Rule Library

Sigma Rules

1,405 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Potentially Over Permissive Permissions Granted Using Dsacls.EXE

Detects usage of Dsacls to grant over permissive permissions

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionmediumtest

Potential Password Spraying Attempt Using Dsacls.EXE

Detects possible password spraying attempts using Dsacls

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

Suspicious Kernel Dump Using Dtrace

Detects suspicious way to dump the kernel on Windows systems using dtrace.exe, which is available on Windows systems since Windows 10 19H1

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Florian Roth (Nextron Systems)Tue Dec 28windows
Detectionhightest

Potential Windows Defender AV Bypass Via Dump64.EXE Rename

Detects when a user is potentially trying to bypass the Windows Defender AV by renaming a tool to dump64.exe and placing it in the Visual Studio folder. Currently the rule is covering only usage of procdump but other utilities can be added in order to increase coverage.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Austin Songer+2Fri Nov 26windows
Detectionmediumtest

DumpMinitool Execution

Detects the use of "DumpMinitool.exe" a tool that allows the dump of process memory via the use of the "MiniDumpWriteDump"

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)+1Wed Apr 06windows
Detectionhightest

Suspicious DumpMinitool Execution

Detects suspicious ways to use the "DumpMinitool.exe" binary

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1036 · MasqueradingT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Wed Apr 06windows
Detectionmediumtest

New Capture Session Launched Via DXCap.EXE

Detects the execution of "DXCap.EXE" with the "-c" flag, which allows a user to launch any arbitrary binary or windows package through DXCap itself. This can be abused to potentially bypass application whitelisting.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+2Sat Oct 26windows
Detectionhighexperimental

Security Event Logging Disabled via MiniNt Registry Key - Process

Detects attempts to disable security event logging by adding the `MiniNt` registry key. This key is used to disable the Windows Event Log service, which collects and stores event logs from the operating system and applications. Adversaries may want to disable this service to prevent logging of security events that could be used to detect their activities.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1562.002 · Disable Windows Event LoggingT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 09windows
Detectionhightest

Potentially Suspicious Event Viewer Child Process

Detects uncommon or suspicious child processes of "eventvwr.exe" which might indicate a UAC bypass attempt

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control2019-04-001 · CAR 2019-04-001
Florian Roth (Nextron Systems)Sun Mar 19windows
Detectionmediumtest

Potentially Suspicious Cabinet File Expansion

Detects the expansion or decompression of cabinet files from potentially suspicious or uncommon locations, e.g. seen in Iranian MeteorExpress related attacks

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Bhabesh Raj+1Fri Jul 30windows
Detectionmediumtest

Explorer Process Tree Break

Detects a command line process that uses explorer.exe to launch arbitrary commands or binaries, which is similar to cmd.exe /c, only it breaks the process tree and makes its parent a new instance of explorer spawning from "svchost"

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+1Sat Jun 29windows
Detectionhightest

Explorer NOUACCHECK Flag

Detects suspicious starts of explorer.exe that use the /NOUACCHECK flag that allows to run all sub processes of that newly started explorer.exe without any UAC checks

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account Control
Florian Roth (Nextron Systems)Wed Feb 23windows
Detectionmediumtest

Remote File Download Via Findstr.EXE

Detects execution of "findstr" with specific flags and a remote share path. This specific set of CLI flags would allow "findstr" to download the content of the file located on the remote share as described in the LOLBAS entry.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionhightest

LSASS Process Reconnaissance Via Findstr.EXE

Detects findstring commands that include the keyword lsass, which indicates recon actviity for the LSASS process PID

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Florian Roth (Nextron Systems)Fri Aug 12windows
Detectionmediumtest

Permission Misconfiguration Reconnaissance Via Findstr.EXE

Detects usage of findstr with the "EVERYONE" or "BUILTIN" keywords. This was seen being used in combination with "icacls" and other utilities to spot misconfigured files or folders permissions.

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionmediumtest

Recon Command Output Piped To Findstr.EXE

Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example. Attackers often time use this technique to extract specific information they require in their reconnaissance phase.

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discovery
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 06windows
Detectionmediumtest

Security Tools Keyword Lookup Via Findstr.EXE

Detects execution of "findstr" to search for common names of security tools. Attackers often pipe the results of recon commands such as "tasklist" or "whoami" to "findstr" in order to filter out the results. This detection focuses on the keywords that the attacker might use as a filter.

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 20windows
Detectionlowtest

Insensitive Subfolder Search Via Findstr.EXE

Detects execution of findstr with the "s" and "i" flags for a "subfolder" and "insensitive" search respectively. Attackers sometimes leverage this built-in utility to search the system for interesting files or filter through results of commands.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionhightest

Finger.EXE Execution

Detects execution of the "finger.exe" utility. Finger.EXE or "TCPIP Finger Command" is an old utility that is still present on modern Windows installation. It Displays information about users on a specified remote computer (typically a UNIX computer) that is running the finger service or daemon. Due to the old nature of this utility and the rareness of machines having the finger service. Any execution of "finger.exe" can be considered "suspicious" and worth investigating.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+2Wed Feb 24windows
Detectionmediumtest

Filter Driver Unloaded Via Fltmc.EXE

Detect filter driver unloading activity via fltmc.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562 · Impair DefensesT1562.002 · Disable Windows Event Logging
Nasreddine Bencherchali (Nextron Systems)Mon Feb 13windows
Detectionhightest

Forfiles.EXE Child Process Masquerading

Detects the execution of "forfiles" from a non-default location, in order to potentially spawn a custom "cmd.exe" from the current working directory.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Nasreddine Bencherchali (Nextron Systems)+1Fri Jan 05windows
Detectionhightest

Uncommon FileSystem Load Attempt By Format.com

Detects the execution of format.com with an uncommon filesystem selection that could indicate a defense evasion activity in which "format.com" is used to load malicious DLL files or other programs.

WindowsProcess Creation
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Tue Jan 04windows
Detectionmediumtest

Suspicious Git Clone

Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious

WindowsProcess Creation
TA0043 · Reconnaissanceattack.t1593.003
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03windows
Detectionhightest

Potentially Suspicious GoogleUpdate Child Process

Detects potentially suspicious child processes of "GoogleUpdate.exe"

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionmediumtest

File Decryption Using Gpg4win

Detects usage of Gpg4win to decrypt files

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Aug 09windows
Detectionmediumtest

File Encryption Using Gpg4win

Detects usage of Gpg4win to encrypt files

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Aug 09windows
Detectionmediumtest

Portable Gpg.EXE Execution

Detects the execution of "gpg.exe" from uncommon location. Often used by ransomware and loaders to decrypt/encrypt data.

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impact
François Hubaut+1Sun Aug 06windows
Detectionhightest

File Encryption/Decryption Via Gpg4win From Suspicious Locations

Detects usage of Gpg4win to encrypt/decrypt files located in potentially suspicious locations.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 30windows
Detectionmediumtest

Arbitrary Binary Execution Using GUP Utility

Detects execution of the Notepad++ updater (gup) to launch other commands or executables

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 10windows
Detectionhightest

File Download Using Notepad++ GUP Utility

Detects execution of the Notepad++ updater (gup) from a process other than Notepad++ to download files.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Fri Jun 10windows
Detectionhighexperimental

Suspicious Child Process of Notepad++ Updater - GUP.Exe

Detects suspicious child process creation by the Notepad++ updater process (gup.exe). This could indicate potential exploitation of the updater component to deliver unwanted malware.

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1195.002 · Compromise Software Supply ChainTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Feb 03windows
Detectionhightest

Suspicious GUP Usage

Detects execution of the Notepad++ updater in a suspicious directory, which is often used in DLL side-loading attacks

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Florian Roth (Nextron Systems)Wed Feb 06windows
Detectionhightest

Remote CHM File Download/Execution Via HH.EXE

Detects the usage of "hh.exe" to execute/download remotely hosted ".chm" files.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.001 · Compiled HTML File
Nasreddine Bencherchali (Nextron Systems)Thu Sep 29windows
Detectionhightest

HTML Help HH.EXE Suspicious Child Process

Detects a suspicious child process of a Microsoft HTML Help (HH.exe)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0001 · Initial AccessT1047 · Windows Management Instrumentation+10
Maxim Pavlunin+1Wed Apr 01windows
Detectionhightest

HackTool - ADCSPwn Execution

Detects command line parameters used by ADCSPwn, a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Sat Jul 31windows
Detectionhightest

HackTool - Bloodhound/Sharphound Execution

Detects command line parameters used by Bloodhound and Sharphound hack tools

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain AccountT1482 · Domain Trust Discovery+4
Florian Roth (Nextron Systems)Fri Dec 20windows
Detectionhightest

Potential CobaltStrike Process Patterns

Detects potential process patterns related to Cobalt Strike beacon activity

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Jul 27windows
Detectionhightest

HackTool - CoercedPotato Execution

Detects the use of CoercedPotato, a tool for privilege escalation

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Wed Oct 11windows
Detectionhightest

HackTool - Covenant PowerShell Launcher

Detects suspicious command lines used in Covenant luanchers

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.001 · PowerShellT1564.003 · Hidden Window
Florian Roth (Nextron Systems)+2Thu Jun 04windows
Detectionhightest

HackTool - CrackMapExec Execution

This rule detect common flag combinations used by CrackMapExec in order to detect its use even if the binary has been replaced.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential Access+7
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionhightest

HackTool - CrackMapExec Process Patterns

Detects suspicious process patterns found in logs when CrackMapExec is used

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Sat Mar 12windows
Detectionhightest

HackTool - CreateMiniDump Execution

Detects the use of CreateMiniDump hack tool used to dump the LSASS process memory for credential extraction on the attacker's machine

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Sun Dec 22windows
Detectioncriticaltest

HackTool - DInjector PowerShell Cradle Execution

Detects the use of the Dinject PowerShell cradle based on the specific flags

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)Tue Dec 07windows
Detectionhighexperimental

HackTool - Doppelanger LSASS Dumper Execution

Detects the execution of the Doppelanger hacktool which is used to dump LSASS memory via process cloning while evading common detection methods

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jul 01windows
Detectioncriticaltest

HackTool - Dumpert Process Dumper Execution

Detects the use of Dumpert process dumper, which dumps the lsass.exe process memory

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Tue Feb 04windows
Detectionhighexperimental

Hacktool - EDR-Freeze Execution

Detects execution of EDR-Freeze, a tool that exploits the MiniDumpWriteDump function and WerFaultSecure.exe to suspend EDR and Antivirus processes on Windows. EDR-Freeze leverages a race-condition attack to put security processes into a dormant state by suspending WerFaultSecure at the moment it freezes the target process. This technique does not require kernel-level exploits or BYOVD, but instead abuses user-mode functionality to temporarily disable monitoring by EDR or Antimalware solutions.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24windows
Detectionhightest

HackTool - Empire PowerShell Launch Parameters

Detects suspicious powershell command line parameters used in Empire

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sat Apr 20windows
Detectioncriticaltest

Hacktool Execution - Imphash

Detects the execution of different Windows based hacktools via their import hash (imphash) even if the files have been renamed

WindowsProcess Creation
TA0006 · Credential AccessTA0042 · Resource DevelopmentT1588.002 · ToolT1003 · OS Credential Dumping
Florian Roth (Nextron Systems)Fri Mar 04windows