Rule Library

Sigma Rules

498 rules found for "Florian Roth (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectioncriticaltest

HackTool - BabyShark Agent Default URL Pattern

Detects Baby Shark C2 Framework default communication patterns

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Wed Jun 09web
Detectionhightest

HackTool - CobaltStrike Malleable Profile Patterns - Proxy

Detects cobalt strike malleable profiles patterns (URI, User-Agents, Methods).

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Markus Neis+1Thu Feb 15web
Detectionhightest

HackTool - Empire UserAgent URI Combo

Detects user agent and URI paths used by empire agents

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Jul 13web
Detectioncriticaltest

PwnDrp Access

Detects downloads from PwnDrp web servers developed for red team testing and most likely also used for criminal activity

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.001 · Dead Drop ResolverT1102.003 · One-Way Communication
Florian Roth (Nextron Systems)Wed Apr 15web
Detectionhightest

Raw Paste Service Access

Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.001 · Dead Drop ResolverT1102.003 · One-Way Communication+1
Florian Roth (Nextron Systems)Thu Dec 05web
Detectionhightest

Flash Player Update from Suspicious Location

Detects a flashplayer update from an unofficial location

Proxy Log
TA0001 · Initial AccessT1189 · Drive-by CompromiseTA0002 · ExecutionT1204.002 · Malicious File+2
Florian Roth (Nextron Systems)Wed Oct 25web
Detectionmediumtest

Telegram API Access

Detects suspicious requests to Telegram API without the usual Telegram User-Agent

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.002 · Bidirectional Communication
Florian Roth (Nextron Systems)Tue Jun 05web
Detectionhightest

APT User Agent

Detects suspicious user agent strings used in APT malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+1Tue Nov 12web
Detectionhightest

Bitsadmin to Uncommon IP Server Address

Detects Bitsadmin connections to IP addresses instead of FQDN names

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)Fri Jun 10web
Detectionhightest

Bitsadmin to Uncommon TLD

Detects Bitsadmin connections to domains with uncommon TLDs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)+1Thu Mar 07web
Detectionhightest

Crypto Miner User Agent

Detects suspicious user agent strings used by crypto miners in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Oct 21web
Detectionmediumtest

HTTP Request With Empty User Agent

Detects a potentially suspicious empty user agent strings in proxy log. Could potentially indicate an uncommon request method.

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Exploit Framework User Agent

Detects suspicious user agent strings used by exploit / pentest frameworks like Metasploit in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Hack Tool User Agent

Detects suspicious user agent strings user by hack tools in proxy logs

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0006 · Credential AccessT1110 · Brute Force
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Malware User Agent

Detects suspicious user agent strings used by malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+2Sat Jul 08web
Detectionmediumtest

Windows PowerShell User Agent

Detects Windows PowerShell Web Access

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Mar 13web
Detectionhightest

Suspicious User Agent

Detects suspicious malformed user agent strings in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionmediumtest

Potential Base64 Encoded User-Agent

Detects User Agent strings that end with an equal sign, which can be a sign of base64 encoding.

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+1Fri Jul 08web
Detectionhightest

JNDIExploit Pattern

Detects exploitation attempt using the JNDI-Exploit-Kit

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Sun Dec 12web
Detectionmediumtest

Path Traversal Exploitation Attempts

Detects path traversal exploitation attempts

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Subhash Popuri+3Sat Sep 25web
Detectionhightest

Windows Webshell Strings

Detects common commands used in Windows webshells

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+1Sun Feb 19web
Detectionhightest

Microsoft Malware Protection Engine Crash

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

Windowsapplication
TA0005 · Defense EvasionT1211 · Exploitation for Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Tue May 09windows
Detectioncriticaltest

Audit CVE Event

Detects events generated by user-mode applications when they call the CveEventWrite API when a known vulnerability is trying to be exploited. MS started using this log in Jan. 2020 with CVE-2020-0601 (a Windows CryptoAPI vulnerability. Unfortunately, that is about the only instance of CVEs being written to this log.

Windowsapplication
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation+8
Florian Roth (Nextron Systems)+1Wed Jan 15windows
Detectionmediumtest

Backup Catalog Deleted

Detects backup catalog deletions

Windowsapplication
TA0005 · Defense EvasionT1070.004 · File Deletion
Florian Roth (Nextron Systems)+1Fri May 12windows
Detectionhightest

Relevant Anti-Virus Signature Keywords In Application Log

Detects potentially highly relevant antivirus events in the application log based on known virus signature names and malware keywords.

Windowsapplication
TA0042 · Resource DevelopmentT1588 · Obtain Capabilities
Florian Roth (Nextron Systems)+1Sun Feb 19windows
Detectionhightest

Microsoft Malware Protection Engine Crash - WER

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

Windowsapplication
TA0005 · Defense EvasionT1211 · Exploitation for Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Tue May 09windows
Detectionhightest

BITS Transfer Job Download From File Sharing Domains

Detects BITS transfer job downloading files from a file sharing domain.

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Tue Jun 28windows
Detectionmediumtest

BITS Transfer Job With Uncommon Or Suspicious Remote TLD

Detects a suspicious download using the BITS client from a FQDN that is unusual. Adversaries may abuse BITS jobs to persistently execute or clean up after malicious payloads.

