Rule Library

Sigma Rules

1,405 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

ETW Trace Evasion Activity

Detects command line activity that tries to clear or disable any ETW trace log which could be a sign of logging evasion.

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562.006 · Indicator Blocking2016-04-002 · CAR 2016-04-002
@neu5ron+3Fri Mar 22windows
Detectionhighstable

Suspicious Eventlog Clearing or Configuration Change Activity

Detects the clearing or configuration tampering of EventLog using utilities such as "wevtutil", "powershell" and "wmic". This technique were seen used by threat actors and ransomware strains in order to evade defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.001 · Clear Windows Event LogsT1562.002 · Disable Windows Event Logging2016-04-002 · CAR 2016-04-002
Ecco+4Thu Sep 26windows
Detectionmediumtest

Potentially Suspicious EventLog Recon Activity Using Log Query Utilities

Detects execution of different log query utilities and commands to search and dump the content of specific event logs or look for specific event IDs. This technique is used by threat actors in order to extract sensitive information from events logs such as usernames, IP addresses, hostnames, etc.

WindowsProcess Creation
TA0006 · Credential AccessTA0007 · DiscoveryT1552 · Unsecured CredentialsT1087 · Account Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Sep 09windows
Detectionhightest

Potentially Suspicious Execution From Parent Process In Public Folder

Detects a potentially suspicious execution of a parent process located in the "\Users\Public" folder executing a child process containing references to shell or scripting binaries and commandlines.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1564 · Hide ArtifactsT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Fri Feb 25windows
Detectionhightest

Process Execution From A Potentially Suspicious Folder

Detects a potentially suspicious execution from an uncommon folder.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+1Wed Jan 16windows
Detectionhighexperimental

Suspicious FileFix Execution Pattern

Detects suspicious FileFix execution patterns where users are tricked into running malicious commands through browser file upload dialog manipulation. This attack typically begins when users visit malicious websites impersonating legitimate services or news platforms, which may display fake CAPTCHA challenges or direct instructions to open file explorer and paste clipboard content. The clipboard content usually contains commands that download and execute malware, such as information stealing tools.

WindowsProcess Creation
TA0002 · Executionattack.t1204.004
0xFustang+1Mon Nov 24windows
Detectionhightest

Suspicious Reconnaissance Activity Via GatherNetworkInfo.VBS

Detects execution of the built-in script located in "C:\Windows\System32\gatherNetworkInfo.vbs". Which can be used to gather information about the target machine

WindowsProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1615 · Group Policy DiscoveryT1059.005 · Visual Basic
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows
Detectionmediumtest

Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream - CLI

Detects command line containing reference to the "::$index_allocation" stream, which can be used as a technique to prevent access to folders or files from tooling such as "explorer.exe" or "powershell.exe"

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Nasreddine Bencherchali (Nextron Systems)+1Mon Oct 09windows
Detectionhightest

Execution Of Non-Existing File

Checks whether the image specified in a process creation event is not a full, absolute path (caused by process ghosting or other unorthodox methods to start a process)

WindowsProcess Creation
TA0005 · Defense Evasion
Max Altgelt (Nextron Systems)Thu Dec 09windows
Detectionhightest

Base64 MZ Header In CommandLine

Detects encoded base64 MZ header in the commandline

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionmediumexperimental

Potentially Suspicious Inline JavaScript Execution via NodeJS Binary

Detects potentially suspicious inline JavaScript execution using Node.js with specific keywords in the command line.

WindowsProcess Creation
TA0002 · ExecutionT1059.007 · JavaScript
Microsoft+1Mon Apr 21windows
Detectionhightest

Potential WinAPI Calls Via CommandLine

Detects the use of WinAPI Functions via the commandline. As seen used by threat actors via the tool winapiexec

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native API
Nasreddine Bencherchali (Nextron Systems)Tue Sep 06windows
Detectionmediumtest

Potentially Suspicious JWT Token Search Via CLI

Detects potentially suspicious search for JWT tokens via CLI by looking for the string "eyJ0eX" or "eyJhbG". JWT tokens are often used for access-tokens across various applications and services like Microsoft 365, Azure, AWS, Google Cloud, and others. Threat actors may search for these tokens to steal them for lateral movement or privilege escalation.

