Rule Library

Sigma Rules

638 rules found for "Florian Roth (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Password Protected ZIP File Opened (Suspicious Filenames)

Detects the extraction of password protected ZIP archives with suspicious file names. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0011 · Command and ControlTA0005 · Defense EvasionT1027 · Obfuscated Files or InformationT1105 · Ingress Tool Transfer+1
Florian Roth (Nextron Systems)Mon May 09windows
Detectionhightest

Password Protected ZIP File Opened (Email Attachment)

Detects the extraction of password protected ZIP archives. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0005 · Defense EvasionTA0001 · Initial AccessT1027 · Obfuscated Files or InformationT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)Mon May 09windows
Detectionmediumtest

Suspicious Kerberos RC4 Ticket Encryption

Detects service ticket requests using RC4 encryption type

Windowssecurity
TA0006 · Credential AccessT1558.003 · Kerberoasting
Florian Roth (Nextron Systems)Mon Feb 06windows
Detectionmediumstable

User Added to Local Administrator Group

Detects the addition of a new member to the local administrator group, which could be legitimate activity or a sign of privilege escalation activity

Windowssecurity
TA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationT1078 · Valid Accounts+2
Florian Roth (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

WMI Persistence - Security

Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs.

Windowssecurity
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)+2Tue Aug 22windows
Detectionmediumtest

Suspicious Rejected SMB Guest Logon From IP

Detect Attempt PrintNightmare (CVE-2021-1675) Remote code execution in Windows Spooler Service

Windowssmbclient-security
TA0006 · Credential AccessT1110.001 · Password Guessing
Florian Roth (Nextron Systems)+2Wed Jun 30windows
Detectionhightest

Local Privilege Escalation Indicator TabTip

Detects the invocation of TabTip via CLSID as seen when JuicyPotatoNG is used on a system in brute force mode

Windowssystem
TA0009 · CollectionTA0002 · ExecutionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
Florian Roth (Nextron Systems)Fri Oct 07windows
Detectionmediumtest

Eventlog Cleared

One of the Windows Eventlogs has been cleared. e.g. caused by "wevtutil cl" command execution

Windowssystem
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs2016-04-002 · CAR 2016-04-002
Florian Roth (Nextron Systems)Tue Jan 10windows
Detectionhightest

Important Windows Eventlog Cleared

Detects the clearing of one of the Windows Core Eventlogs. e.g. caused by "wevtutil cl" command execution

Windowssystem
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs2016-04-002 · CAR 2016-04-002
Florian Roth (Nextron Systems)+2Tue May 17windows
Detectionhightest

Critical Hive In Suspicious Location Access Bits Cleared

Detects events from the Kernel-General ETW indicating that the access bits of a hive with a system like hive name located in the temp directory have been reset. This occurs when an application tries to access a hive and the hive has not be recognized since the last 7 days (by default). Registry hive dumping utilities such as QuarksPwDump were seen emitting this behavior.

Windowssystem
TA0006 · Credential AccessT1003.002 · Security Account Manager
Florian Roth (Nextron Systems)Mon May 15windows
Detectionhightest

NTFS Vulnerability Exploitation

This the exploitation of a NTFS vulnerability as reported without many details via Twitter

Windowssystem
TA0040 · ImpactT1499.001 · OS Exhaustion Flood
Florian Roth (Nextron Systems)Mon Jan 11windows
Detectioncriticaltest

CobaltStrike Service Installations - System

Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement

Windowssystem
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationTA0008 · Lateral Movement+3
Florian Roth (Nextron Systems)+1Wed May 26windows
Detectionhightest

Credential Dumping Tools Service Execution - System

Detects well-known credential dumping tools execution via service execution events

Windowssystem
TA0006 · Credential AccessTA0002 · ExecutionT1003.001 · LSASS MemoryT1003.002 · Security Account Manager+5
Florian Roth (Nextron Systems)+3Sun Mar 05windows
Detectionhightest

