Rule Library

Sigma Rules

784 rules found for "Nasreddine Bencherchali (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Use Short Name Path in Image

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Sun Aug 07windows
Detectionmediumtest

Use NTFS Short Name in Command Line

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid command-line detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Fri Aug 05windows
Detectionmediumtest

Use NTFS Short Name in Image

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image based detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Sat Aug 06windows
Detectionmediumtest

Obfuscated IP Via CLI

Detects usage of an encoded/obfuscated version of an IP address (hex, octal, etc.) via command line

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 03windows
Detectionhightest

Potential PowerShell Execution Via DLL

Detects potential PowerShell execution from a DLL instead of the usual PowerShell process as seen used in PowerShdll. This detection assumes that PowerShell commands are passed via the CommandLine.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Markus Neis+1Sat Aug 25windows
Detectionmediumtest

Private Keys Reconnaissance Via CommandLine Tools

Adversaries may search for private key certificate files on compromised systems for insecurely stored credential

WindowsProcess Creation
TA0006 · Credential AccessT1552.004 · Private Keys
François Hubaut+1Tue Jul 20windows
Detectionhightest

Script Interpreter Execution From Suspicious Folder

Detects a suspicious script execution in temporary folders or folders accessible by environment variables

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Feb 08windows
Detectionhightest

Suspicious New Service Creation

Detects creation of a new service via "sc" command or the powershell "new-service" cmdlet with suspicious binary paths

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jul 14windows
Detectionhightest

Suspicious Windows Service Tampering

Detects the usage of binaries such as 'net', 'sc' or 'powershell' in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1489 · Service StopT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+2Thu Sep 01windows
Detectionhightest

System File Execution Location Anomaly

Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+4Mon Nov 27windows
Detectionmediumtest

Weak or Abused Passwords In CLI

Detects weak passwords or often abused passwords (seen used by threat actors) via the CLI. An example would be a threat actor creating a new user via the net command and providing the password inline

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Sep 14windows
Detectionmediumtest

Permission Check Via Accesschk.EXE

Detects the usage of the "Accesschk" utility, an access and privilege audit tool developed by SysInternal and often being abused by attacker to verify process privileges

WindowsProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
Teymur Kheirkhabarov+3Tue Oct 13windows
Detectionmediumtest

Active Directory Database Snapshot Via ADExplorer

Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionhightest

Suspicious Active Directory Database Snapshot Via ADExplorer

Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database to a suspicious directory. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

Potential Memory Dumping Activity Via LiveKD

Detects execution of LiveKD based on PE metadata or image name

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionhightest

Kernel Memory Dump Via LiveKD

Detects execution of LiveKD with the "-m" flag to potentially dump the kernel memory

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue May 16windows
Detectionhightest

PsExec/PAExec Escalation to LOCAL SYSTEM

Detects suspicious commandline flags used by PsExec and PAExec to escalate a command line to LOCAL_SYSTEM rights

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Tue Nov 23windows
Detectionhightest

Potential PsExec Remote Execution

Detects potential psexec command that initiate execution on a remote systems via common commandline flags used by the utility

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Tue Feb 28windows
Detectionmediumtest

Suspicious Use of PsLogList

Detects usage of the PsLogList utility to dump event log in order to extract admin accounts and perform account discovery or delete events logs

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account DiscoveryT1087.001 · Local AccountT1087.002 · Domain Account
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionmediumtest

Sysinternals PsService Execution

Detects usage of Sysinternals PsService which can be abused for service reconnaissance and tampering

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jun 16windows
Detectionmediumtest

Sysinternals PsSuspend Execution

Detects usage of Sysinternals PsSuspend which can be abused to suspend critical processes

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Mar 23windows
Detectionhightest

Sysinternals PsSuspend Suspicious Execution

Detects suspicious execution of Sysinternals PsSuspend, where the utility is used to suspend critical processes such as AV or EDR to bypass defenses

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Thu Mar 23windows
Detectionhightest

Potential Privilege Escalation To LOCAL SYSTEM

Detects unknown program using commandline flags usually used by tools such as PsExec and PAExec to start programs with SYSTEM Privileges

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Sat May 22windows
Detectionmediumtest

Sysmon Configuration Update

Detects updates to Sysmon's configuration. Attackers might update or replace the Sysmon configuration with a bare bone one to avoid monitoring without shutting down the service completely

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Thu Mar 09windows
Detectionhightest

Potential Signing Bypass Via Windows Developer Features

Detects when a user enable developer features such as "Developer Mode" or "Application Sideloading". Which allows the user to install untrusted packages.

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionlowtest

Compressed File Creation Via Tar.EXE

Detects execution of "tar.exe" in order to create a compressed file. Adversaries may abuse various utilities to compress or encrypt data before exfiltration.

