Huntress

          
          
        
      </description>
    </item>
    
    <item>
      <title>ScreenSaver Registry Key Set</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_scr_file_executed_by_rundll32/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_scr_file_executed_by_rundll32/</guid>
      <description>
        
          
            Detects registry key established after masqueraded .scr file execution using Rundll32 through desk.cpl
          
          
        
      </description>
    </item>
    
    <item>
      <title>Scripting/CommandLine Process Spawned Regsvr32</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_parent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_susp_parent/</guid>
      <description>
        
          
            Detects various command line and scripting engines/processes such as &#34;PowerShell&#34;, &#34;Wscript&#34;, &#34;Cmd&#34;, etc. spawning a &#34;regsvr32&#34; instance.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sdiagnhost Calling Suspicious Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sdiagnhost_susp_child/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sdiagnhost_susp_child/</guid>
      <description>
        
          
            Detects sdiagnhost.exe calling a suspicious child process (e.g. used in exploits for Follina / CVE-2022-30190)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iexpress_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iexpress_susp_execution/</guid>
      <description>
        
          
            Detects the use of iexpress.exe to create binaries via Self Extraction Directive (SED) files located in potentially suspicious locations.
This behavior has been observed in-the-wild by different threat actors.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Self Extraction Directive File Created In Potentially Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sed_file_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sed_file_creation/</guid>
      <description>
        
          
            Detects the creation of Self Extraction Directive files (.sed) in a potentially suspicious location.
These files are used by the &#34;iexpress.exe&#34; utility in order to create self extracting packages.
Attackers were seen abusing this utility and creating PE files with embedded &#34;.sed&#34; entries.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Sensitive File Dump Via Print.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_print_dump_sensitive_files/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_print_dump_sensitive_files/</guid>
      <description>
        
          
            Detects the abuse of the Print.exe utility for credential harvesting which involves using Print.Exe to copy sensitive files such as ntds.dit, SAM, SECURITY, or SYSTEM from the Windows directory in order to extract credentials, locally or remotely.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Server Side Template Injection Strings</title>
      <link>https://detection.fyi/sigmahq/sigma/web/webserver_generic/web_ssti_in_access_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/web/webserver_generic/web_ssti_in_access_logs/</guid>
      <description>
        
          
            Detects SSTI attempts sent via GET requests in access logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service DACL Abuse To Hide Services Via Sc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_sdset_hide_sevices/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_sdset_hide_sevices/</guid>
      <description>
        
          
            Detects usage of the &#34;sc.exe&#34; utility adding a new service with special permission seen used by threat actors which makes the service hidden and unremovable.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Service Registry Key Read Access Request</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_registry_permissions_weakness_check/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_registry_permissions_weakness_check/</guid>
      <description>
        
          
            Detects &#34;read access&#34; requests on the services registry key.
Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services.
Adversaries may use flaws in the permissions for Registry keys related to services to redirect from the originally specified executable to one that they control, in order to launch their own code when a service starts.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Service Registry Permissions Weakness Check</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_get_acl_service/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_get_acl_service/</guid>
      <description>
        
          
            Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services.
Adversaries may use flaws in the permissions for registry to redirect from the originally specified executable to one that they control, in order to launch their own code at Service start.
Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services

          
          
        
      </description>
    </item>
    
    <item>
      <title>Service Security Descriptor Tampering Via Sc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_sdset_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sc_sdset_modification/</guid>
      <description>
        
          
            Detection of sc.exe utility adding a new service with special permission which hides that service.
          
          
        
      </description>
    </item>
    
    <item>
      <title>SES Identity Has Been Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_delete_identity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_delete_identity/</guid>
      <description>
        
          
            Detects an instance of an SES identity being deleted via the &#34;DeleteIdentity&#34; event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
          
          
        
      </description>
    </item>
    
    <item>
      <title>Set Suspicious Files as System Files Using Attrib.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_attrib_system_susp_paths/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_attrib_system_susp_paths/</guid>
      <description>
        
          
            Detects the usage of attrib with the &#34;+s&#34; option to set scripts or executables located in suspicious locations as system files to hide them from users and make them unable to be deleted with simple rights. The rule limits the search to specific extensions and directories to avoid FPs

          
          
        
      </description>
    </item>
    
    <item>
      <title>Setup16.EXE Execution With Custom .Lst File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_setup16_custom_lst_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_setup16_custom_lst_execution/</guid>
      <description>
        
          
            Detects the execution of &#34;Setup16.EXE&#34; and old installation utility with a custom &#34;.lst&#34; file.
These &#34;.lst&#34; file can contain references to external program that &#34;Setup16.EXE&#34; will execute.
Attackers and adversaries might leverage this as a living of the land utility.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Shell32 DLL Execution in Suspicious Directory</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_shell32_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_shell32_susp_execution/</guid>
      <description>
        
          
            Detects shell32.dll executing a DLL in a suspicious directory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sign-in Failure Due to Conditional Access Requirements Not Met</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_conditional_access_failure/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_conditional_access_failure/</guid>
      <description>
        
          
            Define a baseline threshold for failed sign-ins due to Conditional Access failures
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sign-ins by Unknown Devices</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_sign_ins_from_unknown_devices/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_sign_ins_from_unknown_devices/</guid>
      <description>
        
          
            Monitor and alert for Sign-ins by unknown devices from non-Trusted locations.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sign-ins from Non-Compliant Devices</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_sign_ins_from_noncompliant_devices/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_sign_ins_from_noncompliant_devices/</guid>
      <description>
        
          
            Monitor and alert for sign-ins where the device was non-compliant.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Silenttrinity Stager Msbuild Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_silenttrinity_stager_msbuild_activity/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_silenttrinity_stager_msbuild_activity/</guid>
      <description>
        
          
            Detects a possible remote connections to Silenttrinity c2
          
          
        
      </description>
    </item>
    
    <item>
      <title>Small Sieve Malware CommandLine Indicator</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/small-sieve/proc_creation_win_malware_small_sieve_cli_arg/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/small-sieve/proc_creation_win_malware_small_sieve_cli_arg/</guid>
      <description>
        
          
            Detects specific command line argument being passed to a binary as seen being used by the malware Small Sieve.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Small Sieve Malware File Indicator Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/small-sieve/file_event_win_malware_small_sieve_evasion_typo/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/small-sieve/file_event_win_malware_small_sieve_evasion_typo/</guid>
      <description>
        
          
            Detects filename indicators that contain a specific typo seen used by the Small Sieve malware.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sofacy Trojan Loader Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt28/proc_creation_win_apt_sofacy/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt28/proc_creation_win_apt_sofacy/</guid>
      <description>
        
          
            Detects Trojan loader activity as used by APT28
          
          
        
      </description>
    </item>
    
    <item>
      <title>Space After Filename - macOS</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_space_after_filename/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_space_after_filename/</guid>
      <description>
        
          
            Detects attempts to masquerade as legitimate files by adding a space to the end of the filename.
          
          
        
      </description>
    </item>
    
    <item>
      <title>SQL Client Tools PowerShell Session Detection</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mssql_sqltoolsps_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mssql_sqltoolsps_susp_execution/</guid>
      <description>
        
          
            This rule detects execution of a PowerShell code through the sqltoolsps.exe utility, which is included in the standard set of utilities supplied with the Microsoft SQL Server Management studio.
Script blocks are not logged in this case, so this utility helps to bypass protection mechanisms based on the analysis of these logs.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Stale Accounts In A Privileged Role</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_account_stale/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_account_stale/</guid>
      <description>
        
          
            Identifies when an account hasn&#39;t signed in during the past n number of days.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Start of NT Virtual DOS Machine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_16bit_application/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_16bit_application/</guid>
      <description>
        
          
            Ntvdm.exe allows the execution of 16-bit Windows applications on 32-bit Windows operating systems, as well as the execution of both 16-bit and 32-bit DOS applications
          
          
        
      </description>
    </item>
    
    <item>
      <title>Steganography Extract Files with Steghide</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_steghide_extract_steganography/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_steghide_extract_steganography/</guid>
      <description>
        
          
            Detects extraction of files with usage of steghide binary, the adversaries may use this technique to prevent the detection of hidden information.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Steganography Hide Files with Steghide</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_steghide_embed_steganography/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_steghide_embed_steganography/</guid>
      <description>
        
          
            Detects embedding of files with usage of steghide binary, the adversaries may use this technique to prevent the detection of hidden information.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Steganography Hide Zip Information in Picture File</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_hidden_zip_files_steganography/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_hidden_zip_files_steganography/</guid>
      <description>
        
          
            Detects appending of zip file to image
          
          
        
      </description>
    </item>
    
    <item>
      <title>Steganography Unzip Hidden Information From Picture File</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_unzip_hidden_zip_files_steganography/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_unzip_hidden_zip_files_steganography/</guid>
      <description>
        
          
            Detects extracting of zip file from image file
          
          
        
      </description>
    </item>
    
    <item>
      <title>Successful Authentications From Countries You Do Not Operate Out Of</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_authentications_from_countries_you_do_not_operate_out_of/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_authentications_from_countries_you_do_not_operate_out_of/</guid>
      <description>
        
          
            Detect successful authentications from countries you do not operate out of.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspect Svchost Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_svchost_execution_with_no_cli_flags/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_svchost_execution_with_no_cli_flags/</guid>
      <description>
        
          
            It is extremely abnormal for svchost.exe to spawn without any CLI arguments and is normally observed when a malicious process spawns the process and injects code into the process memory space.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Advpack Call Via Rundll32.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_advpack_obfuscated_ordinal_call/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_advpack_obfuscated_ordinal_call/</guid>
      <description>
        
          
            Detects execution of &#34;rundll32&#34; calling &#34;advpack.dll&#34; with potential obfuscated ordinal calls in order to leverage the &#34;RegisterOCX&#34; function
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious AgentExecutor PowerShell Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_agentexecutor_susp_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_agentexecutor_susp_usage/</guid>
      <description>
        
          
            Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy &#34;Bypass&#34; or any binary named &#34;powershell.exe&#34; located in the path provided by 6th positional argument
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious BitLocker Access Agent Update Utility Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_baaupdate_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_baaupdate_susp_child_process/</guid>
      <description>
        
          
            Detects the execution of the BitLocker Access Agent Update Utility (baaupdate.exe) which is not a common parent process for other processes.
Suspicious child processes spawned by baaupdate.exe could indicate an attempt at lateral movement via BitLocker DCOM &amp; COM Hijacking.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Browser Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_suspicious_browser/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_suspicious_browser/</guid>
      <description>
        
          
            Indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Cabinet File Execution Via Msdt.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msdt_susp_cab_options/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msdt_susp_cab_options/</guid>
      <description>
        
          
            Detects execution of msdt.exe using the &#34;cab&#34; flag which could indicates suspicious diagcab files with embedded answer files leveraging CVE-2022-30190
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Calculator Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_calc_uncommon_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_calc_uncommon_exec/</guid>
      <description>
        
          
            Detects suspicious use of &#39;calc.exe&#39; with command line parameters or in a suspicious directory, which is likely caused by some PoC or detection evasion.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Child Process Created as System</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_child_process_as_system_/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_child_process_as_system_/</guid>
      <description>
        
          
            Detection of child processes spawned with SYSTEM privileges by parents with LOCAL SERVICE or NETWORK SERVICE accounts
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Child Process of AspNetCompiler</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_aspnet_compiler_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_aspnet_compiler_susp_child_process/</guid>
      <description>
        
          
            Detects potentially suspicious child processes of &#34;aspnet_compiler.exe&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Child Process Of BgInfo.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bginfo_suspicious_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bginfo_suspicious_child_process/</guid>
      <description>
        
          
            Detects suspicious child processes of &#34;BgInfo.exe&#34; which could be a sign of potential abuse of the binary to proxy execution via external VBScript
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Child Process Of Wermgr.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wermgr_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wermgr_susp_child_process/</guid>
      <description>
        
          
            Detects suspicious Windows Error Reporting manager (wermgr.exe) child process
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious CodePage Switch Via CHCP</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_chcp_codepage_switch/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_chcp_codepage_switch/</guid>
      <description>
        
          
            Detects a code page switch in command line or batch scripts to a rare language
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Computer Account Name Change CVE-2021-42287</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-42287/win_security_samaccountname_spoofing_cve_2021_42287/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-42287/win_security_samaccountname_spoofing_cve_2021_42287/</guid>
      <description>
        
          
            Detects the renaming of an existing computer account to a account name that doesn&#39;t contain a $ symbol as seen in attacks against CVE-2021-42287
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Computer Machine Password by PowerShell</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_susp_reset_computermachinepassword/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_susp_reset_computermachinepassword/</guid>
      <description>
        
          
            The Reset-ComputerMachinePassword cmdlet changes the computer account password that the computers use to authenticate to the domain controllers in the domain.
You can use it to reset the password of the local computer.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Control Panel DLL Load</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_control_dll_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_control_dll_load/</guid>
      <description>
        
          
            Detects suspicious Rundll32 execution from control.exe as used by Equation Group and Exploit Kits
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Copy From or To System Directory</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_copy_system_dir/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_copy_system_dir/</guid>
      <description>
        
          
            Detects a suspicious copy operation that tries to copy a program from system (System32, SysWOW64, WinSxS) directories to another on disk.
Often used to move LOLBINs such as &#39;certutil&#39; or &#39;desktopimgdownldr&#39; to a different location with a different name in order to bypass detections based on locations.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Creation with Colorcpl</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_colorcpl/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_colorcpl/</guid>
      <description>
        
          
            Once executed, colorcpl.exe will copy the arbitrary file to c:\windows\system32\spool\drivers\color\
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Csi.exe Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_csi_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_csi_execution/</guid>
      <description>
        
          
            Csi.exe is a signed binary from Microsoft that comes with Visual Studio and provides C# interactive capabilities. It can be used to run C# code from a file passed as a parameter in command line. Early version of this utility provided with Microsoft “Roslyn” Community Technology Preview was named &#39;rcsi.exe&#39;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious CustomShellHost Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_customshellhost_susp_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_customshellhost_susp_exec/</guid>
      <description>
        
          
            Detects the execution of CustomShellHost.exe where the child isn&#39;t located in &#39;C:\Windows\explorer.exe&#39;. CustomShellHost is a known LOLBin that can be abused by attackers for defense evasion techniques.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Diantz Alternate Data Stream Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_diantz_ads/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_diantz_ads/</guid>
      <description>
        
          
            Compress target file into a cab file stored in the Alternate Data Stream (ADS) of the target file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Digital Signature Of AppX Package</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appxpackaging_om/win_appxpackaging_om_sups_appx_signature/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appxpackaging_om/win_appxpackaging_om_sups_appx_signature/</guid>
      <description>
        
          
            Detects execution of AppX packages with known suspicious or malicious signature
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious DLL Loaded via CertOC.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certoc_load_dll_susp_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certoc_load_dll_susp_locations/</guid>
      <description>
        
          
            Detects when a user installs certificates by using CertOC.exe to load the target DLL file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious DotNET CLR Usage Log Artifact</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_net_cli_artefact/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_net_cli_artefact/</guid>
      <description>
        
          
            Detects the creation of Usage Log files by the CLR (clr.dll). These files are named after the executing process once the assembly is finished executing for the first time in the (user) session context.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Double Extension Files</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_double_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_double_extension/</guid>
      <description>
        
          
            Detects dropped files with double extensions, which is often used by malware as a method to abuse the fact that Windows hide default extensions by default.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Download From Direct IP Via Bitsadmin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download_direct_ip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download_direct_ip/</guid>
      <description>
        
          
            Detects usage of bitsadmin downloading a file using an URL that contains an IP
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Download From File-Sharing Website Via Bitsadmin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download_file_sharing_domains/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bitsadmin_download_file_sharing_domains/</guid>
      <description>
        
          
            Detects usage of bitsadmin downloading a file from a suspicious domain
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Download Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_download/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_download/</guid>
      <description>
        
          
            Detects the execution of certutil with certain flags that allow the utility to download files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Driver/DLL Installation Via Odbcconf.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_driver_install_susp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_driver_install_susp/</guid>
      <description>
        
          
            Detects execution of &#34;odbcconf&#34; with the &#34;INSTALLDRIVER&#34; action where the driver doesn&#39;t contain a &#34;.dll&#34; extension. This is often used as a defense evasion method.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious DumpMinitool Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dumpminitool_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dumpminitool_susp_execution/</guid>
      <description>
        
          
            Detects suspicious ways to use the &#34;DumpMinitool.exe&#34; binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Encoded And Obfuscated Reflection Assembly Load Function Call</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_reflection_assembly_load_obfusc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_reflection_assembly_load_obfusc/</guid>
      <description>
        
          
            Detects suspicious base64 encoded and obfuscated &#34;LOAD&#34; keyword used in .NET &#34;reflection.assembly&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Environment Variable Has Been Registered</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_suspicious_env_variables/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_suspicious_env_variables/</guid>
      <description>
        
          
            Detects the creation of user-specific or system-wide environment variables via the registry. Which contains suspicious commands and strings
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Executable File Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_executable_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_executable_creation/</guid>
      <description>
        
          
            Detect creation of suspicious executable file names.
Some strings look for suspicious file extensions, others look for filenames that exploit unquoted service paths.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Execution of InstallUtil Without Log</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_instalutil_no_log_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_instalutil_no_log_execution/</guid>
      <description>
        
          
            Uses the .NET InstallUtil.exe application in order to execute image without log
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Explorer Process with Whitespace Padding - ClickFix/FileFix</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_clickfix_filefix_whitespace_padding/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_clickfix_filefix_whitespace_padding/</guid>
      <description>
        
          
            Detects process creation with suspicious whitespace padding followed by a &#39;#&#39; character, which may indicate ClickFix or FileFix techniques used to conceal malicious commands from visual inspection.
ClickFix and FileFix are social engineering attack techniques where adversaries distribute phishing documents or malicious links that deceive users into opening the Windows Run dialog box or File Explorer search bar.
The victims are then instructed to paste commands from their clipboard, which contain extensive whitespace padding using various Unicode space characters to push the actual malicious command far to the right, effectively hiding it from immediate view.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Extrac32 Alternate Data Stream Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_extrac32_ads/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_extrac32_ads/</guid>
      <description>
        
          
            Extract data from cab file and hide it in an alternate data stream
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious File Created by ArcSOC.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_arcsoc_susp_file_created/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_arcsoc_susp_file_created/</guid>
      <description>
        
