Rule Library

Sigma Rules

957 rules found for "Nasreddine Bencherchali (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Potential Centos Web Panel Exploitation Attempt - CVE-2022-44877

Detects potential exploitation attempts that target the Centos Web Panel 7 Unauthenticated Remote Code Execution CVE-2022-44877

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-44877detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jan 202022
Emerging Threathightest

Potential CVE-2022-46169 Exploitation Attempt

Detects potential exploitation attempts that target the Cacti Command Injection CVE-2022-46169

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-46169detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Dec 272022
Emerging Threathightest

Potential Bumblebee Remote Thread Creation

Detects remote thread injection events based on action seen used by bumblebee

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell+1
Nasreddine Bencherchali (Nextron Systems)Tue Sep 272022
Emerging Threathightest

Potential Raspberry Robin Dot Ending File

Detects commandline containing reference to files ending with a "." This scheme has been seen used by raspberry-robin

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Oct 282022
Emerging Threatmediumtest

CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21

Detects potential exploitation attempt of CVE-2023-1389 an Unauthenticated Command Injection in TP-Link Archer AX21.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-1389detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Tue Jun 252023
Emerging Threathightest

MSMQ Corrupted Packet Encountered

Detects corrupted packets sent to the MSMQ service. Could potentially be a sign of CVE-2023-21554 exploitation

Windowsapplication
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Apr 212023
Emerging Threatlowtest

Outlook Task/Note Reminder Received

Detects changes to the registry values related to outlook that indicates that a reminder was triggered for a Note or Task item. This could be a sign of exploitation of CVE-2023-23397. Further investigation is required to determine the success of an exploitation.

WindowsRegistry Set
TA0003 · PersistenceT1137 · Office Application Startupcve.2023-23397detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Apr 052023
Emerging Threatmediumtest

Potential CVE-2023-23397 Exploitation Attempt - SMB

Detects (failed) outbound connection attempts to internet facing SMB servers. This could be a sign of potential exploitation attempts of CVE-2023-23397.

Windowssmbclient-connectivity
TA0010 · Exfiltrationcve.2023-23397detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Apr 052023
Emerging Threathightest

Potential CVE-2023-25157 Exploitation Attempt

Detects a potential exploitation attempt of CVE-2023-25157 a SQL injection in GeoServer

Web Server Log
TA0001 · Initial Accesscve.2023-25157detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Jun 142023
Emerging Threathightest

Potential CVE-2023-25717 Exploitation Attempt

Detects a potential exploitation attempt of CVE-2023-25717 a Remote Code Execution via an unauthenticated HTTP GET Request, in Ruckus Wireless Admin

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-25717detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 302023
Emerging Threatmediumtest

Potential CVE-2023-27997 Exploitation Indicators

Detects indicators of potential exploitation of CVE-2023-27997 in Frotigate weblogs. To avoid false positives it is best to look for successive requests to the endpoints mentioned as well as weird values of the "enc" parameter

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-27997detection.emerging-threats
Sergio Palacios Dominguez+1Fri Jul 282023
Emerging Threathightest

Potential MOVEit Transfer CVE-2023-34362 Exploitation - File Activity

Detects file indicators of potential exploitation of MOVEit CVE-2023-34362.

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-34362detection.emerging-threats
Florian Roth (Nextron Systems)+1Thu Jun 012023
Emerging Threathightest

MOVEit CVE-2023-34362 Exploitation Attempt - Potential Web Shell Request

Detects get requests to specific files used during the exploitation of MOVEit CVE-2023-34362

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shellcve.2023-34362detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sat Jun 032023
Emerging Threatmediumtest

Potential CVE-2023-36874 Exploitation - Uncommon Report.Wer Location

Detects the creation of a "Report.wer" file in an uncommon folder structure. This could be a sign of potential exploitation of CVE-2023-36874.

WindowsFile Event
TA0002 · Executioncve.2023-36874detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Aug 232023
Emerging Threathightest

Potential CVE-2023-36874 Exploitation - Fake Wermgr.Exe Creation

Detects the creation of a file named "wermgr.exe" being created in an uncommon directory. This could be a sign of potential exploitation of CVE-2023-36874.

WindowsFile Event
TA0002 · Executioncve.2023-36874detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Aug 232023
Emerging Threathightest

Potential CVE-2023-36874 Exploitation - Fake Wermgr Execution

Detects the execution of a renamed "cmd", "powershell" or "powershell_ise" binary. Attackers were seen using these binaries in a renamed form as "wermgr.exe" in exploitation of CVE-2023-36874

WindowsProcess Creation
TA0002 · Executioncve.2023-36874detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Aug 232023
Emerging Threatmediumtest

Potential CVE-2023-36884 Exploitation Dropped File

Detects a specific file being created in the recent folder of Office. These files have been seen being dropped during potential exploitations of CVE-2023-36884

WindowsFile Event
TA0003 · PersistenceTA0005 · Defense Evasioncve.2023-36884detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 132023
Emerging Threathightest

Potential CVE-2023-36884 Exploitation - Share Access

Detects access to a file share with a naming schema seen being used during exploitation of CVE-2023-36884

Windowssecurity
TA0011 · Command and Controlcve.2023-36884detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Jul 132023
Emerging Threathightest

CVE-2023-38331 Exploitation Attempt - Suspicious Double Extension File

Detects the creation of a file with a double extension and a space by WinRAR. This could be a sign of exploitation of CVE-2023-38331

WindowsFile Event
TA0002 · Executioncve.2023-38331detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Aug 302023
Emerging Threathightest

CVE-2023-38331 Exploitation Attempt - Suspicious WinRAR Child Process

Detects exploitation attempt of CVE-2023-38331 (WinRAR before v6.23), where an attacker can leverage WinRAR to execute arbitrary commands and binaries.

WindowsProcess Creation
detection.emerging-threatsTA0002 · ExecutionT1203 · Exploitation for Client Executioncve.2023-38331
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 302023
Emerging Threatlowtest

CVE-2023-40477 Potential Exploitation - .REV File Creation

Detects the creation of ".rev" files by WinRAR. Could be indicative of potential exploitation of CVE-2023-40477. Look for a suspicious execution shortly after creation or a WinRAR application crash.

WindowsFile Event
TA0002 · Executioncve.2023-40477detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Aug 312023
Emerging Threatmediumtest

CVE-2023-40477 Potential Exploitation - WinRAR Application Crash

Detects a crash of "WinRAR.exe" where the version is lower than 6.23. This could indicate potential exploitation of CVE-2023-40477

Windowsapplication
TA0002 · Executioncve.2023-40477detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Aug 312023
Emerging Threathightest

Potential Information Disclosure CVE-2023-43261 Exploitation - Proxy

Detects exploitation attempts of CVE-2023-43261 and information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 that allows attackers to access sensitive router components in proxy logs.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-43621detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 202023
Emerging Threathightest

Potential Information Disclosure CVE-2023-43261 Exploitation - Web

Detects exploitation attempts of CVE-2023-43261 and information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 that allows attackers to access sensitive router components in access logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-43621detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 202023
Emerging Threatmediumtest

Potential CVE-2023-46214 Exploitation Attempt

Detects potential exploitation of CVE-2023-46214, a remote code execution (RCE) in Splunk Enterprise through insecure XML parsing

Web Server Log
TA0008 · Lateral MovementT1210 · Exploitation of Remote Servicescve.2023-46214detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Mon Nov 272023
Emerging Threathightest

CVE-2023-46747 Exploitation Activity - Proxy

Detects exploitation activity of CVE-2023-46747 an unauthenticated remote code execution vulnerability in F5 BIG-IP.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-46747detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Nov 082023
Emerging Threathightest

CVE-2023-46747 Exploitation Activity - Webserver

Detects exploitation activity of CVE-2023-46747 an unauthenticated remote code execution vulnerability in F5 BIG-IP.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-46747detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Nov 082023
Emerging Threathightest

CVE-2023-4966 Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Proxy

Detects exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via proxy logs by looking for a very long host header string.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Nov 282023
Emerging Threatmediumtest

CVE-2023-4966 Potential Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Proxy

Detects potential exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via proxy logs.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Tue Nov 282023
Emerging Threatmediumtest

CVE-2023-4966 Potential Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Webserver

