Rule Library

Sigma Rules

1,774 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Potential SmadHook.DLL Sideloading

Detects potential DLL sideloading of "SmadHook.dll", a DLL used by SmadAV antivirus

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Jun 01windows
Detectionmediumtest

Potential SolidPDFCreator.DLL Sideloading

Detects potential DLL sideloading of "SolidPDFCreator.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Sun May 07windows
Detectionmediumtest

Third Party Software DLL Sideloading

Detects DLL sideloading of DLLs that are part of third party software (zoom, discord....etc)

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 17windows
Detectionmediumtest

Potential Vivaldi_elf.DLL Sideloading

Detects potential DLL sideloading of "vivaldi_elf.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Aug 03windows
Detectionmediumtest

VMGuestLib DLL Sideload

Detects DLL sideloading of VMGuestLib.dll by the WmiApSrv service.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Thu Dec 01windows
Detectionmediumtest

VMMap Signed Dbghelp.DLL Potential Sideloading

Detects potential DLL sideloading of a signed dbghelp.dll by the Sysinternals VMMap.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Tue Sep 05windows
Detectionhightest

VMMap Unsigned Dbghelp.DLL Potential Sideloading

Detects potential DLL sideloading of an unsigned dbghelp.dll by the Sysinternals VMMap.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Fri Jul 28windows
Detectionhightest

Potential DLL Sideloading Via VMware Xfer

Detects loading of a DLL by the VMware Xfer utility from the non-default directory which may be an attempt to sideload arbitrary DLL

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionhightest

Potential Waveedit.DLL Sideloading

Detects potential DLL sideloading of "waveedit.dll", which is part of the Nero WaveEditor audio editing software.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Wed Jun 14windows
Detectionmediumtest

Potential Wazuh Security Platform DLL Sideloading

Detects potential DLL side loading of DLLs that are part of the Wazuh security platform

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Mon Mar 13windows
Detectionmediumtest

Potential WWlib.DLL Sideloading

Detects potential DLL sideloading of "wwlib.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu May 18windows
Detectionhighexperimental

BaaUpdate.exe Suspicious DLL Load

Detects BitLocker Access Agent Update Utility (baaupdate.exe) loading DLLs from suspicious locations that are publicly writable which could indicate an attempt to lateral movement via BitLocker DCOM & COM Hijacking. This technique abuses COM Classes configured as INTERACTIVE USER to spawn processes in the context of the logged-on user's session. Specifically, it targets the BDEUILauncher Class (CLSID ab93b6f1-be76-4185-a488-a9001b105b94) which can launch BaaUpdate.exe, which is vulnerable to COM Hijacking when started with input parameters. This allows attackers to execute code in the user's context without needing to steal credentials or use additional techniques to compromise the account.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
Swachchhanda Shrawan Poudel (Nextron Systems)Sat Oct 18windows
Detectionmediumtest

DLL Load By System Process From Suspicious Locations

Detects when a system process (i.e. located in system32, syswow64, etc.) loads a DLL from a suspicious location or a location with permissive permissions such as "C:\Users\Public"

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1070 · Indicator Removal
Nasreddine Bencherchali (Nextron Systems)Sun Jul 17windows
Detectionhighstable

Suspicious Unsigned Thor Scanner Execution

Detects loading and execution of an unsigned thor scanner binary.

WindowsImage Load (DLL)
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Sun Oct 29windows
Detectionhightest

UAC Bypass Using Iscsicpl - ImageLoad

Detects the "iscsicpl.exe" UAC bypass technique that leverages a DLL Search Order hijacking technique to load a custom DLL's from temp or a any user controlled location in the users %PATH%

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Nasreddine Bencherchali (Nextron Systems)Sun Jul 17windows
Detectionmediumexperimental

MMC Loading Script Engines DLLs

Detects when the Microsoft Management Console (MMC) loads the DLL libraries like vbscript, jscript etc which might indicate an attempt to execute malicious scripts within a trusted system process for bypassing application whitelisting or defense evasion.

