Rule Library

Sigma Rules

1,774 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

PSAsyncShell - Asynchronous TCP Reverse Shell

Detects the use of PSAsyncShell an Asynchronous TCP Reverse Shell written in powershell

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Oct 04windows
Detectionhightest

PowerShell PSAttack

Detects the use of PSAttack PowerShell hack tool

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell ScriptBlock

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

PowerShell Script With File Hostname Resolving Capabilities

Detects PowerShell scripts that have capabilities to read files, loop through them and resolve DNS host entries.

WindowsPowerShell Script
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionlowtest

PowerShell Script Change Permission Via Set-Acl - PsScript

Detects PowerShell scripts set ACL to of a file or a folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionhightest

PowerShell Set-Acl On Windows Folder - PsScript

Detects PowerShell scripts to set the ACL to a file in the Windows folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionhightest

PowerShell ShellCode

Detects Base64 encoded Shellcode

WindowsPowerShell Script
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process InjectionTA0002 · Execution+1
David Ledbetter (shellcode)+1Sat Nov 17windows
Detectionhightest

Malicious ShellIntel PowerShell Commandlets

Detects Commandlet names from ShellIntel exploitation scripts.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Max Altgelt (Nextron Systems)+1Mon Aug 09windows
Detectionhightest

Potential Persistence Via Security Descriptors - ScriptBlock

Detects usage of certain functions and keywords that are used to manipulate security descriptors in order to potentially set a backdoor. As seen used in the DAMP project.

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Jan 05windows
Detectionlowtest

Potential PowerShell Obfuscation Using Character Join

Detects specific techniques often seen used inside of PowerShell scripts to obfscuate Alias creation

WindowsPowerShell Script
TA0005 · Defense EvasionTA0002 · ExecutionT1027 · Obfuscated Files or InformationT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Mon Jan 09windows
Detectionmediumtest

Suspicious Eventlog Clear

Detects usage of known powershell cmdlets such as "Clear-EventLog" to clear the Windows event logs

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 12windows
Detectionmediumtest

Suspicious PowerShell Download - Powershell Script

Detects suspicious PowerShell download command

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 05windows
Detectionmediumtest

Troubleshooting Pack Cmdlet Execution

Detects execution of "TroubleshootingPack" cmdlets to leverage CVE-2022-30190 or action similar to "msdt" lolbin (as described in LOLBAS)

WindowsPowerShell Script
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jun 21windows
Detectionhightest

PowerShell Get-Process LSASS in ScriptBlock

Detects a Get-Process command on lsass process, which is in almost all cases a sign of malicious activity

WindowsPowerShell Script
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Fri Apr 23windows
Detectionhightest

Suspicious PowerShell Invocations - Generic

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 12windows
Detectionhightest

Suspicious PowerShell Invocations - Specific

Detects suspicious PowerShell invocation command parameters

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Sun Mar 05windows
Detectionmediumtest

Potential Keylogger Activity

Detects PowerShell scripts that contains reference to keystroke capturing functions

WindowsPowerShell Script
TA0009 · CollectionTA0006 · Credential AccessT1056.001 · Keylogging
Nasreddine Bencherchali (Nextron Systems)Wed Jan 04windows
Detectionmediumtest

Potential Suspicious PowerShell Keywords

Detects potentially suspicious keywords that could indicate the use of a PowerShell exploitation framework

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Mon Feb 11windows
Detectionmediumtest

Suspicious TCP Tunnel Via PowerShell Script

Detects powershell scripts that creates sockets/listeners which could be indicative of tunneling activity

WindowsPowerShell Script
TA0011 · Command and ControlT1090 · Proxy
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectionhightest

Suspicious Service DACL Modification Via Set-Service Cmdlet - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionmediumtest

PowerShell Write-EventLog Usage

Detects usage of the "Write-EventLog" cmdlet with 'RawData' flag. The cmdlet can be levreage to write malicious payloads to the EventLog and then retrieve them later for later use

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Aug 16windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Script

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Script
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionhightest

Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging

Detects attempts to remove Windows Defender configuration using the 'MpPreference' cmdlet

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Tamper Windows Defender - ScriptBlockLogging

Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+5Sun Jan 16windows
Detectionmediumtest

User Discovery And Export Via Get-ADUser Cmdlet - PowerShell

Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 17windows
Detectionmediumtest

Potential Persistence Via PowerShell User Profile Using Add-Content

Detects calls to "Add-Content" cmdlet in order to modify the content of the user profile and potentially adding suspicious commands for persistence

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
François Hubaut+1Wed Aug 18windows
Detectionhightest

Abuse of Service Permissions to Hide Services Via Set-Service - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionmediumexperimental

Registry Modification Attempt Via VBScript - PowerShell

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods embedded within PowerShell scripts or commands. Threat actors commonly embed VBScript code within PowerShell to perform registry modifications, attempting to evade detection that monitors for direct registry access through traditional tools. This technique can be used for persistence, defense evasion, and privilege escalation by modifying registry keys without using regedit.exe, reg.exe, or PowerShell's native registry cmdlets.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionhightest

Veeam Backup Servers Credential Dumping Script Execution

Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.

