Rule Library

Sigma Rules

477 rules found for "François Hubaut"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Operation Wocao Activity - Security

Detects activity mentioned in Operation Wocao report

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0007 · DiscoveryT1012 · Query Registry+7
Florian Roth (Nextron Systems)+1Fri Dec 202019
Emerging Threatcriticaltest

ProxyLogon Reset Virtual Directories Based On IIS Log

When exploiting this vulnerability with CVE-2021-26858, an SSRF attack is used to manipulate virtual directories

Web Server Log
cve.2021-26858detection.emerging-threatsTA0001 · Initial AccessT1190 · Exploit Public-Facing Application
François HubautTue Aug 102021
Emerging Threatcriticaltest

CVE-2021-31979 CVE-2021-33771 Exploits

Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum

WindowsRegistry Set
TA0001 · Initial AccessTA0002 · ExecutionTA0006 · Credential AccessT1566 · Phishing+4
Sittikorn S+1Fri Jul 162021
Emerging Threatmediumtest

Potential CVE-2021-42278 Exploitation Attempt

The attacker creates a computer object using those permissions with a password known to her. After that she clears the attribute ServicePrincipalName on the computer object. Because she created the object (CREATOR OWNER), she gets granted additional permissions and can do many changes to the object.

Windowssystem
TA0006 · Credential AccessT1558.003 · Kerberoastingcve.2021-42278detection.emerging-threats
François HubautWed Dec 152021
Emerging Threatmediumtest

Potential CVE-2021-42287 Exploitation Attempt

The attacker creates a computer object using those permissions with a password known to her. After that she clears the attribute ServicePrincipalName on the computer object. Because she created the object (CREATOR OWNER), she gets granted additional permissions and can do many changes to the object.

Windowssystem
TA0006 · Credential AccessT1558.003 · Kerberoastingdetection.emerging-threatscve.2021-42287
François HubautWed Dec 152021
Emerging Threathightest

Blackbyte Ransomware Registry

Detects specific windows registry modifications made by BlackByte ransomware variants. BlackByte set three different registry values to escalate privileges and begin setting the stage for lateral movement and encryption. This rule triggers when any of the following registry keys are set to DWORD 1, however all three should be investigated as part of a larger BlackByte ransomware detection and response effort.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registrydetection.emerging-threats
François HubautMon Jan 242021
Emerging Threatcriticaltest

Potential Conti Ransomware Activity

Detects a specific command used by the Conti ransomware group

WindowsProcess Creation
TA0040 · ImpactS0575 · S0575T1486 · Data Encrypted for Impactdetection.emerging-threats
François HubautTue Oct 122021
Emerging Threathightest

Potential Conti Ransomware Database Dumping Activity Via SQLCmd

Detects a command used by conti to dump database

WindowsProcess Creation
TA0009 · CollectionT1005 · Data from Local Systemdetection.emerging-threats
François HubautMon Aug 162021
Emerging Threathightest

Potential CVE-2022-29072 Exploitation Attempt

Detects potential exploitation attempts of CVE-2022-29072, a 7-Zip privilege escalation and command execution vulnerability. 7-Zip version 21.07 and earlier on Windows allows privilege escalation (CVE-2022-29072) and command execution when a file with the .7z extension is dragged to the Help>Contents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process.

WindowsProcess Creation
TA0002 · Executioncve.2022-29072detection.emerging-threats
François HubautSun Apr 172022
Emerging Threathightest

Potential Exploitation of CVE-2024-37085 - Suspicious Creation Of ESX Admins Group

Detects execution of the "net.exe" command in order to add a group named "ESX Admins". This could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor. VMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named "ESX Admins" to have full administrative access by default.

WindowsProcess Creation
TA0002 · Executioncve.2024-37085detection.emerging-threats
François HubautMon Jul 292024
Threat Huntlowtest

Firewall Rule Modified In The Windows Firewall Exception List

Detects when a rule has been modified in the Windows firewall exception list

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautSat Feb 19windows
Threat Huntlowtest

Access To Browser Credential Files By Uncommon Applications

Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
François Hubaut+1Sat Apr 09windows
Threat Huntlowtest

Access To Windows Outlook Mail Files By Uncommon Applications

Detects file access requests to Windows Outlook Mail by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1070.008 · Clear Mailbox DataTA0005 · Defense Evasiondetection.threat-hunting
François HubautFri May 10windows
Threat Huntmediumtest

Access To Sysvol Policies Share By Uncommon Process

Detects file access requests to the Windows Sysvol Policies Share by uncommon processes

Windowsfile_access
TA0006 · Credential AccessT1552.006 · Group Policy Preferencesdetection.threat-hunting
François HubautThu Dec 21windows
Threat Huntlowtest

Access To .Reg/.Hive Files By Uncommon Applications

Detects file access requests to files ending with either the ".hive"/".reg" extension, usually associated with Windows Registry backups.

Windowsfile_access
T1112 · Modify RegistryTA0005 · Defense EvasionTA0003 · Persistencedetection.threat-hunting
François HubautFri Sep 15windows
Threat Huntlowtest

Unattend.XML File Access Attempt

Detects attempts to access the "unattend.xml" file, where credentials might be stored. This file is used during the unattended windows install process.