Meterpreter or Cobalt Strike Getsystem Service Installation - System

Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation

Windowssystem
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.001 · Token Impersonation/TheftT1134.002 · Create Process with Token
Teymur Kheirkhabarov+2Sat Oct 26windows
Detectionhightest

HackTool Service Registration or Execution

Detects installation or execution of services

Windowssystem
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)Mon Mar 21windows
Detectionhightest

ProcessHacker Privilege Elevation

Detects a ProcessHacker tool that elevated privileges to a very high level

Windowssystem
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1543.003 · Windows Service+1
Florian Roth (Nextron Systems)Thu May 27windows
Detectionhightest

Sliver C2 Default Service Installation

Detects known malicious service installation that appear in cases in which a Sliver implants execute the PsExec commands

Windowssystem
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1543.003 · Windows Service+1
Florian Roth (Nextron Systems)+1Thu Aug 25windows
Detectionhightest

Suspicious Service Installation

Detects suspicious service installation commands

Windowssystem
TA0003 · PersistenceTA0004 · Privilege Escalation2013-09-005 · CAR 2013-09-005T1543.003 · Windows Service
Martin Mueller+1Fri Mar 18windows
Detectionmediumtest

Uncommon Service Installation Image Path

Detects uncommon service installation commands by looking at suspicious or uncommon image path values containing references to encoded powershell commands, temporary paths, etc.

Windowssystem
TA0003 · PersistenceTA0004 · Privilege Escalation2013-09-005 · CAR 2013-09-005T1543.003 · Windows Service
Florian Roth (Nextron Systems)Fri Mar 18windows
Detectionhightest

Ngrok Usage with Remote Desktop Service

Detects cases in which ngrok, a reverse proxy tool, forwards events to the local RDP port, which could be a sign of malicious behaviour

Windowsterminalservices-localsessionmanager
TA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)Fri Apr 29windows
Detectionhightest

Mimikatz Use

This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)

Windows
S0002 · MimikatzTA0008 · Lateral MovementTA0006 · Credential Access2013-07-001 · CAR 2013-07-001+5
Florian Roth (Nextron Systems)+1Tue Jan 10windows
Detectionmediumtest

WMI Persistence

Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs.

Windowswmi
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)+2Tue Aug 22windows
Detectionhightest

HackTool - Potential CobaltStrike Process Injection

Detects a potential remote threat creation with certain characteristics which are typical for Cobalt Strike beacons

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.001 · Dynamic-link Library Injection
Olaf Hartong+3Fri Nov 30windows
Detectionmediumtest

Remote Thread Creation Via PowerShell In Uncommon Target

Detects the creation of a remote thread from a Powershell process in an uncommon target process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Jun 25windows
Detectionmediumtest

Remote Thread Creation In Uncommon Target Image

Detects uncommon target processes for remote thread creation

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.003 · Thread Execution Hijacking
Florian Roth (Nextron Systems)Wed Mar 16windows
Detectionmediumtest

Hidden Executable In NTFS Alternate Data Stream

Detects the creation of an ADS (Alternate Data Stream) that contains an executable by looking at a non-empty Imphash

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Sun Jun 03windows
Detectionhightest

Suspicious File Download From File Sharing Websites - File Stream

Detects the download of suspicious file type from a well-known file and paste sharing domain

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionmediumtest

Unusual File Download From File Sharing Websites - File Stream

Detects the download of suspicious file type from a well-known file and paste sharing domain

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionhightest

HackTool Named File Stream Created

Detects the creation of a named file stream with the imphash of a well-known hack tool

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionhightest

Unusual File Download from Direct IP Address

Detects the download of suspicious file type from URLs with IP

WindowsAlternate Data Stream
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Nasreddine Bencherchali (Nextron Systems)+1Wed Sep 07windows
Detectionhightest

Potentially Suspicious File Download From ZIP TLD

Detects the download of a file with a potentially suspicious extension from a .zip top level domain.