WindowsPowerShell Script
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Thu May 04windows
Detectionmediumtest

Potentially Suspicious Call To Win32_NTEventlogFile Class - PSScript

Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 13windows
Detectionhightest

Potential WinAPI Calls Via PowerShell Scripts

Detects use of WinAPI functions in PowerShell scripts

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellT1106 · Native API
Nasreddine Bencherchali (Nextron Systems)+2Tue Oct 06windows
Detectionmediumtest

WMIC Unquoted Services Path Lookup - PowerShell

Detects known WMI recon method to look for unquoted service paths, often used by pentest inside of powershell scripts attackers enum scripts

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

HackTool - CobaltStrike BOF Injection Pattern

Detects a typical pattern of a CobaltStrike BOF which inject into other processes

WindowsProcess Access
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christian Burkard (Nextron Systems)Wed Aug 04windows
Detectionhightest

HackTool - Generic Process Access

Detects process access requests from hacktool processes based on their default image name

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Nasreddine Bencherchali (Nextron Systems)+1Mon Nov 27windows
Detectionhightest

HackTool - LittleCorporal Generated Maldoc Injection

Detects the process injection of a LittleCorporal generated Maldoc.

WindowsProcess Access
TA0005 · Defense EvasionTA0002 · ExecutionTA0004 · Privilege EscalationT1204.002 · Malicious File+1
Christian Burkard (Nextron Systems)Mon Aug 09windows
Detectionhightest

HackTool - SysmonEnte Execution

Detects the use of SysmonEnte, a tool to attack the integrity of Sysmon

WindowsProcess Access
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
Florian Roth (Nextron Systems)Wed Sep 07windows
Detectionhightest

LSASS Memory Access by Tool With Dump Keyword In Name

Detects LSASS process access requests from a source process with the "dump" keyword in its image name.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)Thu Feb 10windows
Detectionhightest

Suspicious LSASS Access Via MalSecLogon

Detects suspicious access to LSASS handle via a call trace to "seclogon.dll" with a suspicious access right.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS Memory
Samir Bousseaden (original elastic rule)+1Wed Jun 29windows
Detectionmediumtest

Potentially Suspicious GrantedAccess Flags On LSASS

Detects process access requests to LSASS process with potentially suspicious access flags

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)+9Mon Nov 22windows
Detectionhightest

Credential Dumping Attempt Via WerFault

Detects process LSASS memory dump using Mimikatz, NanoDump, Invoke-Mimikatz, Procdump or Taskmgr based on the CallTrace pointing to ntdll.dll, dbghelp.dll or dbgcore.dll for win10, server2016 and up.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)Wed Jun 27windows
Detectionhightest

LSASS Access From Potentially White-Listed Processes

Detects a possible process memory dump that uses a white-listed filename like TrolleyExpress.exe as a way to dump the LSASS process memory without Microsoft Defender interference

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)Thu Feb 10windows
Detectionlowtest

Uncommon Process Access Rights For Target Image

Detects process access request to uncommon target images with a "PROCESS_ALL_ACCESS" access mask.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.011 · Extra Window Memory Injection
Nasreddine Bencherchali (Nextron Systems)+1Mon May 27windows
Detectionhighexperimental

Suspicious Process Access to LSASS with Dbgcore/Dbghelp DLLs

Detects suspicious process access to LSASS.exe from processes located in uncommon locations with dbgcore.dll or dbghelp.dll in the call trace. These DLLs contain functions like MiniDumpWriteDump that can be abused for credential dumping purposes. While modern tools like Mimikatz have moved to using ntdll.dll, dbgcore.dll and dbghelp.dll are still used by basic credential dumping utilities and legacy tools for LSASS memory access and process suspension techniques.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionmediumtest

Potential Direct Syscall of NtOpenProcess

Detects potential calls to NtOpenProcess directly from NTDLL.

WindowsProcess Access
TA0002 · ExecutionT1106 · Native API
Christian Burkard (Nextron Systems)+1Wed Jul 28windows
Detectionhightest

UAC Bypass Using WOW64 Logger DLL Hijack

Detects the pattern of UAC Bypass using a WoW64 logger DLL hijack (UACMe 30)

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)Mon Aug 23windows
Detectionhighexperimental

Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze

Detects process access events where WerFaultSecure accesses MsMpEng.exe with dbgcore.dll or dbghelp.dll in the call trace, indicating potential EDR freeze techniques. This technique leverages WerFaultSecure.exe running as a Protected Process Light (PPL) with WinTCB protection level to call MiniDumpWriteDump and suspend EDR/AV processes, allowing malicious activity to execute undetected during the suspension period.

WindowsProcess Access
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionmediumtest

7Zip Compressing Dump Files

Detects execution of 7z in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
Nasreddine Bencherchali (Nextron Systems)Tue Sep 27windows
Detectionmediumtest

Potential DLL Injection Via AccCheckConsole

Detects the execution "AccCheckConsole" a command-line tool for verifying the accessibility implementation of an application's UI. One of the tests that this checker can run are called "verification routine", which tests for things like Consistency, Navigation, etc. The tool allows a user to provide a DLL that can contain a custom "verification routine". An attacker can build such DLLs and pass it via the CLI, which would then be loaded in the context of the "AccCheckConsole" utility.

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Florian Roth (Nextron Systems)Thu Jan 06windows