Rule Library

Sigma Rules

1,774 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectioncriticaltest

HackTool - DiagTrackEoP Default Named Pipe

Detects creation of default named pipe used by the DiagTrackEoP POC, a tool that abuses "SeImpersonate" privilege.

WindowsNamed Pipe Created
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Wed Aug 03windows
Detectionhightest

HackTool - EfsPotato Named Pipe Creation

Detects the pattern of a pipe name as used by the hack tool EfsPotato

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Mon Aug 23windows
Detectioncriticaltest

HackTool - Koh Default Named Pipe

Detects creation of default named pipes used by the Koh tool

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0006 · Credential AccessT1528 · Steal Application Access Token+1
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectionmediumtest

PUA - CSExec Default Named Pipe

Detects default CSExec pipe creation

WindowsNamed Pipe Created
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesTA0002 · ExecutionT1569.002 · Service Execution
Nikita Nazarov+2Mon Aug 07windows
Detectionmediumtest

PUA - PAExec Default Named Pipe

Detects PAExec default named pipe

WindowsNamed Pipe Created
TA0002 · ExecutionT1569.002 · Service Execution
Nasreddine Bencherchali (Nextron Systems)Wed Oct 26windows
Detectionmediumtest

PUA - RemCom Default Named Pipe

Detects default RemCom pipe creation

WindowsNamed Pipe Created
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesTA0002 · ExecutionT1569.002 · Service Execution
Nikita Nazarov+2Mon Aug 07windows
Detectionmediumtest

WMI Event Consumer Created Named Pipe

Detects the WMI Event Consumer service scrcons.exe creating a named pipe

WindowsNamed Pipe Created
T1047 · Windows Management InstrumentationTA0002 · Execution
Florian Roth (Nextron Systems)Wed Sep 01windows
Detectioncriticaltest

Malicious Named Pipe Created

Detects the creation of a named pipe seen used by known APTs or malware.

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+2Mon Nov 06windows
Detectionmediumtest

PsExec Tool Execution From Suspicious Locations - PipeName

Detects PsExec default pipe creation where the image executed is located in a suspicious location. Which could indicate that the tool is being used in an attack

WindowsNamed Pipe Created
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Nasreddine Bencherchali (Nextron Systems)Thu Aug 04windows
Detectionmediumtest

PowerShell Downgrade Attack - PowerShell

Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0

WindowsPowerShell Classic
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Mar 22windows
Detectionhightest

PowerShell Called from an Executable Version Mismatch

Detects PowerShell called from an executable by the version mismatch method

WindowsPowerShell Classic
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

Windowspowershell-classic
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Tue Jul 13windows
Detectionmediumtest

Suspicious PowerShell Download

Detects suspicious PowerShell download command

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 05windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Windowspowershell-classic
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionhightest

Tamper Windows Defender - PSClassic

Attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

Windowsps_classic_provider_start
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+1Mon Jun 07windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - PsModule

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsPowerShell Module
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
Nasreddine Bencherchali (Nextron Systems)+1Sun Jan 22windows
Detectionhightest

Malicious PowerShell Scripts - PoshModule

Detects the execution of known offensive powershell scripts used for exploitation or reconnaissance

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShell
François Hubaut+1Mon Jan 23windows
Detectionhightest

Suspicious Get-ADDBAccount Usage

Detects suspicious invocation of the Get-ADDBAccount script that reads from a ntds.dit file and may be used to get access to credentials without using any credential dumpers

WindowsPowerShell Module
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Wed Mar 16windows
Detectionhightest

HackTool - Evil-WinRm Execution - PowerShell Module

Detects the execution of Evil-WinRM via PowerShell Module logs by leveraging the hardcoded strings inside the utility.

WindowsPowerShell Module
TA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Sun Feb 25windows
Detectionhightest

Malicious PowerShell Commandlets - PoshModule

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Module
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Nasreddine Bencherchali (Nextron Systems)Fri Jan 20windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell Module

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Module
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 13windows
Detectionmediumtest

Suspicious PowerShell Download - PoshModule

Detects suspicious PowerShell download command

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 05windows
Detectionhightest

Suspicious PowerShell Invocations - Generic - PowerShell Module

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 12windows
Detectionhightest

Suspicious PowerShell Invocations - Specific - PowerShell Module

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Sun Mar 05windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Module

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Module
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionhightest

AADInternals PowerShell Cmdlets Execution - PsScript

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

WindowsPowerShell Script
TA0002 · ExecutionTA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential Access+1
Austin Songer+2Fri Dec 23windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - PsScript

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsPowerShell Script
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
François Hubaut+1Sun Jan 22windows
Detectionmediumtest

Add Windows Capability Via PowerShell Script

Detects usage of the "Add-WindowsCapability" cmdlet to add Windows capabilities. Notable capabilities could be "OpenSSH" and others.