WindowsAlternate Data Stream
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Thu May 18windows
Detectioncriticaltest

Suspicious Cobalt Strike DNS Beaconing - Sysmon

Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Tue Nov 09windows
Detectionmediumtest

TeamViewer Domain Query By Non-TeamViewer Application

Detects DNS queries to a TeamViewer domain only resolved by a TeamViewer client by an image that isn't named TeamViewer (sometimes used by threat actors for obfuscation)

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sun Jan 30windows
Detectionhightest

PUA - Process Hacker Driver Load

Detects driver load of the Process Hacker tool

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege Escalationcve.2021-21551T1543 · Create or Modify System Process
Florian Roth (Nextron Systems)Wed Nov 16windows
Detectionmediumtest

PUA - System Informer Driver Load

Detects driver load of the System Informer tool

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Florian Roth (Nextron Systems)Mon May 08windows
Detectionhightest

Driver Load From A Temporary Directory

Detects a driver load from a temporary directory

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Florian Roth (Nextron Systems)Sun Feb 12windows
Detectionhightest

Vulnerable WinRing0 Driver Load

Detects the load of a signed WinRing0 driver often used by threat actors, crypto miners (XMRIG) or malware for privilege escalation

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Florian Roth (Nextron Systems)Tue Jul 26windows
Detectionhightest

WinDivert Driver Load

Detects the load of the Windiver driver, a powerful user-mode capture/sniffing/modification/blocking/re-injection package for Windows

WindowsDriver Load
TA0006 · Credential AccessTA0009 · CollectionTA0005 · Defense EvasionT1599.001 · Network Address Translation Traversal+1
Florian Roth (Nextron Systems)Fri Jul 30windows
Detectionhightest

Suspicious ASPX File Drop by Exchange

Detects suspicious file type dropped by an Exchange component in IIS into a suspicious folder

WindowsFile Event
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+2Sat Oct 01windows
Detectionmediumtest

Suspicious File Drop by Exchange

Detects suspicious file type dropped by an Exchange component in IIS

WindowsFile Event
TA0003 · PersistenceT1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessT1505.003 · Web Shell
Florian Roth (Nextron Systems)Tue Oct 04windows
Detectioncriticaltest

HackTool - Dumpert Process Dumper Default File

Detects the creation of the default dump file used by Outflank Dumpert tool. A process dumper, which dumps the lsass process memory

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Tue Feb 04windows
Detectionhightest

HackTool - Typical HiveNightmare SAM File Export

Detects files written by the different tools that exploit HiveNightmare

WindowsFile Event
TA0006 · Credential AccessT1552.001 · Credentials In Filescve.2021-36934
Florian Roth (Nextron Systems)Fri Jul 23windows
Detectioncriticaltest

HackTool - Mimikatz Kirbi File Creation

Detects the creation of files created by mimikatz such as ".kirbi", "mimilsa.log", etc.

WindowsFile Event
TA0006 · Credential AccessT1558 · Steal or Forge Kerberos Tickets
Florian Roth (Nextron Systems)+1Mon Nov 08windows
Detectionhightest

HackTool - NPPSpy Hacktool Usage

Detects the use of NPPSpy hacktool that stores cleartext passwords of users that logged in to a local file

WindowsFile Event
TA0006 · Credential Access
Florian Roth (Nextron Systems)Mon Nov 29windows
Detectioncriticaltest

HackTool - QuarksPwDump Dump File

Detects a dump file written by QuarksPwDump password dumper

WindowsFile Event
TA0006 · Credential AccessT1003.002 · Security Account Manager
Florian Roth (Nextron Systems)Sat Feb 10windows
Detectionmediumtest

ISO or Image Mount Indicator in Recent Files

Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks. This can be a false positive on server systems but on workstations users should rarely mount .iso or .img files.

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)Fri Feb 11windows
Detectionhightest

LSASS Process Memory Dump Files

Detects creation of files with names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials.

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Mon Nov 15windows
Detectionhightest

WerFault LSASS Process Memory Dump

Detects WerFault creating a dump file with a name that indicates that the dump file could be an LSASS process memory, which contains user credentials

WindowsFile Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Mon Jun 27windows