Rule Library

Sigma Rules

1,774 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threatcriticaltest

PrinterNightmare Mimikatz Driver Name

Detects static QMS 810 and mimikatz driver name used by Mimikatz as exploited in CVE-2021-1675 and CVE-2021-34527

WindowsRegistry Event
TA0002 · ExecutionT1204 · User Executioncve.2021-1675cve.2021-34527+1
Markus Neis+1Sun Jul 042021
Emerging Threathightest

Possible CVE-2021-1675 Print Spooler Exploitation

Detects events of driver load errors in print service logs that could be a sign of successful exploitation attempts of print spooler vulnerability CVE-2021-1675

Windowsprintservice-admin
TA0002 · ExecutionT1569 · System Servicescve.2021-1675detection.emerging-threats
Florian Roth (Nextron Systems)+3Wed Jun 302021
Emerging Threatcriticaltest

CVE-2021-1675 Print Spooler Exploitation

Detects driver load events print service operational log that are a sign of successful exploitation attempts against print spooler vulnerability CVE-2021-1675

Windowsprintservice-operational
TA0002 · ExecutionT1569 · System Servicescve.2021-1675detection.emerging-threats
Florian Roth (Nextron Systems)Thu Jul 012021
Emerging Threatcriticaltest

Fortinet CVE-2021-22123 Exploitation

Detects CVE-2021-22123 exploitation attempt against Fortinet WAFs

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-22123detection.emerging-threats
Bhabesh Raj+1Thu Aug 192021
Emerging Threathightest

Exploitation of CVE-2021-26814 in Wazuh

Detects the exploitation of the Wazuh RCE vulnerability described in CVE-2021-26814

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-21978cve.2021-26814+1
Florian Roth (Nextron Systems)Sat May 222021
Emerging Threatcriticaltest

Exchange Exploitation CVE-2021-28480

Detects successful exploitation of Exchange vulnerability as reported in CVE-2021-28480

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-28480detection.emerging-threats
Florian Roth (Nextron Systems)Fri May 142021
Emerging Threatcriticaltest

CVE-2021-33766 Exchange ProxyToken Exploitation

Detects the exploitation of Microsoft Exchange ProxyToken vulnerability as described in CVE-2021-33766

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-33766detection.emerging-threats
Florian Roth (Nextron Systems)+2Mon Aug 302021
Emerging Threatcriticaltest

Serv-U Exploitation CVE-2021-35211 by DEV-0322

Detects patterns as noticed in exploitation of Serv-U CVE-2021-35211 vulnerability by threat group DEV-0322

WindowsProcess Creation
TA0003 · PersistenceT1136.001 · Local Accountcve.2021-35211detection.emerging-threats
Florian Roth (Nextron Systems)Wed Jul 142021
Emerging Threathightest

Suspicious Word Cab File Write CVE-2021-40444

Detects file creation patterns noticeable during the exploitation of CVE-2021-40444

WindowsFile Event
TA0042 · Resource DevelopmentT1587 · Develop Capabilitiesdetection.emerging-threats
Florian Roth (Nextron Systems)+1Fri Sep 102021
Emerging Threathightest

Potential CVE-2021-40444 Exploitation Attempt

Detects potential exploitation of CVE-2021-40444 via suspicious process patterns seen in in-the-wild exploitations

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpretercve.2021-40444detection.emerging-threats
Florian Roth (Nextron Systems)Wed Sep 082021
Emerging Threathightest

Potential Exploitation Attempt From Office Application

Detects Office applications executing a child process that includes directory traversal patterns. This could be an attempt to exploit CVE-2022-30190 (MSDT RCE) or CVE-2021-40444 (MSHTML RCE)

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasioncve.2021-40444detection.emerging-threats
Christian Burkard (Nextron Systems)+1Thu Jun 022021
Emerging Threathightest

ADSelfService Exploitation

Detects suspicious access to URLs that was noticed in cases in which attackers exploitated the ADSelfService vulnerability CVE-2021-40539

Web Server Log
cve.2021-40539detection.emerging-threatsTA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Tobias Michalski+1Mon Sep 202021
Emerging Threatcriticaltest

InstallerFileTakeOver LPE CVE-2021-41379 File Create Event

Detects signs of the exploitation of LPE CVE-2021-41379 that include an msiexec process that creates an elevation_service.exe file

WindowsFile Event
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationdetection.emerging-threats
Florian Roth (Nextron Systems)Mon Nov 222021
Emerging Threatcriticaltest