WindowsProcess Creation
TA0009 · CollectionTA0010 · ExfiltrationT1560 · Archive Collected DataT1560.001 · Archive via Utility
Nasreddine Bencherchali (Nextron Systems)+1Tue Dec 19windows
Detectionmediumtest

New Virtual Smart Card Created Via TpmVscMgr.EXE

Detects execution of "Tpmvscmgr.exe" to create a new virtual smart card.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jun 15windows
Detectionhightest

UAC Bypass Using Event Viewer RecentViews

Detects the pattern of UAC Bypass using Event Viewer RecentViews

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Nov 22windows
Detectionhightest

UAC Bypass Using IDiagnostic Profile

Detects the "IDiagnosticProfileUAC" UAC bypass technique

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Nasreddine Bencherchali (Nextron Systems)Sun Jul 03windows
Detectionmediumtest

Potential Persistence Via VMwareToolBoxCmd.EXE VM State Change Script

Detects execution of the "VMwareToolBoxCmd.exe" with the "script" and "set" flag to setup a specific script to run for a specific VM state

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Jun 14windows
Detectionhightest

Suspicious Persistence Via VMwareToolBoxCmd.EXE VM State Change Script

Detects execution of the "VMwareToolBoxCmd.exe" with the "script" and "set" flag to setup a specific script that's located in a potentially suspicious location to run for a specific VM state

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Wed Jun 14windows
Detectionmediumtest

Potentially Suspicious Child Process Of VsCode

Detects uncommon or suspicious child processes spawning from a VsCode "code.exe" process. This could indicate an attempt of persistence via VsCode tasks or terminal profiles.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jan 26windows
Detectionmediumtest

Visual Studio Code Tunnel Execution

Detects Visual Studio Code tunnel execution. Attackers can abuse this functionality to establish a C2 channel

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1219 · Remote Access Software
Nasreddine Bencherchali (Nextron Systems)+1Wed Oct 25windows
Detectionmediumtest

Visual Studio Code Tunnel Shell Execution

Detects the execution of a shell (powershell, bash, wsl...) via Visual Studio Code tunnel. Attackers can abuse this functionality to establish a C2 channel and execute arbitrary commands on the system.

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocols
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25windows
Detectionhightest

Renamed Visual Studio Code Tunnel Execution

Detects renamed Visual Studio Code tunnel execution. Attackers can abuse this functionality to establish a C2 channel

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1219 · Remote Access Software
Nasreddine Bencherchali (Nextron Systems)Thu Sep 28windows
Detectionmediumtest

Visual Studio Code Tunnel Service Installation

Detects the installation of VsCode tunnel (code-tunnel) as a service.

WindowsProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocols
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25windows
Detectionmediumtest

Potential Binary Proxy Execution Via VSDiagnostics.EXE

Detects execution of "VSDiagnostics.exe" with the "start" command in order to launch and proxy arbitrary binaries.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Thu Aug 03windows
Detectionhightest

Wab Execution From Non Default Location

Detects execution of wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) from non default locations as seen with bumblebee activity

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionhightest

Wab/Wabmig Unusual Parent Or Child Processes

Detects unusual parent or children of the wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) processes as seen being used with bumblebee activity

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionhightest

All Backups Deleted Via Wbadmin.EXE

Detects the deletion of all backups or system state backups via "wbadmin.exe". This technique is used by numerous ransomware families and actors. This may only be successful on server platforms that have Windows Backup enabled.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
François Hubaut+1Mon Dec 13windows
Detectionmediumtest

Windows Backup Deleted Via Wbadmin.EXE

Detects the deletion of backups or system state backups via "wbadmin.exe". This technique is used by numerous ransomware families and actors. This may only be successful on server platforms that have Windows Backup enabled.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
François Hubaut+1Mon Dec 13windows
Detectionhightest

Sensitive File Dump Via Wbadmin.EXE

Detects the dump of highly sensitive files such as "NTDS.DIT" and "SECURITY" hive. Attackers can leverage the "wbadmin" utility in order to dump sensitive files that might contain credential or sensitive information.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionmediumtest

File Recovery From Backup Via Wbadmin.EXE

Detects the recovery of files from backups via "wbadmin.exe". Attackers can restore sensitive files such as NTDS.DIT or Registry Hives from backups in order to potentially extract credentials.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionhightest

Sensitive File Recovery From Backup Via Wbadmin.EXE

Detects the dump of highly sensitive files such as "NTDS.DIT" and "SECURITY" hive. Attackers can leverage the "wbadmin" utility in order to dump sensitive files that might contain credential or sensitive information.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionhightest

Suspicious Process By Web Server Process

Detects potentially suspicious processes being spawned by a web server process which could be the result of a successfully placed web shell or exploitation

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1505.003 · Web ShellT1190 · Exploit Public-Facing Application
Thomas Patzke+4Wed Jan 16windows
Detectionhightest

Potential Credential Dumping Via WER

Detects potential credential dumping via Windows Error Reporting LSASS Shtinkering technique which uses the Windows Error Reporting to dump lsass

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
@pbssubhash+1Thu Dec 08windows
Detectionhightest

Suspicious File Download From IP Via Wget.EXE

Detects potentially suspicious file downloads directly from IP addresses using Wget.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionhightest

Suspicious File Download From File Sharing Domain Via Wget.EXE

Detects potentially suspicious file downloads from file sharing domains using wget.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows