Robuta

Sponsor of the Day: Jerkmate
https://detection.fyi/mbabinski/sigma-rules/2023_impacket/atexec/win_file_creation_impacket_atexec/ Impacket AtExec Suspicious Temp File Creation | Detection.FYI Detects Atexec.py (Impacket) suspicious file creation in Windows temp directory. file creation detectionsuspicioustempfyi https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sysinternals_psexec_service/ PsExec Service File Creation | Detection.FYI Detects default PsExec service filename which indicates PsExec service installation and execution file creation detectionservicefyi https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_frombase64string_archive/ Suspicious FromBase64String Usage On Gzip Archive - Process Creation | Detection.FYI Detects attempts of decoding a base64 Gzip archive via PowerShell. This technique is often used as a method to load malicious content into memory afterward. creation detection fyisuspicioususagegziparchive https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_remcom_service/ RemCom Service File Creation | Detection.FYI Detects default RemCom service filename which indicates RemCom service installation and execution file creation detectionservicefyi https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_wdac_policy_creation/ Potentially Suspicious WDAC Policy File Creation | Detection.FYI Detects suspicious Windows Defender Application Control (WDAC) policy file creation from abnormal processes that could be abused by attacker to block EDR/AV … file creation detectionpotentially suspiciouswdacpolicyfyi https://detection.fyi/sigmahq/sigma/emerging-threats/2024/ta/forest-blizzard/file_event_win_apt_forest_blizzard_constrained_js/ Forest Blizzard APT - JavaScript Constrained File Creation | Detection.FYI Detects the creation of JavaScript files inside of the DriverStore directory. Forest Blizzard used this to exploit the CVE-2022-38028 vulnerability in Windows … file creation detectionforest blizzardaptjavascriptconstrained https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-31324/file_event_win_sap_netweaver_webshell_creation/ Potential SAP NetWeaver Webshell Creation | Detection.FYI Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as … creation detection fyisap netweaverpotentialwebshell https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_download_com_cradles/ Potential COM Objects Download Cradles Usage - Process Creation | Detection.FYI Detects usage of COM objects that can be abused to download files in PowerShell by CLSID creation detection fyiobjects downloadpotentialcradlesusage https://detection.fyi/sigmahq/sigma/emerging-threats/2023/exploits/cve-2023-36874/file_event_win_exploit_cve_2023_36874_wermgr_creation/ Potential CVE-2023-36874 Exploitation - Fake Wermgr.Exe Creation | Detection.FYI Detects the creation of a file named creation detection fyipotential cve2023exploitationfake https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_create_non_existent_dlls/ Creation Of Non-Existent System DLL | Detection.FYI Detects creation of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by … non existentdetection fyicreationsystemdll https://detection.fyi/sigmahq/sigma/linux/auditd/syscall/lnx_auditd_create_account/ Creation Of An User Account | Detection.FYI Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the … account detection fyicreationuser https://detection.fyi/mbabinski/sigma-rules/2022_renamesystemutilities/file_creation_exe_in_temp_directories_4663/ File Creation of Executables in Temp Folders (Event 4663) | Detection.FYI Detects creation of files potentially matching attempts to copy executables to temporary directories to hide usage. file creationdetection fyiexecutablestempfolders https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_aspnet_temp_files/ Assembly DLL Creation Via AspNetCompiler | Detection.FYI Detects the creation of new DLL assembly files by creation viadetection fyiassemblydll https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_creating_number_of_resources_detection/ Number Of Resource Creation Or Deployment Activities | Detection.FYI Number of VM creations or deployment activities occur in Azure via the azureactivity log. resource creationdetection fyinumberdeploymentactivities https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_curl_and_powershell_combo/ Scheduled Task Creation with Curl and PowerShell Execution Combo | Detection.FYI Detects the creation of a scheduled task using schtasks.exe, potentially in combination with curl for downloading payloads and PowerShell for executing them. … scheduled taskdetection fyicreationcurlpowershell https://detection.fyi/sigmahq/sigma/windows/create_remote_thread/create_remote_thread_win_susp_uncommon_source_image/ Remote Thread Creation By Uncommon Source Image | Detection.FYI Detects uncommon processes creating remote threads. source imagedetection fyiremotethreadcreation https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_disable_administrative_share/ Disable Administrative Share Creation at Startup | Detection.FYI Administrative shares are hidden network shares created by Microsoft Windows NT operating systems that grant system administrators remote access to every disk … startup detection fyidisableadministrativesharecreation https://detection.fyi/sigmahq/sigma/emerging-threats/2020/exploits/cve-2020-1048/proc_creation_win_exploit_cve_2020_1048/ Suspicious PrinterPorts Creation (CVE-2020-1048) | Detection.FYI Detects new commands that add new printer port which point to suspicious file cve 2020detection fyisuspiciouscreation1048 https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_werfault_dll_hijacking/ Creation of WerFault.exe/Wer.dll in Unusual Folder | Detection.FYI Detects the creation of a file named detection fyicreationexewerdll https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_file_executable_detected/ Sysmon File Executable Creation Detected | Detection.FYI Triggers on any Sysmon detected detection fyifile executablesysmoncreation https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_desktop_txt/ Suspicious Creation TXT File in User Desktop | Detection.FYI Ransomware create txt file in the user Desktop txt filedetection fyisuspiciouscreationuser https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-31324/file_event_lnx_sap_netweaver_webshell_creation/ Potential SAP NetWeaver Webshell Creation - Linux | Detection.FYI Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as … linux detection fyisap netweaverpotentialwebshellcreation https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_add_local_hidden_user/ Creation of a Local Hidden User Account by Registry | Detection.FYI Sysmon registry detection of a local hidden user account. registry detection fyiuser accountcreationlocalhidden