WindowsImage Load (DLL)
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1218.014 · MMC
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionhighexperimental

Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location

Detects loading of dbgcore.dll or dbghelp.dll from uncommon locations such as user directories. These DLLs contain the MiniDumpWriteDump function, which can be abused for credential dumping purposes or in some cases for evading EDR/AV detection by suspending processes.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003 · OS Credential DumpingTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionhighexperimental

Trusted Path Bypass via Windows Directory Spoofing

Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g "C:\Windows \System32") which can bypass Windows trusted path verification. This technique tricks Windows into treating the path as trusted, allowing malicious DLLs to load with high integrity privileges bypassing UAC.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.007 · Path Interception by PATH Environment Variable+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jun 17windows
Detectionhightest

Uncommon Network Connection Initiated By Certutil.EXE

Detects a network connection initiated by the certutil.exe utility. Attackers can abuse the utility in order to download malware or additional payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Fri Sep 02windows
Detectionhightest

Outbound Network Connection Initiated By Cmstp.EXE

Detects a network connection initiated by Cmstp.EXE Its uncommon for "cmstp.exe" to initiate an outbound network connection. Investigate the source of such requests to determine if they are malicious.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.003 · CMSTP
Nasreddine Bencherchali (Nextron Systems)Tue Aug 30windows
Detectionmediumtest

Network Connection Initiated To AzureWebsites.NET By Non-Browser Process

Detects an initiated network connection by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web ServiceT1102.001 · Dead Drop Resolver
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionmediumtest

Network Connection Initiated To Cloudflared Tunnels Domains

Detects network connections to Cloudflared tunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling
Kamran Saifullah+1Mon May 27windows
Detectionhighstable

Network Communication With Crypto Mining Pool

Detects initiated network connections to crypto mining pools

WindowsNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)+1Tue Oct 26windows
Detectionhightest

New Connection Initiated To Potential Dead Drop Resolver Domain

Detects an executable, which is not an internet browser or known application, initiating network connections to legit popular websites, which were seen to be used as dead drop resolvers in previous attacks. In this context attackers leverage known websites such as "facebook", "youtube", etc. In order to pass through undetected.

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web ServiceT1102.001 · Dead Drop Resolver
Sorina Ionescu+1Wed Aug 17windows
Detectionhightest

Suspicious Dropbox API Usage

Detects an executable that isn't dropbox but communicates with the Dropbox API

WindowsNetwork Connection
TA0011 · Command and ControlTA0010 · ExfiltrationT1105 · Ingress Tool TransferT1567.002 · Exfiltration to Cloud Storage
Florian Roth (Nextron Systems)Wed Apr 20windows
Detectionmediumtest

Suspicious Network Connection to IP Lookup Service APIs

Detects external IP address lookups by non-browser processes via services such as "api.ipify.org". This could be indicative of potential post compromise internet test activity.

WindowsNetwork Connection
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
Janantha Marasinghe+1Mon Apr 24windows
Detectionlowtest

Network Connection Initiated To Mega.nz

Detects a network connection initiated by a binary to "api.mega.co.nz". Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.

WindowsNetwork Connection
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Florian Roth (Nextron Systems)Mon Dec 06windows
Detectionhightest

Process Initiated Network Connection To Ngrok Domain

Detects an executable initiating a network connection to "ngrok" domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communication with such domains can be legitimate, often times is a sign of either data exfiltration by malicious actors or additional download.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling+1
Florian Roth (Nextron Systems)Sat Jul 16windows
Detectionhightest

Communication To Ngrok Tunneling Service Initiated

Detects an executable initiating a network connection to "ngrok" tunneling domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communication with such domains can be legitimate, often times is a sign of either data exfiltration by malicious actors or additional download.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1568.002 · Domain Generation Algorithms+4
Florian Roth (Nextron Systems)Thu Nov 03windows
Detectionmediumtest

Network Communication Initiated To Portmap.IO Domain

Detects an executable accessing the portmap.io domain, which could be a sign of forbidden C2 traffic or data exfiltration by malicious actors

WindowsNetwork Connection
T1041 · Exfiltration Over C2 ChannelTA0011 · Command and ControlT1090.002 · External ProxyTA0010 · Exfiltration
Florian Roth (Nextron Systems)Fri May 31windows
Detectionmediumtest

Suspicious Non-Browser Network Communication With Telegram API

Detects an a non-browser process interacting with the Telegram API which could indicate use of a covert C2

WindowsNetwork Connection
TA0011 · Command and ControlTA0010 · ExfiltrationT1102 · Web ServiceT1567 · Exfiltration Over Web Service+1
Nasreddine Bencherchali (Nextron Systems)Fri May 19windows
Detectionhightest

Network Connection Initiated By Eqnedt32.EXE

Detects network connections from the Equation Editor process "eqnedt32.exe".