          
            Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS
server, creates a file with suspicious file type, indicating that it may be an executable, script file,
or otherwise unusual.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious File Created Via OneNote Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_office_onenote_susp_dropped_files/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_office_onenote_susp_dropped_files/</guid>
      <description>
        
          
            Detects suspicious files created via the OneNote application. This could indicate a potential malicious &#34;.one&#34;/&#34;.onepkg&#34; file was executed as seen being used in malware activity in the wild
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious File Creation Activity From Fake Recycle.Bin Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_recycle_bin_fake_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_recycle_bin_fake_exec/</guid>
      <description>
        
          
            Detects file write event from/to a fake recycle bin folder that is often used as a staging directory for malware
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious File Creation In Uncommon AppData Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_new_files_in_uncommon_appdata_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_new_files_in_uncommon_appdata_folder/</guid>
      <description>
        
          
            Detects the creation of suspicious files and folders inside the user&#39;s AppData folder but not inside any of the common and well known directories (Local, Romaing, LocalLow). This method could be used as a method to bypass detection who exclude the AppData folder in fear of FPs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious File Download From File Sharing Websites -  File Stream</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_file_sharing_domains_download_susp_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_file_sharing_domains_download_susp_extension/</guid>
      <description>
        
          
            Detects the download of suspicious file type from a well-known file and paste sharing domain
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious File Downloaded From Direct IP Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_download_direct_ip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_download_direct_ip/</guid>
      <description>
        
          
            Detects the execution of certutil with certain flags that allow the utility to download files from direct IPs.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious File Downloaded From File-Sharing Website Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_download_file_sharing_domains/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_download_file_sharing_domains/</guid>
      <description>
        
          
            Detects the execution of certutil with certain flags that allow the utility to download files from file-sharing websites.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious File Encoded To Base64 Via Certutil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_encode_susp_extensions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_certutil_encode_susp_extensions/</guid>
      <description>
        
          
            Detects the execution of certutil with the &#34;encode&#34; flag to encode a file to base64 where the extensions of the file is suspicious
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Filename with Embedded Base64 Commands</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/file_event/file_event_lnx_susp_filename_with_embedded_base64_command/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/file_event/file_event_lnx_susp_filename_with_embedded_base64_command/</guid>
      <description>
        
          
            Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts.
These filenames exploit shell interpretation quirks to trigger hidden commands, a technique observed in VShell malware campaigns.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Files in Default GPO Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_default_gpo_dir_write/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_default_gpo_dir_write/</guid>
      <description>
        
          
            Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Get-Variable.exe Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_get_variable/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_get_variable/</guid>
      <description>
        
          
            Get-Variable is a valid PowerShell cmdlet
WindowsApps is by default in the path where PowerShell is executed.
So when the Get-Variable command is issued on PowerShell execution, the system first looks for the Get-Variable executable in the path and executes the malicious binary instead of looking for the PowerShell cmdlet.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious GUP Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_gup_suspicious_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_gup_suspicious_execution/</guid>
      <description>
        
          
            Detects execution of the Notepad++ updater in a suspicious directory, which is often used in DLL side-loading attacks
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious HH.EXE Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hh_susp_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hh_susp_execution/</guid>
      <description>
        
          
            Detects a suspicious execution of a Microsoft HTML Help (HH.exe)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious High IntegrityLevel Conhost Legacy Option</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_legacy_option/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_legacy_option/</guid>
      <description>
        
          
            ForceV1 asks for information directly from the kernel space. Conhost connects to the console application. High IntegrityLevel means the process is running with elevated privileges, such as an Administrator context.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Hyper-V Cmdlets</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_hyper_v_condlet/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_hyper_v_condlet/</guid>
      <description>
        
          
            Adversaries may carry out malicious operations using a virtual instance to avoid detection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious IIS URL GlobalRules Rewrite Via AppCmd</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iis_appcmd_susp_rewrite_rule/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_iis_appcmd_susp_rewrite_rule/</guid>
      <description>
        
          
            Detects usage of &#34;appcmd&#34; to create new global URL rewrite rules. This behaviour has been observed being used by threat actors to add new rules so they can access their webshells.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Inbox Manipulation Rules</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_inbox_manipulation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_inbox_manipulation/</guid>
      <description>
        
          
            Detects suspicious rules that delete or move messages or folders are set on a user&#39;s inbox.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious IO.FileStream</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_iofilestream/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_iofilestream/</guid>
      <description>
        
          
            Open a handle on the drive volume via the \\.\ DOS device path specifier and perform direct access read of the first few bytes of the volume.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious JavaScript Execution Via Mshta.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_javascript/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_javascript/</guid>
      <description>
        
          
            Detects execution of javascript code using &#34;mshta.exe&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious LNK Double Extension File Created</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_lnk_double_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_lnk_double_extension/</guid>
      <description>
        
          
            Detects the creation of files with an &#34;LNK&#34; as a second extension. This is sometimes used by malware as a method to abuse the fact that Windows hides the &#34;LNK&#34; extension by default.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Login Activity Classified By Google</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/gcp/gworkspace/login/gcp_gworkspace_suspicious_login/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/gcp/gworkspace/login/gcp_gworkspace_suspicious_login/</guid>
      <description>
        
          
            Detects Google Workspace login activity that&#39;s classified as suspicious by Google.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Microsoft Office Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_susp_child_processes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_susp_child_processes/</guid>
      <description>
        
          
            Detects a suspicious process spawning from one of the Microsoft Office suite products (Word, Excel, PowerPoint, Publisher, Visio, etc.)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Msbuild Execution By Uncommon Parent Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msbuild_susp_parent_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msbuild_susp_parent_process/</guid>
      <description>
        
          
            Detects suspicious execution of &#39;Msbuild.exe&#39; by a uncommon parent process
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious MSDT Parent Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msdt_susp_parent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msdt_susp_parent/</guid>
      <description>
        
          
            Detects msdt.exe executed by a suspicious parent as seen in CVE-2022-30190 / Follina exploitation
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious MSHTA Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_susp_child_processes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_susp_child_processes/</guid>
      <description>
        
          
            Detects a suspicious process spawning from an &#34;mshta.exe&#34; process, which could be indicative of a malicious HTA script execution
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious MsiExec Embedding Parent</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_embedding/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_embedding/</guid>
      <description>
        
          
            Adversaries may abuse msiexec.exe to proxy the execution of malicious payloads
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Msiexec Execute Arbitrary DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_execute_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_execute_dll/</guid>
      <description>
        
          
            Adversaries may abuse msiexec.exe to proxy execution of malicious payloads.
Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi)

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Msiexec Quiet Install From Remote Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_install_remote/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msiexec_install_remote/</guid>
      <description>
        
          
            Detects usage of Msiexec.exe to install packages hosted remotely quietly
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Network Connection Binary No CommandLine</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_susp_binary_no_cmdline/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_susp_binary_no_cmdline/</guid>
      <description>
        
          
            Detects suspicious network connections made by a well-known Windows binary run with no command line parameters
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Obfuscated PowerShell Code</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_encoded_obfusc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_base64_encoded_obfusc/</guid>
      <description>
        
          
            Detects suspicious UTF16 and base64 encoded and often obfuscated PowerShell code often used in command lines
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Parent Double Extension File Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_double_extension_parent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_double_extension_parent/</guid>
      <description>
        
          
            Detect execution of suspicious double extension files in ParentCommandLine
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Ping/Del Command Combination</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_ping_del_combined_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_cmd_ping_del_combined_execution/</guid>
      <description>
        
          
            Detects a method often used by ransomware. Which combines the &#34;ping&#34; to wait a couple of seconds and then &#34;del&#34; to delete the file in question. Its used to hide the file responsible for the initial infection for example
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Powercfg Execution To Change Lock Screen Timeout</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powercfg_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powercfg_execution/</guid>
      <description>
        
          
            Detects suspicious execution of &#39;Powercfg.exe&#39; to change lock screen timeout
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious PowerShell Invocations - Specific - ProcessCreation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_invocation_specific/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_invocation_specific/</guid>
      <description>
        
          
            Detects suspicious PowerShell invocation command parameters
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious PowerShell WindowStyle Option</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_windowstyle/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_windowstyle/</guid>
      <description>
        
          
            Adversaries may use hidden windows to conceal malicious activity from the plain sight of users.
In some cases, windows that would typically be displayed when an application carries out an operation can be hidden

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Printer Driver Empty Manufacturer</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_printer_driver/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_printer_driver/</guid>
      <description>
        
          
            Detects a suspicious printer driver installation with an empty Manufacturer value
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Process Execution From Fake Recycle.Bin Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_recycle_bin_fake_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_recycle_bin_fake_execution/</guid>
      <description>
        
          
            Detects process execution from a fake recycle bin folder, often used to avoid security solution.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Process Masquerading As SvcHost.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_svchost_masqueraded_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_svchost_masqueraded_execution/</guid>
      <description>
        
          
            Detects a suspicious process that is masquerading as the legitimate &#34;svchost.exe&#34; by naming its binary &#34;svchost.exe&#34; and executing from an uncommon location.
Adversaries often disguise their malicious binaries by naming them after legitimate system processes like &#34;svchost.exe&#34; to evade detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Process Parents</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_parents/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_parents/</guid>
      <description>
        