Windowsfile_access
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
François HubautMon Jul 22windows
Threat Huntlowtest

File Creation Date Changed to Another Year

Detects when the file creation time is changed to a year before 2020. Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system. Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity. In order to use this rule in production, it is recommended first baseline normal behavior in your environment and then tune the rule accordingly. Hunting Recommendation: Focus on files with creation times set to years significantly before the current date, especially those in user-writable directories. Correlate with process execution logs to identify the source of the modification and investigate any unsigned or suspicious binaries involved.

WindowsFile Change
T1070.006 · TimestompTA0005 · Defense Evasiondetection.threat-hunting
François Hubaut+1Fri Aug 12windows
Threat Huntlowtest

ADS Zone.Identifier Deleted

Detects the deletion of the "Zone.Identifier" ADS. Attackers can leverage this in order to bypass security restrictions that make use of the ADS such as Microsoft Office apps.

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletiondetection.threat-hunting
François HubautMon Sep 04windows
Threat Huntlowtest

Creation of an Executable by an Executable

Detects the creation of an executable by another executable.

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malwaredetection.threat-hunting
François HubautWed Mar 09windows
Threat Huntmediumtest

Non-DLL Extension File Renamed With DLL Extension

Detects rename operations of files with non-DLL extensions to files with a DLL extension. This is often performed by malware in order to avoid initial detections based on extensions.

WindowsFile Rename
TA0005 · Defense EvasionT1036.008 · Masquerade File Typedetection.threat-hunting
François HubautSat Feb 19windows
Threat Huntlowtest

Amsi.DLL Load By Uncommon Process

Detects loading of Amsi.dll by uncommon processes

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0040 · ImpactT1490 · Inhibit System Recoverydetection.threat-hunting
François HubautSun Mar 12windows
Threat Huntlowtest

Msiexec.EXE Initiated Network Connection Over HTTP

Detects a network connection initiated by an "Msiexec.exe" process over port 80 or 443. Adversaries might abuse "msiexec.exe" to install and execute remotely hosted packages. Use this rule to hunt for potentially anomalous or suspicious communications.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.007 · Msiexecdetection.threat-hunting
François HubautSun Jan 16windows
Threat Huntmediumtest

Windows Mail App Mailbox Access Via PowerShell Script

Detects PowerShell scripts that try to access the default Windows MailApp MailBox. This indicates manipulation of or access to the stored emails of a user. E.g. this could be used by an attacker to exfiltrate or delete the content of the emails.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.008 · Clear Mailbox Datadetection.threat-hunting
François HubautSat Jul 08windows
Threat Huntlowtest

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock

Detects when a powershell script contains calls to the "New-NetFirewallRule" cmdlet in order to add a new firewall rule with an "Allow" action.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautFri May 10windows
Threat Huntmediumtest

SMB over QUIC Via PowerShell Script

Detects the mounting of Windows SMB shares over QUIC, which can be an unexpected event in some enterprise environments

WindowsPowerShell Script
TA0008 · Lateral MovementT1570 · Lateral Tool Transferdetection.threat-hunting
François HubautFri Jul 21windows
Threat Huntmediumtest

Potential Registry Reconnaissance Via PowerShell Script

Detects PowerShell scripts with potential registry reconnaissance capabilities. Adversaries may interact with the Windows registry to gather information about the system credentials, configuration, and installed software.

WindowsPowerShell Script
TA0007 · DiscoveryT1012 · Query RegistryT1007 · System Service Discoverydetection.threat-hunting
François HubautSun Jul 02windows
Threat Huntlowtest

Use Of Remove-Item to Delete File - ScriptBlock

PowerShell Remove-Item with -Path to delete a file or a folder with "-Recurse"

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.004 · File Deletiondetection.threat-hunting
François HubautSat Jan 15windows
Threat Huntmediumtest

Potential Data Exfiltration Over SMTP Via Send-MailMessage Cmdlet

Detects the execution of a PowerShell script with a call to the "Send-MailMessage" cmdlet along with the "-Attachments" flag. This could be a potential sign of data exfiltration via Email. Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.

WindowsPowerShell Script
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocoldetection.threat-hunting
François HubautMon Sep 26windows
Threat Huntmediumtest

Powershell Token Obfuscation - Powershell

Detects TOKEN OBFUSCATION technique from Invoke-Obfuscation in Powershell scripts. Use this rule as a threat-hunting baseline to find obfuscated scripts in your environment. Once tested and tuned, consider deploying a production detection rule based on this hunting rule.

WindowsPowerShell Script
TA0005 · Defense EvasionT1027.009 · Embedded Payloadsdetection.threat-hunting
François HubautTue Dec 27windows
Threat Huntlowtest

Set Files as System Files Using Attrib.EXE

Detects the execution of "attrib" with the "+s" flag to mark files as system files

WindowsProcess Creation
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directoriesdetection.threat-hunting
François HubautFri Feb 04windows
Threat Huntlowtest

CMD Shell Output Redirect

Detects the use of the redirection character ">" to redirect information on the command line. This technique is sometimes used by malicious actors in order to redirect the output of reconnaissance commands such as "hostname" and "dir" to files for future exfiltration.