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Execution
Max Altgelt (Nextron Systems)Thu Apr 14windows
Detectionhighexperimental

Network Connection Initiated via Finger.EXE

Detects network connections via finger.exe, which can be abused by threat actors to retrieve remote commands for execution on Windows devices. In one ClickFix malware campaign, adversaries leveraged the finger protocol to fetch commands from a remote server. Since the finger utility is not commonly used in modern Windows environments, its presence already raises suspicion. Investigating such network connections can also help identify potential malicious infrastructure used by threat actors

WindowsNetwork Connection
TA0011 · Command and ControlT1071.004 · DNSTA0002 · ExecutionT1059.003 · Windows Command Shell
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Nov 19windows
Detectionmediumtest

Office Application Initiated Network Connection To Non-Local IP

Detects an office application (Word, Excel, PowerPoint) that initiate a network connection to a non-private IP addresses. This rule aims to detect traffic similar to one seen exploited in CVE-2021-42292. This rule will require an initial baseline and tuning that is specific to your organization.

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Execution
Christopher Peacock+4Wed Nov 10windows
Detectionmediumtest

Office Application Initiated Network Connection Over Uncommon Ports

Detects an office suit application (Word, Excel, PowerPoint, Outlook) communicating to target systems over uncommon ports.

WindowsNetwork Connection
TA0005 · Defense EvasionTA0011 · Command and Control
X__Junior (Nextron Systems)+1Wed Jul 12windows
Detectionhightest

RDP to HTTP or HTTPS Target Ports

Detects svchost hosting RDP termsvcs communicating to target systems on TCP port 80 or 443

WindowsNetwork Connection
TA0011 · Command and ControlT1572 · Protocol TunnelingTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol+1
Florian Roth (Nextron Systems)Fri Apr 29windows
Detectionmediumtest

Rundll32 Internet Connection

Detects a rundll32 that communicates with public IP addresses

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.011 · Rundll32TA0002 · Execution
Florian Roth (Nextron Systems)Sat Nov 04windows
Detectionhightest

Suspicious Network Connection Binary No CommandLine

Detects suspicious network connections made by a well-known Windows binary run with no command line parameters

WindowsNetwork Connection
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Sun Jul 03windows
Detectionhightest

Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder

Detects executables located in potentially suspicious directories initiating network connections towards file sharing domains.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Thu Aug 30windows
Detectionhightest

Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location

Detects a network connection initiated by programs or processes running from suspicious or uncommon files system locations.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Sun Mar 19windows
Detectionhightest

Potentially Suspicious Malware Callback Communication

Detects programs that connect to known malware callback ports based on statistical analysis from two different sandbox system databases

WindowsNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
Florian Roth (Nextron Systems)Sun Mar 19windows
Detectionmediumtest

Communication To Uncommon Destination Ports

Detects programs that connect to uncommon destination ports

WindowsNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
Florian Roth (Nextron Systems)Sun Mar 19windows
Detectionmediumtest

Suspicious Wordpad Outbound Connections

Detects a network connection initiated by "wordpad.exe" over uncommon destination ports. This might indicate potential process injection activity from a beacon or similar mechanisms.

WindowsNetwork Connection
TA0005 · Defense EvasionTA0011 · Command and Control
X__Junior (Nextron Systems)Wed Jul 12windows
Detectionhightest

Outbound Network Connection Initiated By Script Interpreter

Detects a script interpreter wscript/cscript opening a network connection to a non-local network. Adversaries may use script to download malicious payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Sun Aug 28windows
Detectioncriticaltest

CobaltStrike Named Pipe

Detects the creation of a named pipe as used by CobaltStrike

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+1Tue May 25windows
Detectioncriticaltest

CobaltStrike Named Pipe Pattern Regex

Detects the creation of a named pipe matching a pattern used by CobaltStrike Malleable C2 profiles

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Fri Jul 30windows
Detectionhightest

CobaltStrike Named Pipe Patterns

Detects the creation of a named pipe with a pattern found in CobaltStrike malleable C2 profiles

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectionstp.1k
Florian Roth (Nextron Systems)+1Fri Jul 30windows
Detectionhightest

HackTool - CoercedPotato Named Pipe Creation

Detects the pattern of a pipe name as used by the hack tool CoercedPotato

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Wed Oct 11windows