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Fri Jun 10windows
Detectionhightest

BITS Transfer Job Download To Potential Suspicious Folder

Detects new BITS transfer job where the LocalName/Saved file is stored in a potentially suspicious location

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Tue Jun 28windows
Detectionlowexperimental

CodeIntegrity - Unmet Signing Level Requirements By File Under Validation

Detects attempted file load events that did not meet the signing level requirements. It often means the file's signature is revoked or a signature with the Lifetime Signing EKU has expired. This event is best correlated with EID 3089 to determine the error of the validation.

Windowscodeintegrity-operational
TA0002 · Execution
Florian Roth (Nextron Systems)+1Thu Jan 20windows
Detectionhightest

DNS Server Error Failed Loading the ServerLevelPluginDLL

Detects a DNS server error in which a specified plugin DLL (in registry) could not be loaded

Windowsdns-server
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Florian Roth (Nextron Systems)Mon May 08windows
Detectionlowtest

USB Device Plugged

Detects plugged/unplugged USB devices

Windowsdriver-framework
TA0001 · Initial AccessT1200 · Hardware Additions
Florian Roth (Nextron Systems)Thu Nov 09windows
Detectioncriticaltest

ProxyLogon MSExchange OabVirtualDirectory

Detects specific patterns found after a successful ProxyLogon exploitation in relation to a Commandlet invocation of Set-OabVirtualDirectory

Windowsmsexchange-management
T1587.001 · MalwareTA0042 · Resource Development
Florian Roth (Nextron Systems)Mon Aug 09windows
Detectioncriticaltest

Mailbox Export to Exchange Webserver

Detects a successful export of an Exchange mailbox to untypical directory or with aspx name suffix which can be used to place a webshell or the needed role assignment for it

Windowsmsexchange-management
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+2Mon Aug 09windows
Detectionlowtest

NTLM Logon

Detects logons using NTLM, which could be caused by a legacy source or attackers

Windowsntlm
TA0005 · Defense EvasionTA0008 · Lateral MovementT1550.002 · Pass the Hash
Florian Roth (Nextron Systems)Fri Jun 08windows
Detectionhightest

RottenPotato Like Attack Pattern

Detects logon events that have characteristics of events generated during an attack with RottenPotato and the like

Windowssecurity
TA0009 · CollectionTA0004 · Privilege EscalationTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
@sbousseaden+1Fri Nov 15windows
Detectionlowtest

Access To ADMIN$ Network Share

Detects access to ADMIN$ network share

Windowssecurity
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Florian Roth (Nextron Systems)Sat Mar 04windows
Detectionhightest

Hacktool Ruler

This events that are generated when using the hacktool Ruler by Sensepost

Windowssecurity
TA0005 · Defense EvasionTA0007 · DiscoveryTA0002 · ExecutionTA0009 · Collection+5
Florian Roth (Nextron Systems)Wed May 31windows
Detectionhightest

Security Eventlog Cleared

One of the Windows Eventlogs has been cleared. e.g. caused by "wevtutil cl" command execution

Windowssecurity
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs2016-04-002 · CAR 2016-04-002
Florian Roth (Nextron Systems)Tue Jan 10windows
Detectionhightest

CobaltStrike Service Installations - Security

Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement

Windowssecurity
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationTA0008 · Lateral Movement+3
Florian Roth (Nextron Systems)+1Wed May 26windows
Detectionhightest

Mimikatz DC Sync

Detects Mimikatz DC sync security events

Windowssecurity
TA0006 · Credential AccessS0002 · MimikatzT1003.006 · DCSync
Benjamin Delpy+3Sun Jun 03windows
Detectionhightest

Credential Dumping Tools Service Execution - Security

Detects well-known credential dumping tools execution via service execution events

Windowssecurity
TA0006 · Credential AccessTA0002 · ExecutionT1003.001 · LSASS MemoryT1003.002 · Security Account Manager+5
Florian Roth (Nextron Systems)+3Sun Mar 05windows
Detectionhightest

Meterpreter or Cobalt Strike Getsystem Service Installation - Security

Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation

Windowssecurity
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.001 · Token Impersonation/TheftT1134.002 · Create Process with Token
Teymur Kheirkhabarov+2Sat Oct 26windows
Detectionhightest

NetNTLM Downgrade Attack

Detects NetNTLM downgrade attack

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1112 · Modify Registry
Florian Roth (Nextron Systems)+1Tue Mar 20windows
Detectionmediumtest

Account Tampering - Suspicious Failed Logon Reasons

This method uses uncommon error codes on failed logons to determine suspicious activity and tampering with accounts that have been disabled or somehow restricted.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0001 · Initial Access+1
Florian Roth (Nextron Systems)Sun Feb 19windows
Detectionhightest

Kerberos Manipulation

Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.

Windowssecurity
TA0006 · Credential AccessT1212 · Exploitation for Credential Access
Florian Roth (Nextron Systems)Fri Feb 10windows
Detectionhightest

Reconnaissance Activity

Detects activity as "net user administrator /domain" and "net group domain admins /domain"

Windowssecurity
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsS0039 · S0039
Florian Roth (Nextron Systems)+3Tue Mar 07windows
Detectionmediumtest

Password Protected ZIP File Opened

Detects the extraction of password protected ZIP archives. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Mon May 09windows