Rule Library

Sigma Rules

638 rules found for "Florian Roth (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

NetNTLM Downgrade Attack - Registry

Detects NetNTLM downgrade attack

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1112 · Modify Registry
Florian Roth (Nextron Systems)+2Tue Mar 20windows
Detectioncriticaltest

Potential Credential Dumping Via LSASS SilentProcessExit Technique

Detects changes to the Registry in which a monitor program gets registered to dump the memory of the lsass.exe process

WindowsRegistry Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Fri Feb 26windows
Detectioncriticaltest

Sticky Key Like Backdoor Usage - Registry

Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login screen

WindowsRegistry Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.008 · Accessibility Features2014-11-003 · CAR 2014-11-003+1
Florian Roth (Nextron Systems)+2Thu Mar 15windows
Detectionhightest

Suspicious Run Key from Download

Detects the suspicious RUN keys created by software located in Download or temporary Outlook/Internet Explorer directories

WindowsRegistry Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)+1Tue Oct 01windows
Detectionhightest

DLL Load via LSASS

Detects a method to load DLL via LSASS process using an undocumented Registry key

WindowsRegistry Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1547.008 · LSASS Driver
Florian Roth (Nextron Systems)Wed Oct 16windows
Detectionhightest

Service Binary in Suspicious Folder

Detect the creation of a service with a service binary located in a suspicious directory

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Florian Roth (Nextron Systems)+1Mon May 02windows
Detectionhightest

Disabled Windows Defender Eventlog

Detects the disabling of the Windows Defender eventlog as seen in relation to Lockbit 3.0 infections

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Mon Jul 04windows
Detectionhightest

New DNS ServerLevelPluginDll Installed

Detects the installation of a DNS plugin DLL via ServerLevelPluginDll parameter in registry, which can be used to execute code in context of the DNS server (restart required)

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+1
Florian Roth (Nextron Systems)Mon May 08windows
Detectionhightest

Potential Persistence Via GlobalFlags

Detects registry persistence technique using the GlobalFlags and SilentProcessExit keys

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1546.012 · Image File Execution Options Injection+1
Karneades+2Wed Apr 11windows
Detectionmediumtest

Suspicious PowerShell In Registry Run Keys

Detects potential PowerShell commands or code within registry run keys

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
François Hubaut+1Thu Mar 17windows
Detectionmediumtest

Suspicious Keyboard Layout Load

Detects the keyboard preload installation with a suspicious keyboard layout, e.g. Chinese, Iranian or Vietnamese layout load in user session on systems maintained by US staff only

WindowsRegistry Set
TA0042 · Resource DevelopmentT1588.002 · Tool
Florian Roth (Nextron Systems)Sat Oct 12windows
Detectionhightest

Suspicious Printer Driver Empty Manufacturer

Detects a suspicious printer driver installation with an empty Manufacturer value

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574 · Hijack Execution Flow+1
Florian Roth (Nextron Systems)Wed Jul 01windows
Detectionhightest

Registry Persistence via Explorer Run Key

Detects a possible persistence mechanism using RUN key for Windows Explorer and pointing to a suspicious folder

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)+1Wed Jul 18windows
Detectionhighexperimental

New RUN Key Pointing to Suspicious Folder

Detects suspicious new RUN key element pointing to an executable in a suspicious folder

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)+3Sat Aug 25windows
Detectionhightest

UAC Bypass via Event Viewer

Detects UAC bypass method using Windows event viewer

WindowsRegistry Set
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control2019-04-001 · CAR 2019-04-001
Florian Roth (Nextron Systems)Sun Mar 19windows
Detectionhightest

VBScript Payload Stored in Registry

Detects VBScript content stored into registry keys as seen being used by UNC2452 group

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)Fri Mar 05windows
Detectionhightest

Suspicious Encoded Scripts in a WMI Consumer

Detects suspicious encoded payloads in WMI Event Consumers

WindowsWMI Event
TA0004 · Privilege EscalationTA0002 · ExecutionT1047 · Windows Management InstrumentationTA0003 · Persistence+1
Florian Roth (Nextron Systems)Wed Sep 01windows
Detectionhightest

Suspicious Scripting in a WMI Consumer

Detects suspicious commands that are related to scripting/powershell in WMI Event Consumers