WindowsPowerShell Script
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Sun Jan 22windows
Detectionhightest

AMSI Bypass Pattern Assembly GetType

Detects code fragments found in small and obfuscated AMSI bypass PowerShell scripts

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsTA0002 · Execution
Florian Roth (Nextron Systems)Wed Nov 09windows
Detectionmediumtest

Potential AMSI Bypass Script Using NULL Bits

Detects usage of special strings/null bits in order to potentially bypass AMSI functionalities

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Wed Jan 04windows
Detectionmediumtest

Potential Data Exfiltration Via Audio File

Detects potential exfiltration attempt via audio file using PowerShell

WindowsPowerShell Script
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionmediumtest

Computer Discovery And Export Via Get-ADComputer Cmdlet - PowerShell

Detects usage of the Get-ADComputer cmdlet to collect computer information and output it to a file

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 17windows
Detectionhightest

Powershell Install a DLL in System Directory

Uses PowerShell to install/copy a file into a system directory such as "System32" or "SysWOW64"

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556.002 · Password Filter DLL
François Hubaut+1Mon Dec 27windows
Detectionmediumexperimental

DMSA Service Account Created in Specific OUs - PowerShell

Detects the creation of a dMSA service account using the New-ADServiceAccount cmdlet in certain OUs. The fact that the cmdlet is used to create a dMSASvc account in a specific OU is highly suspicious. It is a pattern trying to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025. On top of that, if the user that is creating the dMSASvc account is not a legitimate administrator or does not have the necessary permissions, it is a strong signal of an attempted or successful abuse of the BaDSuccessor vulnerability for privilege escalation within the Windows Server 2025 Active Directory environment.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Swachchhanda Shrawan Poudel (Nextron Systems)Sat May 24windows
Detectionhightest

DSInternals Suspicious PowerShell Cmdlets - ScriptBlock

Detects execution and usage of the DSInternals PowerShell module. Which can be used to perform what might be considered as suspicious activity such as dumping DPAPI backup keys or manipulating NTDS.DIT files. The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Wed Jun 26windows
Detectionhightest

Disable of ETW Trace - Powershell

Detects usage of powershell cmdlets to disable or remove ETW trace sessions

WindowsPowerShell Script
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562.006 · Indicator Blocking2016-04-002 · CAR 2016-04-002
Nasreddine Bencherchali (Nextron Systems)Tue Jun 28windows
Detectionmediumtest

Certificate Exported Via PowerShell - ScriptBlock

Detects calls to cmdlets inside of PowerShell scripts that are used to export certificates from the local certificate store. Threat actors were seen abusing this to steal private keys from compromised machines.

WindowsPowerShell Script
TA0006 · Credential AccessT1552.004 · Private Keys
Florian Roth (Nextron Systems)Fri Apr 23windows
Detectionmediumtest

Security Software Discovery Via Powershell Script

Detects calls to "get-process" where the output is piped to a "where-object" filter to search for security solution processes. Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as firewall rules and anti-virus

WindowsPowerShell Script
TA0007 · DiscoveryT1518.001 · Security Software Discovery
François Hubaut+2Thu Dec 16windows
Detectionhightest

HackTool - Rubeus Execution - ScriptBlock

Detects the execution of the hacktool Rubeus using specific command line flags

WindowsPowerShell Script
TA0005 · Defense EvasionTA0006 · Credential AccessT1003 · OS Credential DumpingT1558.003 · Kerberoasting+2
Christian Burkard (Nextron Systems)+1Thu Apr 27windows
Detectionmediumtest

PowerShell Hotfix Enumeration

Detects call to "Win32_QuickFixEngineering" in order to enumerate installed hotfixes often used in "enum" scripts by attackers

WindowsPowerShell Script
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Jun 21windows
Detectionmediumtest

Import PowerShell Modules From Suspicious Directories

Detects powershell scripts that import modules from suspicious directories

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Thu Jul 07windows
Detectionmediumtest

Unsigned AppX Installation Attempt Using Add-AppxPackage - PsScript

Detects usage of the "Add-AppxPackage" or it's alias "Add-AppPackage" to install unsigned AppX packages

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Jan 31windows
Detectioncriticaltest

Suspicious PowerShell Mailbox Export to Share - PS

Detects usage of the powerShell New-MailboxExportRequest Cmdlet to exports a mailbox to a remote or local share, as used in ProxyShell exploitations

WindowsPowerShell Script
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)Wed Oct 26windows
Detectionhightest

Malicious PowerShell Commandlets - ScriptBlock

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Sean Metcalf+10Sun Mar 05windows
Detectionmediumtest

Malicious PowerShell Keywords

Detects keywords from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionhightest

Live Memory Dump Using Powershell

Detects usage of a PowerShell command to dump the live memory of a Windows machine

WindowsPowerShell Script
TA0006 · Credential AccessT1003 · OS Credential Dumping
Max Altgelt (Nextron Systems)Tue Sep 21windows
Detectionlowexperimental

DMSA Link Attributes Modified

Detects modification of dMSA link attributes (msDS-ManagedAccountPrecededByLink) via PowerShell scripts. This command line pattern could be an indicator an attempt to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025.

WindowsPowerShell Script
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0001 · Initial Access+2
Swachchhanda Shrawan Poudel (Nextron Systems)Sat May 24windows
Detectionhightest

PowerShell Credential Prompt

Detects PowerShell calling a credential prompt

WindowsPowerShell Script
TA0006 · Credential AccessTA0002 · ExecutionT1059.001 · PowerShell
John Lambert+1Sun Apr 09windows