Detects potential exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via webserver logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Tue Nov 282023
Emerging Threathightest

CVE-2023-4966 Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Webserver

Detects exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via webserver logs by looking for a very long host header string.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Nov 282023
Emerging Threathightest

Potential Exploitation Attempt Of Undocumented WindowsServer RCE

Detects potential exploitation attempt of undocumented Windows Server Pre Auth Remote Code Execution (RCE)

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Florian Roth (Nextron Systems)+1Sat Jan 212023
Emerging Threathightest

Potential COLDSTEEL RAT File Indicators

Detects the creation of a file named "dllhost.exe" in the "C:\users\public\Documents\" directory. Seen being used by the COLDSTEEL RAT in some of its variants.

WindowsFile Event
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sun Apr 302023
Emerging Threathightest

Potential COLDSTEEL Persistence Service DLL Load

Detects a suspicious DLL load by an "svchost" process based on location and name that might be related to ColdSteel RAT. This DLL location and name has been seen used by ColdSteel as the service DLL for its persistence mechanism

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 022023
Emerging Threathightest

COLDSTEEL RAT Anonymous User Process Execution

Detects the creation of a process executing as user called "ANONYMOUS" seen used by the "MileStone2016" variant of COLDSTEEL

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sun Apr 302023
Emerging Threatcriticaltest

COLDSTEEL RAT Cleanup Command Execution

Detects the creation of a "rundll32" process from the ColdSteel persistence service to initiate the cleanup command by calling one of its own exports. This functionality is not present in "MileStone2017" and some "MileStone2016" samples

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sun Apr 302023
Emerging Threathightest

Potential COLDSTEEL RAT Windows User Creation

Detects creation of a new user profile with a specific username, seen being used by some variants of the COLDSTEEL RAT.

WindowsRegistry Set
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 022023
Emerging Threathightest

COLDSTEEL Persistence Service Creation

Detects the creation of new services potentially related to COLDSTEEL RAT

Windowssystem
TA0005 · Defense EvasionTA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 022023
Emerging Threatcriticaltest

Griffon Malware Attack Pattern

Detects process execution patterns related to Griffon malware as reported by Kaspersky

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Mar 092023
Emerging Threathightest

IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32

Detects RunDLL32.exe executing a single digit DLL named "1.dll" with the export function "DllRegisterServer". This behaviour was often seen used by malware and especially IcedID

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Aug 312023
Emerging Threathightest

Pikabot Fake DLL Extension Execution Via Rundll32.EXE

Detects specific process tree behavior linked to "rundll32" executions, wherein the associated DLL lacks a common ".dll" extension, often signaling potential Pikabot activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
Swachchhanda Shrawan Poudel+1Fri Jan 262023
Emerging Threathightest

Qakbot Regsvr32 Calc Pattern

Detects a specific command line of "regsvr32" where the "calc" keyword is used in conjunction with the "/s" flag. This behavior is often seen used by Qakbot

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri May 262023
Emerging Threatcriticaltest

Qakbot Rundll32 Fake DLL Extension Execution

Detects specific process tree behavior of a "rundll32" execution where the DLL doesn't have the ".dll" extension. This is often linked with potential Qakbot activity.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
X__Junior (Nextron Systems)+1Wed May 242023
Emerging Threatcriticaltest

SNAKE Malware Kernel Driver File Indicator

Detects SNAKE malware kernel driver file indicator

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed May 102023
Emerging Threatlowtest

SNAKE Malware Installer Name Indicators

Detects filename indicators associated with the SNAKE malware as reported by CISA in their report

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed May 102023
Emerging Threathightest

SNAKE Malware WerFault Persistence File Creation

Detects the creation of a file named "WerFault.exe" in the WinSxS directory by a non-system process, which can be indicative of potential SNAKE malware activity

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed May 102023
Emerging Threathightest

Potential SNAKE Malware Installation CLI Arguments Indicator

Detects a specific command line arguments sequence seen used by SNAKE malware during its installation as described by CISA in their report

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential SNAKE Malware Installation Binary Indicator

Detects a specific binary name seen used by SNAKE malware during its installation as described by CISA in their report

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023