WindowsProcess Creation
TA0006 · Credential AccessT1528 · Steal Application Access TokenT1552.001 · Credentials In Files
Nasreddine Bencherchali (Nextron Systems)+1Tue Oct 25windows
Detectionhighexperimental

Suspicious LNK Command-Line Padding with Whitespace Characters

Detects exploitation of LNK file command-line length discrepancy, where attackers hide malicious commands beyond the 260-character UI limit while the actual command-line argument field supports 4096 characters using whitespace padding (e.g., 0x20, 0x09-0x0D). Adversaries insert non-printable whitespace characters (e.g., Line Feed \x0A, Carriage Return \x0D) to pad the visible section of the LNK file, pushing malicious commands past the UI-visible boundary. The hidden payload, executed at runtime but invisible in Windows Explorer properties, enables stealthy execution and evasion—commonly used for social engineering attacks. This rule flags suspicious use of such padding observed in real-world attacks.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1204.002 · Malicious File
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Mar 19windows
Detectionhightest

LSASS Dump Keyword In CommandLine

Detects the presence of the keywords "lsass" and ".dmp" in the commandline, which could indicate a potential attempt to dump or create a dump of the lsass process.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
E.M. Anhaus+3Thu Oct 24windows
Detectionmediumtest

Potential File Download Via MS-AppInstaller Protocol Handler

Detects usage of the "ms-appinstaller" protocol handler via command line to potentially download arbitrary files via AppInstaller.EXE The downloaded files are temporarly stored in ":\Users\%username%\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\INetCache\<RANDOM-8-CHAR-DIRECTORY>"

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Thu Nov 09windows
Detectionmediumtest

Potential Network Sniffing Activity Using Network Tools

Detects potential network sniffing via use of network tools such as "tshark", "windump". Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

WindowsProcess Creation
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
Timur Zinniatullin+2Mon Oct 21windows
Detectionmediumtest

Execution of Suspicious File Type Extension

Detects whether the image specified in a process creation event doesn't refer to an ".exe" (or other known executable extension) file. This can be caused by process ghosting or other unorthodox methods to start a process. This rule might require some initial baselining to align with some third party tooling in the user environment.

WindowsProcess Creation
TA0005 · Defense Evasion
Max Altgelt (Nextron Systems)Thu Dec 09windows
Detectionhightest

Suspicious Process Patterns NTDS.DIT Exfil

Detects suspicious process patterns used in NTDS.DIT exfiltration

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Fri Mar 11windows
Detectionhightest

Potentially Suspicious Call To Win32_NTEventlogFile Class

Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 13windows
Detectionmediumtest

Use Short Name Path in Image

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Sun Aug 07windows
Detectionmediumtest

Use NTFS Short Name in Command Line

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid command-line detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Fri Aug 05windows
Detectionmediumtest

Use NTFS Short Name in Image

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image based detection

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François Hubaut+1Sat Aug 06windows
Detectionmediumtest

Obfuscated IP Download Activity

Detects use of an encoded/obfuscated version of an IP address (hex, octal...) in an URL combined with a download command

WindowsProcess Creation
TA0007 · Discovery
Florian Roth (Nextron Systems)+1Wed Aug 03windows
Detectionmediumtest

Obfuscated IP Via CLI

Detects usage of an encoded/obfuscated version of an IP address (hex, octal, etc.) via command line

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 03windows
Detectionhightest

Suspicious Process Parents

Detects suspicious parent processes that should not have any children or should only have a single possible child program

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)Mon Mar 21windows
Detectionhightest

Potential PowerShell Execution Via DLL

Detects potential PowerShell execution from a DLL instead of the usual PowerShell process as seen used in PowerShdll. This detection assumes that PowerShell commands are passed via the CommandLine.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Markus Neis+1Sat Aug 25windows
Detectionmediumtest

Private Keys Reconnaissance Via CommandLine Tools

Adversaries may search for private key certificate files on compromised systems for insecurely stored credential

WindowsProcess Creation
TA0006 · Credential AccessT1552.004 · Private Keys
François Hubaut+1Tue Jul 20windows
Detectionmediumtest

Suspicious RunAs-Like Flag Combination

Detects suspicious command line flags that let the user set a target user and command as e.g. seen in PsExec-like tools

WindowsProcess Creation
TA0004 · Privilege Escalation
Florian Roth (Nextron Systems)Fri Nov 11windows
Detectionhightest

Suspicious Program Names

Detects suspicious patterns in program names or folders that are often found in malicious samples or hacktools