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discoverydetection.threat-hunting
François HubautSat Jan 22windows
Threat Huntmediumtest

Curl.EXE Execution With Custom UserAgent

Detects execution of curl.exe with custom useragent options

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocolsdetection.threat-hunting
François HubautSun Jan 23windows
Threat Huntmediumtest

Potential DLL Sideloading Activity Via ExtExport.EXE

Detects the execution of "Extexport.exe".A utility that is part of the Internet Explorer browser and is used to export and import various settings and data, particularly when switching between Internet Explorer and other web browsers like Firefox. It allows users to transfer bookmarks, browsing history, and other preferences from Internet Explorer to Firefox or vice versa. It can be abused as a tool to side load any DLL. If a folder is provided in the command line it'll load any DLL with one of the following names "mozcrt19.dll", "mozsqlite3.dll", or "sqlite.dll". Arbitrary DLLs can also be loaded if a specific number of flags was provided.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.threat-hunting
François Hubaut+1Fri Nov 26windows
Threat Huntmediumtest

Microsoft Workflow Compiler Execution

Detects the execution of Microsoft Workflow Compiler, which may permit the execution of arbitrary unsigned code.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1218 · System Binary Proxy Execution+1
Nik Seetharaman+1Wed Jan 16windows
Threat Huntmediumtest

SMB over QUIC Via Net.EXE

Detects the mounting of Windows SMB shares over QUIC, which can be an unexpected event in some enterprise environments.

WindowsProcess Creation
TA0008 · Lateral MovementT1570 · Lateral Tool Transferdetection.threat-hunting
François HubautFri Jul 21windows
Threat Huntlowtest

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet

Detects calls to the "New-NetFirewallRule" cmdlet from PowerShell in order to add a new firewall rule with an "Allow" action.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewalldetection.threat-hunting
François HubautFri May 03windows
Threat Huntlowtest

SC.EXE Query Execution

Detects execution of "sc.exe" to query information about registered services on the system

WindowsProcess Creation
TA0007 · DiscoveryT1007 · System Service Discoverydetection.threat-hunting
François HubautMon Dec 06windows
Threat Huntmediumtest

Potential CommandLine Obfuscation Using Unicode Characters

Detects potential CommandLine obfuscation using unicode characters. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Informationdetection.threat-hunting
François Hubaut+1Sat Jan 15windows
Threat Huntmediumtest

Elevated System Shell Spawned

Detects when a shell program such as the Windows command prompt or PowerShell is launched with system privileges. Use this rule to hunt for potential suspicious processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter+1
Nasreddine Bencherchali (Nextron Systems)+1Thu Nov 23windows
Threat Huntmediumtest

Use Short Name Path in Command Line

Detects the use of short name paths (8.3 format) in command lines, which can be used to obfuscate paths or access restricted locations. Windows creates short 8.3 filenames (like PROGRA~1) for compatibility with MS-DOS-based or 16-bit Windows programs. When investigating, examine: - Commands using short paths to access sensitive directories or files - Web servers on Windows (especially Apache) where short filenames could bypass security controls - Correlation with other suspicious behaviors - baseline of short name usage in your environment and look for deviations

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributesdetection.threat-hunting
François Hubaut+1Sun Aug 07windows
Threat Huntlowexperimental

Potential Executable Run Itself As Sacrificial Process

Detects when an executable launches an identical instance of itself, a behavior often used to create a suspended “sacrificial” process for code injection or evasion. Investigate for indicators such as the process being started in suspended mode, rapid parent termination, memory manipulation (e.g., WriteProcessMemory, CreateRemoteThread), or unsigned binaries. Review command-line arguments, process ancestry, and network activity to confirm if this is legitimate behavior or process injection activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.threat-hunting
François HubautFri Oct 17windows
Threat Huntlowtest

Process Terminated Via Taskkill

Detects execution of "taskkill.exe" in order to stop a service or a process. Look for suspicious parents executing this command in order to hunt for potential malicious activity. Attackers might leverage this in order to conduct data destruction or data encrypted for impact on the data stores of services like Exchange and SQL Server.

WindowsProcess Creation
TA0040 · ImpactT1489 · Service Stopdetection.threat-hunting
François Hubaut+2Sun Dec 26windows
Threat Huntinformationaltest

Suspicious Tasklist Discovery Command

Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discoverydetection.threat-hunting
François HubautSat Dec 11windows
Threat Huntmediumexperimental

FTP Connection Open Attempt Via Winscp CLI

Detects the execution of Winscp with the "-command" and the "open" flags in order to open an FTP connection. Akira ransomware was seen using this technique in order to exfiltrate data.

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocoldetection.threat-hunting
François HubautSun Oct 12windows
Threat Huntmediumexperimental

Winscp Execution From Non Standard Folder

Detects the execution of Winscp from an a non standard folder. This could indicate the execution of Winscp portable.

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocoldetection.threat-hunting
François HubautSun Oct 12windows