WindowsWMI Event
TA0002 · ExecutionT1059.005 · Visual Basic
Florian Roth (Nextron Systems)+1Mon Apr 15windows
Emerging Threatcriticaltest

ZxShell Malware

Detects a ZxShell start by the called and well-known function name

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0005 · Defense EvasionT1218.011 · Rundll32+3
Florian Roth (Nextron Systems)+2Thu Jul 202014
Emerging Threatcriticaltest

Turla Group Commands May 2020

Detects commands used by Turla group as reported by ESET in May 2020

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionG0010 · G0010+5
Florian Roth (Nextron Systems)Tue May 262014
Emerging Threatcriticalstable

Exploit for CVE-2015-1641

Detects Winword starting uncommon sub process MicroScMgmt.exe as used in exploits for CVE-2015-1641

WindowsProcess Creation
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Locationcve.2015-1641detection.emerging-threats
Florian Roth (Nextron Systems)Thu Feb 222015
Emerging Threatmediumtest

Exploit for CVE-2017-0261

Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Thu Feb 222017
Emerging Threatcriticalstable

Droppers Exploiting CVE-2017-11882

Detects exploits that use CVE-2017-11882 to start EQNEDT32.EXE and other sub processes like mshta.exe

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Thu Nov 232017
Emerging Threatcriticaltest

Exploit for CVE-2017-8759

Detects Winword starting uncommon sub process csc.exe as used in exploits for CVE-2017-8759

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionT1204.002 · Malicious FileTA0001 · Initial Access+3
Florian Roth (Nextron Systems)Fri Sep 152017
Emerging Threathightest

Adwind RAT / JRAT

Detects javaw.exe in AppData folder as used by Adwind / JRAT

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScriptdetection.emerging-threats
Florian Roth (Nextron Systems)+3Fri Nov 102017
Emerging Threatcriticaltest

CosmicDuke Service Installation

Detects the installation of a service named "javamtsup" on the system. The CosmicDuke info stealer uses Windows services typically named "javamtsup" for persistence.

Windowssecurity
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1543.003 · Windows Service+2
Florian Roth (Nextron Systems)+2Mon Mar 272017
Emerging Threathightest

Fireball Archer Install

Detects Archer malware invocation via rundll32

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Sat Jun 032017
Emerging Threathightest

Malware Shellcode in Verclsid Target Process

Detects a process access to verclsid.exe that injects shellcode from a Microsoft Office application / VBA macro

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectiondetection.emerging-threats
John Lambert (tech)+1Sat Mar 042017
Emerging Threatcriticaltest

NotPetya Ransomware Activity

Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and Windows eventlogs are cleared using wevtutil

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32T1070.001 · Clear Windows Event LogsTA0006 · Credential Access+3
Florian Roth (Nextron Systems)+1Wed Jan 162017
Emerging Threathightest

Potential PlugX Activity

Detects the execution of an executable that is typically used by PlugX for DLL side loading starting from an uncommon location

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceS0013 · S0013TA0005 · Defense Evasion+2
Florian Roth (Nextron Systems)Mon Jun 122017
Emerging Threathightest

StoneDrill Service Install

This method detects a service install of the malicious Microsoft Network Realtime Inspection Service service described in StoneDrill report by Kaspersky

Windowssystem
TA0004 · Privilege EscalationTA0003 · PersistenceG0064 · G0064T1543.003 · Windows Service+1
Florian Roth (Nextron Systems)Tue Mar 072017
Emerging Threatcriticaltest

WannaCry Ransomware Activity

Detects WannaCry ransomware activity

WindowsProcess Creation
TA0008 · Lateral MovementT1210 · Exploitation of Remote ServicesTA0007 · DiscoveryT1083 · File and Directory Discovery+6
Florian Roth (Nextron Systems)+3Wed Jan 162017
Emerging Threathightest

Potential APT10 Cloud Hopper Activity

Detects potential process and execution activity related to APT10 Cloud Hopper operation

WindowsProcess Creation
TA0002 · ExecutionG0045 · G0045T1059.005 · Visual Basicdetection.emerging-threats
Florian Roth (Nextron Systems)Fri Apr 072017
Emerging Threathightest

Ps.exe Renamed SysInternals Tool

Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report

WindowsProcess Creation
TA0005 · Defense EvasionG0035 · DragonflyT1036.003 · Rename System Utilities2013-05-009 · CAR 2013-05-009+1
Florian Roth (Nextron Systems)Sun Oct 222017
Emerging Threathightest

Equation Group C2 Communication

Detects communication to C2 servers mentioned in the operational notes of the ShadowBroker leak of EquationGroup C2 tools

Firewall
TA0010 · ExfiltrationTA0011 · Command and ControlG0020 · G0020T1041 · Exfiltration Over C2 Channel+1
Florian Roth (Nextron Systems)Sat Apr 152017
Emerging Threatcriticaltest

Pandemic Registry Key

Detects Pandemic Windows Implant

WindowsRegistry Event
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.emerging-threats
Florian Roth (Nextron Systems)Thu Jun 012017
Emerging Threathightest

Turla Service Install

This method detects a service install of malicious services mentioned in Carbon Paper - Turla report by ESET

Windowssystem
TA0004 · Privilege EscalationTA0003 · PersistenceG0010 · G0010T1543.003 · Windows Service+1
Florian Roth (Nextron Systems)Fri Mar 312017
Emerging Threatcriticaltest

Turla PNG Dropper Service

This method detects malicious services mentioned in Turla PNG dropper report by NCC Group in November 2018

Windowssystem
TA0004 · Privilege EscalationTA0003 · PersistenceG0010 · G0010T1543.003 · Windows Service+1
Florian Roth (Nextron Systems)Fri Nov 232017
Emerging Threatmediumtest

SSHD Error Message CVE-2018-15473

Detects exploitation attempt using public exploit code for CVE-2018-15473

Linuxsshd
TA0043 · ReconnaissanceT1589 · Gather Victim Identity Informationcve.2018-15473detection.emerging-threats
Florian Roth (Nextron Systems)Thu Aug 242018
Emerging Threatcriticaltest

Oracle WebLogic Exploit

Detects access to a webshell dropped into a keystore folder on the WebLogic server

Web Server Log
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessTA0003 · PersistenceT1505.003 · Web Shell+2
Florian Roth (Nextron Systems)Sun Jul 222018
Emerging Threatcriticaltest

Elise Backdoor Activity

Detects Elise backdoor activity used by APT32

WindowsProcess Creation
G0030 · G0030G0050 · APT32S0081 · S0081TA0002 · Execution+2
Florian Roth (Nextron Systems)+1Wed Jan 312018
Emerging Threatcriticaltest

APT27 - Emissary Panda Activity

Detects the execution of DLL side-loading malware used by threat group Emissary Panda aka APT27

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+2
Florian Roth (Nextron Systems)Mon Sep 032018
Emerging Threathightest

Sofacy Trojan Loader Activity

Detects Trojan loader activity as used by APT28

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionG0007 · APT28T1059.003 · Windows Command Shell+3
Florian Roth (Nextron Systems)+2Thu Mar 012018
Emerging Threatcriticalstable

APT29 2018 Phishing Campaign CommandLine Indicators

Detects indicators of APT 29 (Cozy Bear) phishing-campaign as reported by mandiant

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Tue Nov 202018
Emerging Threatcriticaltest

OilRig APT Activity

Detects OilRig activity as reported by Nyotron in their March 2018 report

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceG0049 · G0049+8
Florian Roth (Nextron Systems)+4Fri Mar 232018
Emerging Threatcriticaltest

OilRig APT Registry Persistence

Detects OilRig registry persistence as reported by Nyotron in their March 2018 report

WindowsRegistry Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceG0049 · G0049+8
Florian Roth (Nextron Systems)+4Fri Mar 232018
Emerging Threatcriticaltest

OilRig APT Schedule Task Persistence - Security

Detects OilRig schedule task persistence as reported by Nyotron in their March 2018 report

Windowssecurity
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceG0049 · G0049+8
Florian Roth (Nextron Systems)+4Fri Mar 232018
Emerging Threatcriticaltest

OilRig APT Schedule Task Persistence - System

Detects OilRig schedule task persistence as reported by Nyotron in their March 2018 report

Windowssystem
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceG0049 · G0049+8
Florian Roth (Nextron Systems)+4Fri Mar 232018