          
            Detects suspicious parent processes that should not have any children or should only have a single possible child program
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Process Start Locations</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_run_locations/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_run_locations/</guid>
      <description>
        
          
            Detects suspicious process run from unusual locations
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Provlaunch.EXE Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_provlaunch_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_provlaunch_susp_child_process/</guid>
      <description>
        
          
            Detects suspicious child processes of &#34;provlaunch.exe&#34; which might indicate potential abuse to proxy execution.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Regsvr32 Execution From Remote Share</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_remote_share/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_regsvr32_remote_share/</guid>
      <description>
        
          
            Detects REGSVR32.exe to execute DLL hosted on remote shares
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Remote Child Process From Outlook</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_outlook_susp_child_processes_remote/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_office_outlook_susp_child_processes_remote/</guid>
      <description>
        
          
            Detects a suspicious child process spawning from Outlook where the image is located in a remote location (SMB/WebDav shares).
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Remote Logon with Explicit Credentials</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_logon_explicit_credentials/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_logon_explicit_credentials/</guid>
      <description>
        
          
            Detects suspicious processes logging on with explicit credentials
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Response File Execution Via Odbcconf.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_response_file_susp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_response_file_susp/</guid>
      <description>
        
          
            Detects execution of &#34;odbcconf&#34; with the &#34;-f&#34; flag in order to load a response file with a non-&#34;.rsp&#34; extension.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Rundll32 Activity Invoking Sys File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_sys/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_sys/</guid>
      <description>
        
          
            Detects suspicious process related to rundll32 based on command line that includes a *.sys file as seen being used by UNC2452
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Rundll32 Execution With Image Extension</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_execution_with_image_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_execution_with_image_extension/</guid>
      <description>
        
          
            Detects the execution of Rundll32.exe with DLL files masquerading as image files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Rundll32 Invoking Inline VBScript</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_inline_vbs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_inline_vbs/</guid>
      <description>
        
          
            Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Rundll32 Setupapi.dll Activity</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_setupapi_installhinfsection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_setupapi_installhinfsection/</guid>
      <description>
        
          
            setupapi.dll library provide InstallHinfSection function for processing INF files. INF file may contain instructions allowing to create values in the registry, modify files and install drivers. This technique could be used to obtain persistence via modifying one of Run or RunOnce registry keys, run process or use other DLLs chain calls (see references) InstallHinfSection function in setupapi.dll calls runonce.exe executable regardless of actual content of INF file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Runscripthelper.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_runscripthelper/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_runscripthelper/</guid>
      <description>
        
          
            Detects execution of powershell scripts via Runscripthelper.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Scheduled Task Creation via Masqueraded XML File</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_schedule_via_masqueraded_xml_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_schedule_via_masqueraded_xml_file/</guid>
      <description>
        
          
            Detects the creation of a scheduled task using the &#34;-XML&#34; flag with a file without the &#39;.xml&#39; extension. This behavior could be indicative of potential defense evasion attempt during persistence
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Service Binary Directory</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_service_dir/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_service_dir/</guid>
      <description>
        
          
            Detects a service binary running in a suspicious directory
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Service DACL Modification Via Set-Service Cmdlet - PS</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_service_dacl_modification_set_service/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_service_dacl_modification_set_service/</guid>
      <description>
        
          
            Detects usage of the &#34;Set-Service&#34; powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as &#34;sc.exe&#34;, &#34;Get-Service&#34;...etc. (Works only in powershell 7)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Set Value of MSDT in Registry (CVE-2022-30190)</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2022/exploits/cve-2022-30190/registry_set_exploit_cve_2022_30190_msdt_follina/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2022/exploits/cve-2022-30190/registry_set_exploit_cve_2022_30190_msdt_follina/</guid>
      <description>
        
          
            Detects set value ms-msdt MSProtocol URI scheme in Registry that could be an attempt to exploit CVE-2022-30190.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious ShellExec_RunDLL Call Via Ordinal</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_shellexec_ordinal_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_shellexec_ordinal_execution/</guid>
      <description>
        
          
            Detects suspicious call to the &#34;ShellExec_RunDLL&#34; exported function of SHELL32.DLL through the ordinal number to launch other commands.
Adversary might only use the ordinal number in order to bypass existing detection that alert on usage of ShellExec_RunDLL on CommandLine.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious SignIns From A Non Registered Device</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_risky_sign_ins_with_singlefactorauth_from_unknown_devices/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_ad_risky_sign_ins_with_singlefactorauth_from_unknown_devices/</guid>
      <description>
        
          
            Detects risky authentication from a non AD registered device without MFA being required.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Space Characters in RunMRU Registry Path - ClickFix</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_runmru_space_character/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_runmru_space_character/</guid>
      <description>
        
          
            Detects the occurrence of numerous space characters in RunMRU registry paths, which may indicate execution via phishing lures using clickfix techniques to hide malicious commands in the Windows Run dialog box from naked eyes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Space Characters in TypedPaths Registry Path - FileFix</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_typedpaths_space_characters/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_susp_typedpaths_space_characters/</guid>
      <description>
        
          
            Detects the occurrence of numerous space characters in TypedPaths registry paths, which may indicate execution via phishing lures using file-fix techniques to hide malicious commands.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Speech Runtime Binary Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_speechruntime_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_speechruntime_child_process/</guid>
      <description>
        
          
            Detects suspicious Speech Runtime Binary Execution by monitoring its child processes.
Child processes spawned by SpeechRuntime.exe could indicate an attempt for lateral movement via COM &amp; DCOM hijacking.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Splwow64 Without Params</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_splwow64_cli_anomaly/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_splwow64_cli_anomaly/</guid>
      <description>
        
          
            Detects suspicious Splwow64.exe process without any command line parameters
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Start-Process PassThru</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_start_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_start_process/</guid>
      <description>
        
          
            Powershell use PassThru option to start in background
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious SYSTEM User Process Creation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_system_user_anomaly/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_system_user_anomaly/</guid>
      <description>
        
          
            Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Unsigned Thor Scanner Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_thor_unsigned_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_thor_unsigned_execution/</guid>
      <description>
        
          
            Detects loading and execution of an unsigned thor scanner binary.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Usage of For Loop with Recursive Directory Search in CMD</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_cmd_for_loop_execution_with_recursive_directory_search/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_cmd_for_loop_execution_with_recursive_directory_search/</guid>
      <description>
        
          
            Detects suspicious usage of the cmd.exe &#39;for /f&#39; loop combined with the &#39;tokens=&#39; parameter and a recursive directory listing.
This pattern may indicate an attempt to discover and execute system binaries dynamically, for example powershell, a technique sometimes used by attackers to evade detection.
This behavior has been observed in various malicious lnk files.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Usage Of ShellExec_RunDLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_shellexec_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_susp_shellexec_execution/</guid>
      <description>
        
          
            Detects suspicious usage of the ShellExec_RunDLL function to launch other commands as seen in the the raspberry-robin attack
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Use of CSharp Interactive Console</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_csi_use_of_csharp_console/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_csi_use_of_csharp_console/</guid>
      <description>
        
          
            Detects the execution of CSharp interactive console by PowerShell
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Userinit Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_userinit_child/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_userinit_child/</guid>
      <description>
        
          
            Detects a suspicious child process of userinit
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Vsls-Agent Command With AgentExtensionPath Load</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vslsagent_agentextensionpath_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vslsagent_agentextensionpath_load/</guid>
      <description>
        
          
            Detects Microsoft Visual Studio vsls-agent.exe lolbin execution with a suspicious library load using the --agentExtensionPath parameter
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Windows Update Agent Empty Cmdline</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wuauclt_no_cli_flags_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wuauclt_no_cli_flags_execution/</guid>
      <description>
        
          
            Detects suspicious Windows Update Agent activity in which a wuauclt.exe process command line doesn&#39;t contain any command line flags

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious WMIC Execution Via Office Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_susp_execution_via_office_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_susp_execution_via_office_process/</guid>
      <description>
        
          
            Office application called wmic to proxye execution through a LOLBIN process. This is often used to break suspicious parent-child chain (Office app spawns LOLBin).
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious WmiPrvSE Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmiprvse_susp_child_processes/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmiprvse_susp_child_processes/</guid>
      <description>
        
          
            Detects suspicious and uncommon child processes of WmiPrvSE
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Wordpad Outbound Connections</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_wordpad_uncommon_ports/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_wordpad_uncommon_ports/</guid>
      <description>
        
          
            Detects a network connection initiated by &#34;wordpad.exe&#34; over uncommon destination ports.
This might indicate potential process injection activity from a beacon or similar mechanisms.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious Workstation Locking via Rundll32</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_user32_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_user32_dll/</guid>
      <description>
        
          
            Detects a suspicious call to the user32.dll function that locks the user workstation
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious XOR Encoded PowerShell Command</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_xor_commandline/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_xor_commandline/</guid>
      <description>
        
          
            Detects presence of a potentially xor encoded powershell command
          
          
        
      </description>
    </item>
    
    <item>
      <title>Suspicious ZipExec Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_zipexec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_zipexec/</guid>
      <description>
        
          
            ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>SyncAppvPublishingServer Bypass Powershell Restriction - PS Module</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_syncappvpublishingserver_exe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_syncappvpublishingserver_exe/</guid>
      <description>
        
          
            Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.
          
          
        
      </description>
    </item>
    
    <item>
      <title>SyncAppvPublishingServer Execute Arbitrary PowerShell Code</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_syncappvpublishingserver_execute_psh/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_syncappvpublishingserver_execute_psh/</guid>
      <description>
        
          
            Executes arbitrary PowerShell code using SyncAppvPublishingServer.exe.
          
          
        
      </description>
    </item>
    
    <item>
      <title>SyncAppvPublishingServer Execution to Bypass Powershell Restriction</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_syncappvpublishingserver_exe/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_syncappvpublishingserver_exe/</guid>
      <description>
        
          
            Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.
          
          
        
      </description>
    </item>
    
    <item>
      <title>SyncAppvPublishingServer VBS Execute Arbitrary PowerShell Code</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_syncappvpublishingserver_vbs_execute_psh/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_syncappvpublishingserver_vbs_execute_psh/</guid>
      <description>
        
          
            Executes arbitrary PowerShell code using SyncAppvPublishingServer.vbs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysinternals Tools AppX Versions Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/appmodel_runtime/win_appmodel_runtime_sysinternals_tools_appx_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/appmodel_runtime/win_appmodel_runtime_sysinternals_tools_appx_execution/</guid>
      <description>
        
          
            Detects execution of Sysinternals tools via an AppX package.
Attackers could install the Sysinternals Suite to get access to tools such as psexec and procdump to avoid detection based on System paths.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Configuration Error</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_config_modification_error/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_config_modification_error/</guid>
      <description>
        
          
            Detects when an adversary is trying to hide it&#39;s action from Sysmon logging based on error messages
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Configuration Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_config_modification_status/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_config_modification_status/</guid>
      <description>
        
          
            Detects when an attacker tries to hide from Sysmon by disabling or stopping it
          
          
        
      </description>
    </item>
    
    <item>
      <title>Sysmon Driver Unloaded Via Fltmc.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver_sysmon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_fltmc_unload_driver_sysmon/</guid>
      <description>
        
          
            Detects possible Sysmon filter driver unloaded via fltmc.exe
          
          
        
      </description>
    </item>
    
    <item>
      <title>System Control Panel Item Loaded From Uncommon Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_cpl_from_non_system_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_cpl_from_non_system_location/</guid>
      <description>
        
          
            Detects image load events of system control panel items (.cpl) from uncommon or non-system locations that may indicate DLL sideloading or other abuse techniques.

          
          
        
      </description>
    </item>
    
    <item>
      <title>System File Execution Location Anomaly</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_system_exe_anomaly/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_system_exe_anomaly/</guid>
      <description>
        
          
            Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.

          
          
        
      </description>
    </item>
    
    <item>
      <title>System Information Discovery Using System_Profiler</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_system_profiler_discovery/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_system_profiler_discovery/</guid>
      <description>
        
          
            Detects the execution of &#34;system_profiler&#34; with specific &#34;Data Types&#34; that have been seen being used by threat actors and malware. It provides system hardware and software configuration information.
This process is primarily used for system information discovery. However, &#34;system_profiler&#34; can also be used to determine if virtualization software is being run for defense evasion purposes.

          
          
        
      </description>
    </item>
    
    <item>
      <title>System Information Discovery Via Sysctl - MacOS</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_sysctl_discovery/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_sysctl_discovery/</guid>
      <description>
        
          
            Detects the execution of &#34;sysctl&#34; with specific arguments that have been used by threat actors and malware. It provides system hardware information.
This process is primarily used to detect and avoid virtualization and analysis environments.

          
          
        
      </description>
    </item>
    
    <item>
      <title>TAIDOOR RAT DLL Load</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/taidoor-rat/proc_creation_win_apt_taidoor/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/taidoor-rat/proc_creation_win_apt_taidoor/</guid>
      <description>
        
          
            Detects specific process characteristics of Chinese TAIDOOR RAT malware load
          
          
        
      </description>
    </item>
    
    <item>
      <title>Taskmgr as LOCAL_SYSTEM</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_taskmgr_localsystem/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_taskmgr_localsystem/</guid>
      <description>
        
          
            Detects the creation of taskmgr.exe process in context of LOCAL_SYSTEM
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tasks Folder Evasion</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_task_folder_evasion/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_task_folder_evasion/</guid>
      <description>
        
          
            The Tasks folder in system32 and syswow64 are globally writable paths.
Adversaries can take advantage of this and load or influence any script hosts or ANY .NET Application
in Tasks to load and execute a custom assembly into cscript, wscript, regsvr32, mshta, eventvwr

          
          
        
      </description>
    </item>
    
    <item>
      <title>TeamViewer Log File Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_teamviewer_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_teamviewer_logs/</guid>
      <description>
        
          
            Detects the deletion of the TeamViewer log files which may indicate an attempt to destroy forensic evidence
          
          
        
      </description>
    </item>
    
    <item>
      <title>Temporary Access Pass Added To An Account</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_tap_added/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_tap_added/</guid>
      <description>
        
          
            Detects when a temporary access pass (TAP) is added to an account. TAPs added to priv accounts should be investigated
          
          
        
      </description>
    </item>
    
    <item>
      <title>Terminal Server Client Connection History Cleared - Registry</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_mstsc_history_cleared/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/registry/registry_delete/registry_delete_mstsc_history_cleared/</guid>
      <description>
        
          
            Detects the deletion of registry keys containing the MSTSC connection history
          
          
        
      </description>
    </item>
    
    <item>
      <title>Third Party Software DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_third_party/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_third_party/</guid>
      <description>
        
          
            Detects DLL sideloading of DLLs that are part of third party software (zoom, discord....etc)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Time Travel Debugging Utility Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_tttracer_mod_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_tttracer_mod_load/</guid>
      <description>
        
          
            Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Time Travel Debugging Utility Usage - Image</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_tttracer_module_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_tttracer_module_load/</guid>
      <description>
        
          
            Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Tomcat WebServer Logs Deleted</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_tomcat_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_delete/file_delete_win_delete_tomcat_logs/</guid>
      <description>
        
          
            Detects the deletion of tomcat WebServer logs which may indicate an attempt to destroy forensic evidence
          
          
        
      </description>
    </item>
    
    <item>
      <title>Too Many Global Admins</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_too_many_global_admins/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/privileged_identity_management/azure_pim_too_many_global_admins/</guid>
      <description>
        
          
            Identifies an event where there are there are too many accounts assigned the Global Administrator role.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Touch Suspicious Service File</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_touch_susp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_touch_susp/</guid>
      <description>
        
          
            Detects usage of the &#34;touch&#34; process in service file.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Triple Cross eBPF Rootkit Default LockFile</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/file_event/file_event_lnx_triple_cross_rootkit_lock_file/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/file_event/file_event_lnx_triple_cross_rootkit_lock_file/</guid>
      <description>
        
          
            Detects the creation of the file &#34;rootlog&#34; which is used by the TripleCross rootkit as a way to check if the backdoor is already running.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Triple Cross eBPF Rootkit Execve Hijack</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_triple_cross_rootkit_execve_hijack/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_triple_cross_rootkit_execve_hijack/</guid>
      <description>
        
          
            Detects execution of a the file &#34;execve_hijack&#34; which is used by the Triple Cross rootkit as a way to elevate privileges
          
          
        
      </description>
    </item>
    
    <item>
      <title>Triple Cross eBPF Rootkit Install Commands</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_triple_cross_rootkit_install/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_triple_cross_rootkit_install/</guid>
      <description>
        
          
            Detects default install commands of the Triple Cross eBPF rootkit based on the &#34;deployer.sh&#34; script
          
          
        
      </description>
    </item>
    
    <item>
      <title>Troubleshooting Pack Cmdlet Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_follina_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_susp_follina_execution/</guid>
      <description>
        
          
            Detects execution of &#34;TroubleshootingPack&#34; cmdlets to leverage CVE-2022-30190 or action similar to &#34;msdt&#34; lolbin (as described in LOLBAS)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Trusted Path Bypass via Windows Directory Spoofing</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_win_trusted_path_bypass/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_win_trusted_path_bypass/</guid>
      <description>
        
          
            Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g &#34;C:\Windows \System32&#34;) which can bypass Windows trusted path verification.
This technique tricks Windows into treating the path as trusted, allowing malicious DLLs to load with high integrity privileges bypassing UAC.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Turla Group Commands May 2020</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2014/ta/turla/proc_creation_win_apt_turla_comrat_may20/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2014/ta/turla/proc_creation_win_apt_turla_comrat_may20/</guid>
      <description>
        
          
            Detects commands used by Turla group as reported by ESET in May 2020
          
          
        
      </description>
    </item>
    
    <item>
      <title>UAC Bypass Using Event Viewer RecentViews</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uac_bypass_eventvwr_recentviews/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_uac_bypass_eventvwr_recentviews/</guid>
      <description>
        
          
            Detects the pattern of UAC Bypass using Event Viewer RecentViews
          
          
        
      </description>
    </item>
    
    <item>
      <title>UAC Bypass Using EventVwr</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_uac_bypass_eventvwr/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_uac_bypass_eventvwr/</guid>
      <description>
        
          
            Detects the pattern of a UAC bypass using Windows Event Viewer
          
          
        
      </description>
    </item>
    
    <item>
      <title>UAC Bypass With Fake DLL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_uac_bypass_via_dism/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_uac_bypass_via_dism/</guid>
      <description>
        
          
            Attempts to load dismcore.dll after dropping it
          
          
        
      </description>
    </item>
    
    <item>
      <title>UEFI Persistence Via Wpbbin - FileCreation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_wpbbin_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_wpbbin_persistence/</guid>
      <description>
        
          
            Detects creation of a file named &#34;wpbbin&#34; in the &#34;%systemroot%\system32\&#34; directory. Which could be indicative of UEFI based persistence method
          
          
        
      </description>
    </item>
    
    <item>
      <title>UEFI Persistence Via Wpbbin - ProcessCreation</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wpbbin_potential_persistence/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wpbbin_potential_persistence/</guid>
      <description>
        
          
            Detects execution of the binary &#34;wpbbin&#34; which is used as part of the UEFI based persistence method described in the reference section
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unauthorized System Time Modification</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_time_modification/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_time_modification/</guid>
      <description>
        
          
            Detect scenarios where a potentially unauthorized application or user is modifying the system time.
          
          
        
      </description>
    </item>
    
    <item>
      <title>UNC4841 - Barracuda ESG Exploitation Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/file_event_lnx_apt_unc4841_file_indicators/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/file_event_lnx_apt_unc4841_file_indicators/</guid>
      <description>
        
          
            Detects file indicators as seen used by UNC4841 during their Barracuda ESG zero day exploitation.
          
          
        
      </description>
    </item>
    
    <item>
      <title>UNC4841 - Download Compressed Files From Temp.sh Using Wget</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/proc_creation_lnx_apt_unc4841_wget_download_compressed_file_tmep_sh/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/proc_creation_lnx_apt_unc4841_wget_download_compressed_file_tmep_sh/</guid>
      <description>
        
          
            Detects execution of &#34;wget&#34; to download a &#34;.zip&#34; or &#34;.rar&#34; files from &#34;temp.sh&#34;. As seen used by UNC4841 during their Barracuda ESG zero day exploitation.
          
          
        
      </description>
    </item>
    
    <item>
      <title>UNC4841 - Download Tar File From Untrusted Direct IP Via Wget</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/proc_creation_lnx_apt_unc4841_wget_download_tar_files_direct_ip/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/proc_creation_lnx_apt_unc4841_wget_download_tar_files_direct_ip/</guid>
      <description>
        
          
            Detects execution of &#34;wget&#34; to download a &#34;tar&#34; from an IP address that doesn&#39;t have a trusted certificate. As seen used by UNC4841 during their Barracuda ESG zero day exploitation.
          
          
        
      </description>
    </item>
    
    <item>
      <title>UNC4841 - Email Exfiltration File Pattern</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/file_event_lnx_apt_unc4841_exfil_mail_pattern/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/file_event_lnx_apt_unc4841_exfil_mail_pattern/</guid>
      <description>
        
          
            Detects filename pattern of email related data used by UNC4841 for staging and exfiltration
          
          
        
      </description>
    </item>
    
    <item>
      <title>UNC4841 - SSL Certificate Exfiltration Via Openssl</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/proc_creation_lnx_apt_unc4841_openssl_connection/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/unc4841-barracuda-esg-zero-day-exploitation/proc_creation_lnx_apt_unc4841_openssl_connection/</guid>
      <description>
        
          
            Detects the execution of &#34;openssl&#34; to connect to an IP address. This techniques was used by UNC4841 to exfiltrate SSL certificates and as a C2 channel with named pipes. Investigate commands executed in the temporal vicinity of this command.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon  Assistive Technology Applications Execution Via AtBroker.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_atbroker_uncommon_ats_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_atbroker_uncommon_ats_execution/</guid>
      <description>
        
          
            Detects the start of a non built-in assistive technology applications via &#34;Atbroker.EXE&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon AddinUtil.EXE CommandLine Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_addinutil_uncommon_cmdline/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_addinutil_uncommon_cmdline/</guid>
      <description>
        
          
            Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with uncommon Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Child Process Of AddinUtil.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_addinutil_uncommon_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_addinutil_uncommon_child_process/</guid>
      <description>
        
          
            Detects uncommon child processes of the Add-In deployment cache updating utility (AddInutil.exe) which could be a sign of potential abuse of the binary to proxy execution via a custom Addins.Store payload.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Child Process Of Appvlp.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_appvlp_uncommon_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_appvlp_uncommon_child_process/</guid>
      <description>
        
          
            Detects uncommon child processes of Appvlp.EXE
Appvlp or the Application Virtualization Utility is included with Microsoft Office. Attackers are able to abuse &#34;AppVLP&#34; to execute shell commands.
Normally, this binary is used for Application Virtualization, but it can also be abused to circumvent the ASR file path rule folder
or to mark a file as a system file.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Child Process Of BgInfo.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bginfo_uncommon_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bginfo_uncommon_child_process/</guid>
      <description>
        
          
            Detects uncommon child processes of &#34;BgInfo.exe&#34; which could be a sign of potential abuse of the binary to proxy execution via external VBScript
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Child Process Of Conhost.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_susp_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_susp_child_process/</guid>
      <description>
        
          
            Detects uncommon &#34;conhost&#34; child processes. This could be a sign of &#34;conhost&#34; usage as a LOLBIN or potential process injection activity.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Child Process Of Defaultpack.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defaultpack_uncommon_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_defaultpack_uncommon_child_process/</guid>
      <description>
        
          
            Detects uncommon child processes of &#34;DefaultPack.EXE&#34; binary as a proxy to launch other programs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Child Process Of Setres.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_setres_uncommon_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_setres_uncommon_child_process/</guid>
      <description>
        
          
            Detects uncommon child process of Setres.EXE.
Setres.EXE is a Windows server only process and tool that can be used to set the screen resolution.
It can potentially be abused in order to launch any arbitrary file with a name containing the word &#34;choice&#34; from the current execution path.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Child Process Spawned By Odbcconf.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_uncommon_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_uncommon_child_process/</guid>
      <description>
        
          
            Detects an uncommon child process of &#34;odbcconf.exe&#34; binary which normally shouldn&#39;t have any child processes.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon File Creation By Mysql Daemon Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_mysqld_uncommon_file_creation/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_mysqld_uncommon_file_creation/</guid>
      <description>
        
          
            Detects the creation of files with scripting or executable extensions by Mysql daemon.
Which could be an indicator of &#34;User Defined Functions&#34; abuse to download malware.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon FileSystem Load Attempt By Format.com</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_format_uncommon_filesystem_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_format_uncommon_filesystem_load/</guid>
      <description>
        
          
            Detects the execution of format.com with an uncommon filesystem selection that could indicate a defense evasion activity in which &#34;format.com&#34; is used to load malicious DLL files or other programs.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Link.EXE Parent Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_link_uncommon_parent_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_link_uncommon_parent_process/</guid>
      <description>
        
          
            Detects an uncommon parent process of &#34;LINK.EXE&#34;.
Link.EXE in Microsoft incremental linker. Its a utility usually bundled with Visual Studio installation.
Multiple utilities often found in the same folder (editbin.exe, dumpbin.exe, lib.exe, etc) have a hardcode call to the &#34;LINK.EXE&#34; binary without checking its validity.
This would allow an attacker to sideload any binary with the name &#34;link.exe&#34; if one of the aforementioned tools get executed from a different location.
By filtering the known locations of such utilities we can spot uncommon parent process of LINK.EXE that might be suspicious or malicious.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Process Access Rights For Target Image</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_susp_all_access_uncommon_target/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_access/proc_access_win_susp_all_access_uncommon_target/</guid>
      <description>
        
          
            Detects process access request to uncommon target images with a &#34;PROCESS_ALL_ACCESS&#34; access mask.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Sigverif.EXE Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sigverif_uncommon_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sigverif_uncommon_child_process/</guid>
      <description>
        
          
            Detects uncommon child processes spawning from &#34;sigverif.exe&#34;, which could indicate potential abuse of the latter as a living of the land binary in order to proxy execution.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Svchost Command Line Parameter</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_svchost_uncommon_command_line_flags/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_svchost_uncommon_command_line_flags/</guid>
      <description>
        
          
            Detects instances of svchost.exe running with an unusual or uncommon command line parameter by excluding known legitimate or common patterns.
This could point at a file masquerading as svchost, a process injection, or hollowing of a legitimate svchost instance.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Uncommon Svchost Parent Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_svchost_uncommon_parent_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_svchost_uncommon_parent_process/</guid>
      <description>
        
          
            Detects an uncommon svchost parent process
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unfamiliar Sign-In Properties</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_unfamilar_sign_in/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/identity_protection/azure_identity_protection_unfamilar_sign_in/</guid>
      <description>
        
          
            Detects sign-in with properties that are unfamiliar to the user. The detection considers past sign-in history to look for anomalous sign-ins.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unmount Share Via Net.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_net_share_unmount/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_net_share_unmount/</guid>
      <description>
        
          
            Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unsigned .node File Loaded</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_unsigned_node_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_dll_unsigned_node_load/</guid>
      <description>
        
          
            Detects the loading of unsigned .node files.
Adversaries may abuse a lack of .node integrity checking to execute arbitrary code inside of trusted applications such as Slack.
.node files are native add-ons for Electron-based applications, which are commonly used for desktop applications like Slack, Discord, and Visual Studio Code.
This technique has been observed in the DripLoader malware, which uses unsigned .node files to load malicious native code into Electron applications.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Unsigned AppX Installation Attempt Using Add-AppxPackage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_install_unsigned_appx_packages/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_install_unsigned_appx_packages/</guid>
      <description>
        
          
            Detects usage of the &#34;Add-AppxPackage&#34; or it&#39;s alias &#34;Add-AppPackage&#34; to install unsigned AppX packages
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unsigned AppX Installation Attempt Using Add-AppxPackage - PsScript</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_install_unsigned_appx_packages/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_install_unsigned_appx_packages/</guid>
      <description>
        
          
            Detects usage of the &#34;Add-AppxPackage&#34; or it&#39;s alias &#34;Add-AppPackage&#34; to install unsigned AppX packages
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unsigned Binary Loaded From Suspicious Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security_mitigations/win_security_mitigations_unsigned_dll_from_susp_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security_mitigations/win_security_mitigations_unsigned_dll_from_susp_location/</guid>
      <description>
        
          
            Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unsigned DLL Loaded by Windows Utility</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_unsigned_dll/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_unsigned_dll/</guid>
      <description>
        
          
            Detects windows utilities loading an unsigned or untrusted DLL.
Adversaries often abuse those programs to proxy execution of malicious code.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Unsigned Mfdetours.DLL Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_mfdetours_unsigned/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_mfdetours_unsigned/</guid>
      <description>
        
          
            Detects DLL sideloading of unsigned &#34;mfdetours.dll&#34;. Executing &#34;mftrace.exe&#34; can be abused to attach to an arbitrary process and force load any DLL named &#34;mfdetours.dll&#34; from the current directory of execution.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unsigned Module Loaded by ClickOnce Application</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_clickonce_unsigned_module_loaded/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_susp_clickonce_unsigned_module_loaded/</guid>
      <description>
        
          
            Detects unsigned module load by ClickOnce application.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unusual File Download from Direct IP Address</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_susp_ip_domains/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_susp_ip_domains/</guid>
      <description>
        
          
            Detects the download of suspicious file type from URLs with IP
          
          
        
      </description>
    </item>
    
    <item>
      <title>Unusual File Download From File Sharing Websites - File Stream</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_file_sharing_domains_download_unusual_extension/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/create_stream_hash/create_stream_hash_file_sharing_domains_download_unusual_extension/</guid>
      <description>
        
          
            Detects the download of suspicious file type from a well-known file and paste sharing domain
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use Icacls to Hide File to Everyone</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_icacls_deny/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_icacls_deny/</guid>
      <description>
        
          
            Detect use of icacls to deny access for everyone in Users folder sometimes used to hide malicious files
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use NTFS Short Name in Command Line</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_ntfs_short_name_use_cli/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_ntfs_short_name_use_cli/</guid>
      <description>
        
          
            Detect use of the Windows 8.3 short name. Which could be used as a method to avoid command-line detection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use NTFS Short Name in Image</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_ntfs_short_name_use_image/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_ntfs_short_name_use_image/</guid>
      <description>
        
          
            Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image based detection
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use Of Hidden Paths Or Files</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_hidden_binary_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/path/lnx_auditd_hidden_binary_execution/</guid>
      <description>
        
          
            Detects calls to hidden files or files located in hidden directories in NIX systems.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use of Legacy Authentication Protocols</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_legacy_authentication_protocols/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_legacy_authentication_protocols/</guid>
      <description>
        
          
            Alert on when legacy authentication has been used on an account
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use of Remote.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_remote/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_remote/</guid>
      <description>
        
          
            Remote.exe is part of WinDbg in the Windows SDK and can be used for AWL bypass and running remote files.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use of Scriptrunner.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_scriptrunner/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_scriptrunner/</guid>
      <description>
        
          
            The &#34;ScriptRunner.exe&#34; binary can be abused to proxy execution through it and bypass possible whitelisting
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use Of The SFTP.EXE Binary As A LOLBIN</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_sftp/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_sftp/</guid>
      <description>
        
          
            Detects the usage of the &#34;sftp.exe&#34; binary as a LOLBIN by abusing the &#34;-D&#34; flag
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use of TTDInject.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_ttdinject/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_ttdinject/</guid>
      <description>
        
          
            Detects the executiob of TTDInject.exe, which is used by Windows 10 v1809 and newer to debug time travel (underlying call of tttracer.exe)
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use of VisualUiaVerifyNative.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_visualuiaverifynative/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_visualuiaverifynative/</guid>
      <description>
        
          
            VisualUiaVerifyNative.exe is a Windows SDK that can be used for AWL bypass and is listed in Microsoft&#39;s recommended block rules.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use of VSIISExeLauncher.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_vsiisexelauncher/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_vsiisexelauncher/</guid>
      <description>
        
          
            The &#34;VSIISExeLauncher.exe&#34; binary part of the Visual Studio/VS Code can be used to execute arbitrary binaries
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use of Wfc.exe</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_wfc/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_wfc/</guid>
      <description>
        
          
            The Workflow Command-line Compiler can be used for AWL bypass and is listed in Microsoft&#39;s recommended block rules.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Use Short Name Path in Image</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_image/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_image/</guid>
      <description>
        
          
            Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image detection
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Access Blocked by Azure Conditional Access</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_user_login_blocked_by_conditional_access/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_user_login_blocked_by_conditional_access/</guid>
      <description>
        
          
            Detect access has been blocked by Conditional Access policies.
The access policy does not allow token issuance which might be sights≈ of unauthorizeed login to valid accounts.

          
          
        
      </description>
    </item>
    
    <item>
      <title>User Added To Admin Group Via Dscl</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_dscl_add_user_to_admin_group/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_dscl_add_user_to_admin_group/</guid>
      <description>
        
          
            Detects attempts to create and add an account to the admin group via &#34;dscl&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Added To Admin Group Via DseditGroup</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_dseditgroup_add_to_admin_group/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_dseditgroup_add_to_admin_group/</guid>
      <description>
        
          
            Detects attempts to create and/or add an account to the admin group, thus granting admin privileges.
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Added To Admin Group Via Sysadminctl</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_sysadminctl_add_user_to_admin_group/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_sysadminctl_add_user_to_admin_group/</guid>
      <description>
        
          
            Detects attempts to create and add an account to the admin group via &#34;sysadminctl&#34;
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Added to an Administrator&#39;s Azure AD Role</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_ad_user_added_to_admin_role/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_ad_user_added_to_admin_role/</guid>
      <description>
        
          
            User Added to an Administrator&#39;s Azure AD Role
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Added to Local Administrator Group</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_user_added_to_local_administrators/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_user_added_to_local_administrators/</guid>
      <description>
        
          
            Detects the addition of a new member to the local administrator group, which could be legitimate activity or a sign of privilege escalation activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>User Added To Privilege Role</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_priviledged_role_assignment_add/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_priviledged_role_assignment_add/</guid>
      <description>
        
          
            Detects when a user is added to a privileged role.
          
          
        
      </description>
    </item>
    
    <item>
      <title>User State Changed From Guest To Member</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_guest_to_member/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_guest_to_member/</guid>
      <description>
        
          
            Detects the change of user type from &#34;Guest&#34; to &#34;Member&#34; for potential elevation of privilege.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Users Added to Global or Device Admin Roles</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_users_added_to_device_admin_roles/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/audit_logs/azure_ad_users_added_to_device_admin_roles/</guid>
      <description>
        
          
            Monitor and alert for users added to device admin roles.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Users Authenticating To Other Azure AD Tenants</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_users_authenticating_to_other_azure_ad_tenants/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/azure/signin_logs/azure_users_authenticating_to_other_azure_ad_tenants/</guid>
      <description>
        
          
            Detect when users in your Azure AD tenant are authenticating to other Azure AD Tenants.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Using SettingSyncHost.exe as LOLBin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_settingsynchost/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_settingsynchost/</guid>
      <description>
        
          
            Detects using SettingSyncHost.exe to run hijacked binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>UtilityFunctions.ps1 Proxy Dll</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_utilityfunctions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_utilityfunctions/</guid>
      <description>
        
          
            Detects the use of a Microsoft signed script executing a managed DLL with PowerShell.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Verclsid.exe Runs COM Object</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_verclsid_runs_com/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_verclsid_runs_com/</guid>
      <description>
        
          
            Detects when verclsid.exe is used to run COM object via GUID
          
          
        
      </description>
    </item>
    
    <item>
      <title>Virtualbox Driver Installation or Starting of VMs</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_virtualbox_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_virtualbox_execution/</guid>
      <description>
        
          
            Adversaries can carry out malicious operations using a virtual instance to avoid detection. This rule is built to detect the registration of the Virtualbox driver or start of a Virtualbox VM.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Visual Basic Command Line Compiler Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_visual_basic_compiler/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_lolbin_visual_basic_compiler/</guid>
      <description>
        
          
            Detects successful code compilation via Visual Basic Command Line Compiler that utilizes Windows Resource to Object Converter.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Visual Studio NodejsTools PressAnyKey Arbitrary Binary Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pressanykey_lolbin_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pressanykey_lolbin_execution/</guid>
      <description>
        
          
            Detects child processes of Microsoft.NodejsTools.PressAnyKey.exe that can be used to execute any other binary
          
          
        
      </description>
    </item>
    
    <item>
      <title>Visual Studio NodejsTools PressAnyKey Renamed Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_pressanykey/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_pressanykey/</guid>
      <description>
        
          
            Detects renamed execution of &#34;Microsoft.NodejsTools.PressAnyKey.exe&#34;, which can be abused as a LOLBIN to execute arbitrary binaries
          
          
        
      </description>
    </item>
    
    <item>
      <title>VMGuestLib DLL Sideload</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vmguestlib/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vmguestlib/</guid>
      <description>
        
          
            Detects DLL sideloading of VMGuestLib.dll by the WmiApSrv service.
          
          
        
      </description>
    </item>
    
    <item>
      <title>VMMap Signed Dbghelp.DLL Potential Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vmmap_dbghelp_signed/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vmmap_dbghelp_signed/</guid>
      <description>
        
          
            Detects potential DLL sideloading of a signed dbghelp.dll by the Sysinternals VMMap.
          
          
        
      </description>
    </item>
    
    <item>
      <title>VMMap Unsigned Dbghelp.DLL Potential Sideloading</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vmmap_dbghelp_unsigned/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_vmmap_dbghelp_unsigned/</guid>
      <description>
        
          
            Detects potential DLL sideloading of an unsigned dbghelp.dll by the Sysinternals VMMap.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Wab Execution From Non Default Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wab_execution_from_non_default_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wab_execution_from_non_default_location/</guid>
      <description>
        
          
            Detects execution of wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) from non default locations as seen with bumblebee activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>Wab/Wabmig Unusual Parent Or Child Processes</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wab_unusual_parents/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wab_unusual_parents/</guid>
      <description>
        
          
            Detects unusual parent or children of the wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) processes as seen being used with bumblebee activity
          
          
        
      </description>
    </item>
    
    <item>
      <title>Weak or Abused Passwords In CLI</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_weak_or_abused_passwords/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_weak_or_abused_passwords/</guid>
      <description>
        
          
            Detects weak passwords or often abused passwords (seen used by threat actors) via the CLI.
An example would be a threat actor creating a new user via the net command and providing the password inline

          
          
        
      </description>
    </item>
    
    <item>
      <title>Win Susp Computer Name Containing Samtheadmin</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_computer_name/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_computer_name/</guid>
      <description>
        
          
            Detects suspicious computer name samtheadmin-{1..100}$ generated by hacktool
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Binaries Write Suspicious Extensions</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_shell_write_susp_files_extensions/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_shell_write_susp_files_extensions/</guid>
      <description>
        
          
            Detects Windows executables that write files with suspicious extensions
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Binary Executed From WSL</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wsl_windows_binaries_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wsl_windows_binaries_execution/</guid>
      <description>
        
          
            Detects the execution of Windows binaries from within a WSL instance.
This could be used to masquerade parent-child relationships

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Kernel Debugger Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_kd_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_kd_execution/</guid>
      <description>
        
          
            Detects execution of the Windows Kernel Debugger &#34;kd.exe&#34;.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows MSIX Package Support Framework AI_STUBS Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msix_ai_stub_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msix_ai_stub_execution/</guid>
      <description>
        
          
            Detects execution of Advanced Installer MSIX Package Support Framework (PSF) components, specifically AI_STUBS executables with original filename &#39;popupwrapper.exe&#39;.
This activity may indicate malicious MSIX packages build with Advanced Installer leveraging the Package Support Framework to bypass application control restrictions.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Processes Suspicious Parent Directory</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_proc_wrong_parent/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_proc_wrong_parent/</guid>
      <description>
        
          
            Detect suspicious parent processes of well-known Windows processes
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Service Terminated With Error</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_service_terminated_error_generic/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/builtin/system/service_control_manager/win_system_service_terminated_error_generic/</guid>
      <description>
        
          
            Detects Windows services that got terminated for whatever reason
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Shell/Scripting Processes Spawning Suspicious Programs</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_shell_spawn_susp_program/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_shell_spawn_susp_program/</guid>
      <description>
        
          
            Detects suspicious child processes of a Windows shell and scripting processes such as wscript, rundll32, powershell, mshta...etc.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Windows Spooler Service Suspicious Binary Load</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-1675/image_load_exploit_cve_2021_1675_spoolsv_dll_load/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-1675/image_load_exploit_cve_2021_1675_spoolsv_dll_load/</guid>
      <description>
        
          
            Detect DLL Load from Spooler Service backup folder. This behavior has been observed during the exploitation of the Print Spooler Vulnerability CVE-2021-1675 and CVE-2021-34527 (PrinterNightmare).

          
          
        
      </description>
    </item>
    
    <item>
      <title>Winnti Malware HK University Campaign</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/winnti/proc_creation_win_apt_winnti_mal_hk_jan20/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/winnti/proc_creation_win_apt_winnti_mal_hk_jan20/</guid>
      <description>
        
          
            Detects specific process characteristics of Winnti malware noticed in Dec/Jan 2020 in a campaign against Honk Kong universities
          
          
        
      </description>
    </item>
    
    <item>
      <title>Winnti Pipemon Characteristics</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/winnti/proc_creation_win_apt_winnti_pipemon/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/winnti/proc_creation_win_apt_winnti_pipemon/</guid>
      <description>
        
          
            Detects specific process characteristics of Winnti Pipemon malware reported by ESET
          
          
        
      </description>
    </item>
    
    <item>
      <title>Winrs Local Command Execution</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_winrs_local_command_execution/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_winrs_local_command_execution/</guid>
      <description>
        
          
            Detects the execution of Winrs.exe where it is used to execute commands locally.
Commands executed this way are launched under Winrshost.exe and can represent proxy execution used for defense evasion or lateral movement.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Wlrmdr.EXE Uncommon Argument Or Child Process</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wlrmdr_uncommon_child_process/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wlrmdr_uncommon_child_process/</guid>
      <description>
        
          
            Detects the execution of &#34;Wlrmdr.exe&#34; with the &#34;-u&#34; command line flag which allows anything passed to it to be an argument of the ShellExecute API, which would allow an attacker to execute arbitrary binaries.
This detection also focuses on any uncommon child processes spawned from &#34;Wlrmdr.exe&#34; as a supplement for those that posses &#34;ParentImage&#34; telemetry.

          
          
        
      </description>
    </item>
    
    <item>
      <title>WMIC Loading Scripting Libraries</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_wmic_remote_xsl_scripting_dlls/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_wmic_remote_xsl_scripting_dlls/</guid>
      <description>
        
          
            Detects threat actors proxy executing code and bypassing application controls by leveraging wmic and the `/FORMAT` argument switch to download and execute an XSL file (i.e js, vbs, etc).
It could be an indicator of SquiblyTwo technique, which uses Windows Management Instrumentation (WMI) to execute malicious code.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Writing Of Malicious Files To The Fonts Folder</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_hiding_malware_in_fonts_folder/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_hiding_malware_in_fonts_folder/</guid>
      <description>
        
          
            Monitors for the hiding possible malicious files in the C:\Windows\Fonts\ location. This folder doesn&#39;t require admin privillege to be written and executed from.
          
          
        
      </description>
    </item>
    
    <item>
      <title>WSL Child Process Anomaly</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wsl_child_processes_anomalies/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wsl_child_processes_anomalies/</guid>
      <description>
        
          
            Detects uncommon or suspicious child processes spawning from a WSL process. This could indicate an attempt to evade parent/child relationship detections or persistence attempts via cron using WSL
          
          
        
      </description>
    </item>
    
    <item>
      <title>WSL Kali-Linux Usage</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wsl_kali_linux_usage/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wsl_kali_linux_usage/</guid>
      <description>
        
          
            Detects the use of Kali Linux through Windows Subsystem for Linux
          
          
        
      </description>
    </item>
    
    <item>
      <title>XBAP Execution From Uncommon Locations Via PresentationHost.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_presentationhost_uncommon_location_exec/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_presentationhost_uncommon_location_exec/</guid>
      <description>
        
          
            Detects the execution of &#34;.xbap&#34; (Browser Applications) files via PresentationHost.EXE from an uncommon location. These files can be abused to run malicious &#34;.xbap&#34; files any bypass AWL

          
          
        
      </description>
    </item>
    
    <item>
      <title>XSL Script Execution Via WMIC.EXE</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_xsl_script_processing/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_xsl_script_processing/</guid>
      <description>
        
          
            Detects the execution of WMIC with the &#34;format&#34; flag to potentially load local XSL files.
Adversaries abuse this functionality to execute arbitrary files while potentially bypassing application whitelisting defenses.
Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML files.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Xwizard.EXE Execution From Non-Default Location</title>
      <link>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_xwizard_execution_non_default_location/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_xwizard_execution_non_default_location/</guid>
      <description>
        
          
            Detects the execution of Xwizard tool from a non-default directory.
When executed from a non-default directory, this utility can be abused in order to side load a custom version of &#34;xwizards.dll&#34;.

          
          
        
      </description>
    </item>
    
    <item>
      <title>ZxShell Malware</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2014/ta/axiom/proc_creation_win_apt_zxshell/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2014/ta/axiom/proc_creation_win_apt_zxshell/</guid>
      <description>
        
          
            Detects a ZxShell start by the called and well-known function name
          
          
        
      </description>
    </item>
    
  </channel>
</rss>