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Fri Feb 11windows
Detectionhightest

Suspicious Process Execution From Fake Recycle.Bin Folder

Detects process execution from a fake recycle bin folder, often used to avoid security solution.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasion
X__Junior (Nextron Systems)Wed Jul 12windows
Detectionhightest

Suspicious Redirection to Local Admin Share

Detects a suspicious output redirection to the local admins share, this technique is often found in malicious scripts or hacktool stagers

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Florian Roth (Nextron Systems)Sun Jan 16windows
Detectionmediumtest

Registry Modification of MS-settings Protocol Handler

Detects registry modifications to the 'ms-settings' protocol handler, which is frequently targeted for UAC bypass or persistence. Attackers can modify this registry to execute malicious code with elevated privileges by hijacking the command execution path.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · PersistenceT1548.002 · Bypass User Account Control+2
François Hubaut+1Mon Dec 20windows
Detectionhightest

Potential Defense Evasion Via Right-to-Left Override

Detects the presence of the "u202+E" character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence. This character is used as an obfuscation and masquerading techniques by adversaries to trick users into opening malicious files.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Micah Babinski+2Wed Feb 15windows
Detectionhightest

Script Interpreter Execution From Suspicious Folder

Detects a suspicious script execution in temporary folders or folders accessible by environment variables

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+1Tue Feb 08windows
Detectionhightest

Suspicious Script Execution From Temp Folder

Detects a suspicious script executions from temporary folder

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)+2Wed Jul 14windows
Detectionhighexperimental

Script Interpreter Spawning Credential Scanner - Windows

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets, as seen in the "Shai-Hulud: The Second Coming" campaign.

WindowsProcess Creation
TA0006 · Credential AccessT1552 · Unsecured CredentialsTA0009 · CollectionTA0002 · Execution+2
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 25windows
Detectionhightest

Sensitive File Access Via Volume Shadow Copy Backup

Detects a command that accesses the VolumeShadowCopy in order to extract sensitive files such as the Security or SAM registry hives or the AD database (ntds.dit)

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Max Altgelt (Nextron Systems)+1Mon Aug 09windows
Detectionhightest

Suspicious New Service Creation

Detects creation of a new service via "sc" command or the powershell "new-service" cmdlet with suspicious binary paths

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Jul 14windows
Detectionhightest

Suspicious Service Binary Directory

Detects a service binary running in a suspicious directory

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)Tue Mar 09windows
Detectionhightest

Suspicious Windows Service Tampering

Detects the usage of binaries such as 'net', 'sc' or 'powershell' in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1489 · Service StopT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+2Thu Sep 01windows
Detectionhighstable

Shadow Copies Deletion Using Operating Systems Utilities

Shadow Copies deletion using operating systems utilities

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1070 · Indicator RemovalT1490 · Inhibit System Recovery
Florian Roth (Nextron Systems)+5Tue Oct 22windows
Detectionhightest

Windows Shell/Scripting Processes Spawning Suspicious Programs

Detects suspicious child processes of a Windows shell and scripting processes such as wscript, rundll32, powershell, mshta...etc.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.005 · Visual BasicT1059.001 · PowerShell+1
Florian Roth (Nextron Systems)+1Fri Apr 06windows
Detectionmediumtest

Process Creation Using Sysnative Folder

Detects process creation events that use the Sysnative folder (common for CobaltStrike spawns)

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Max Altgelt (Nextron Systems)Tue Aug 23windows
Detectionhightest

System File Execution Location Anomaly

Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+4Mon Nov 27windows
Detectionhightest

Suspicious SYSTEM User Process Creation

Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)

WindowsProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationT1134 · Access Token Manipulation+2
Florian Roth (Nextron Systems)+1Mon Dec 20windows
Detectionmediumtest

Suspicious Userinit Child Process

Detects a suspicious child process of userinit

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Florian Roth (Nextron Systems)+1Mon Jun 17windows
Detectionhighexperimental

Suspicious Velociraptor Child Process

Detects the suspicious use of the Velociraptor DFIR tool to execute other tools or download additional payloads, as seen in a campaign where it was abused for remote access and to stage further attacks.

WindowsProcess Creation
TA0011 · Command and ControlTA0003 · PersistenceTA0005 · Defense EvasionT1219 · Remote Access Software
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Aug 29windows