Rule Library

Sigma Rules

115 rules found for "Austin Songer"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

OneLogin User Assumed Another User

Detects when an user assumed another user account.

oneloginonelogin.events
TA0040 · Impact
Austin SongerTue Oct 12identity
Detectionlowtest

OneLogin User Account Locked

Detects when an user account is locked or suspended.

oneloginonelogin.events
TA0040 · Impact
Austin SongerTue Oct 12identity
Detectionmediumtest

Suspicious MacOS Firmware Activity

Detects when a user manipulates with Firmward Password on MacOS. NOTE - this command has been disabled on silicon-based apple computers.

macOSProcess Creation
TA0040 · Impact
Austin SongerThu Sep 30macos
Detectionhightest

AADInternals PowerShell Cmdlets Execution - PsScript

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

WindowsPowerShell Script
TA0002 · ExecutionTA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential Access+1
Austin Songer+2Fri Dec 23windows
Detectionhightest

Clearing Windows Console History

Identifies when a user attempts to clear console history. An adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion.

WindowsPowerShell Script
TA0005 · Defense EvasionT1070 · Indicator RemovalT1070.003 · Clear Command History
Austin SongerThu Nov 25windows
Detectionhightest

Malicious PowerShell Commandlets - ScriptBlock

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Sean Metcalf+10Sun Mar 05windows
Detectionmediumtest

Windows Firewall Profile Disabled

Detects when a user disables the Windows Firewall via a Profile to help evade defense.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerTue Oct 12windows
Detectionmediumtest

DLL Loaded via CertOC.EXE

Detects when a user installs certificates by using CertOC.exe to loads the target DLL file.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Austin SongerSat Oct 23windows
Detectionhightest

Potential Windows Defender AV Bypass Via Dump64.EXE Rename

Detects when a user is potentially trying to bypass the Windows Defender AV by renaming a tool to dump64.exe and placing it in the Visual Studio folder. Currently the rule is covering only usage of procdump but other utilities can be added in order to increase coverage.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Austin Songer+2Fri Nov 26windows
Detectionmediumtest

LOLBAS Data Exfiltration by DataSvcUtil.exe

Detects when a user performs data exfiltration by using DataSvcUtil.exe

WindowsProcess Creation
TA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
Ialle Teixeira+1Thu Sep 30windows
Detectionmediumtest

Suspicious Driver Install by pnputil.exe

Detects when a possible suspicious driver is being installed via pnputil.exe lolbin

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
Hai Vaknin+2Thu Sep 30windows
Detectionmediumtest

Potential Register_App.Vbs LOLScript Abuse

Detects potential abuse of the "register_app.vbs" script that is part of the Windows SDK. The script offers the capability to register new VSS/VDS Provider as a COM+ application. Attackers can use this to install malicious DLLs for persistence and execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Austin SongerFri Nov 05windows
Detectionhightest

AADInternals PowerShell Cmdlets Execution - ProccessCreation

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

WindowsProcess Creation
TA0002 · ExecutionTA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential Access+1
Austin Songer+2Fri Dec 23windows
Detectionhightest

Execution via stordiag.exe

Detects the use of stordiag.exe to execute schtasks.exe systeminfo.exe and fltmc.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Austin SongerThu Oct 21windows
Detectionmediumtest

Usage Of Web Request Commands And Cmdlets

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via CommandLine

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
James Pemberton+4Thu Oct 24windows
Detectionmediumtest

Disable Exploit Guard Network Protection on Windows Defender

Detects disabling Windows Defender Exploit Guard Network Protection

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin SongerWed Aug 04windows
Detectionhightest

Disable PUA Protection on Windows Defender

Detects disabling Windows Defender PUA protection

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin SongerWed Aug 04windows
Detectionmediumtest

Disable Tamper Protection on Windows Defender

Detects disabling Windows Defender Tamper Protection

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin SongerWed Aug 04windows
Detectionmediumtest

DNS-over-HTTPS Enabled by Registry

Detects when a user enables DNS-over-HTTPS. This can be used to hide internet activity or be used to hide the process of exfiltrating data. With this enabled organization will lose visibility into data such as query type, response and originating IP that are used to determine bad actors.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationT1112 · Modify Registry
Austin SongerThu Jul 22windows