Potential CVE-2021-41379 Exploitation Attempt

Detects potential exploitation attempts of CVE-2021-41379 (InstallerFileTakeOver), a local privilege escalation (LPE) vulnerability where the attacker spawns a "cmd.exe" process as a child of Microsoft Edge elevation service "elevation_service" with "LOCAL_SYSTEM" rights

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationcve.2021-41379detection.emerging-threats
Florian Roth (Nextron Systems)Mon Nov 222021
Emerging Threathightest

LPE InstallerFileTakeOver PoC CVE-2021-41379

Detects PoC tool used to exploit LPE vulnerability CVE-2021-41379

Windowsapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Florian Roth (Nextron Systems)Mon Nov 222021
Emerging Threathightest

CVE-2021-41773 Exploitation Attempt

Detects exploitation of flaw in path normalization in Apache HTTP server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-41773detection.emerging-threats
daffainfo+1Tue Oct 052021
Emerging Threathightest

Sitecore Pre-Auth RCE CVE-2021-42237

Detects exploitation attempts of Sitecore Experience Platform Pre-Auth RCE CVE-2021-42237 found in Report.ashx

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-42237detection.emerging-threats
Florian Roth (Nextron Systems)Wed Nov 172021
Emerging Threathightest

Suspicious Computer Account Name Change CVE-2021-42287

Detects the renaming of an existing computer account to a account name that doesn't contain a $ symbol as seen in attacks against CVE-2021-42287

Windowssecurity
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1036 · Masquerading+3
Florian Roth (Nextron Systems)Wed Dec 222021
Emerging Threathightest

Possible Exploitation of Exchange RCE CVE-2021-42321

Detects log entries that appear in exploitation attempts against MS Exchange RCE CVE-2021-42321

Windowsmsexchange-management
TA0008 · Lateral MovementT1210 · Exploitation of Remote Servicesdetection.emerging-threats
Florian Roth (Nextron Systems)Thu Nov 182021
Emerging Threatcriticaltest

Grafana Path Traversal Exploitation CVE-2021-43798

Detects a successful Grafana path traversal exploitation

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-43798detection.emerging-threats
Florian Roth (Nextron Systems)Wed Dec 082021
Emerging Threathightest

CVE-2021-44077 POC Default Dropped File

Detects the creation of "msiexec.exe" in the "bin" directory of the ManageEngine SupportCenter Plus (Related to CVE-2021-44077) and public POC available (See references section)

WindowsFile Event
TA0002 · Executioncve.2021-44077detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Mon Jun 062021
Emerging Threathightest

Log4j RCE CVE-2021-44228 Generic

Detects exploitation attempt against log4j RCE vulnerability reported as CVE-2021-44228 (Log4Shell)

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Florian Roth (Nextron Systems)Fri Dec 102021
Emerging Threathightest

Log4j RCE CVE-2021-44228 in Fields

Detects exploitation attempt against log4j RCE vulnerability reported as CVE-2021-44228 in different header fields found in web server logs (Log4Shell)

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-44228detection.emerging-threats
Florian Roth (Nextron Systems)Fri Dec 102021
Emerging Threathightest

Exchange ProxyShell Pattern

Detects URL patterns that could be found in ProxyShell exploitation attempts against Exchange servers (failed and successful)

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Florian Roth (Nextron Systems)+1Sat Aug 072021
Emerging Threatcriticaltest

Successful Exchange ProxyShell Attack

Detects URP patterns and status codes that indicate a successful ProxyShell exploitation attack against Exchange servers

Web Server Log
TA0001 · Initial Accessdetection.emerging-threats
Florian Roth (Nextron Systems)+1Mon Aug 092021
Emerging Threathightest

Suspicious RazerInstaller Explorer Subprocess

Detects a explorer.exe sub process of the RazerInstaller software which can be invoked from the installer to select a different installation folder but can also be exploited to escalate privileges to LOCAL SYSTEM

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1553 · Subvert Trust Controlsdetection.emerging-threats
Florian Roth (Nextron Systems)+1Mon Aug 232021
Emerging Threatcriticaltest

Potential SystemNightmare Exploitation Attempt

Detects an exploitation attempt of SystemNightmare in order to obtain a shell as LOCAL_SYSTEM

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalationdetection.emerging-threats
Florian Roth (Nextron Systems)Wed Aug 112021
Emerging Threathightest

SonicWall SSL/VPN Jarrewrite Exploitation

Detects exploitation attempts of the SonicWall Jarrewrite Exploit

Web Server Log
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial Accessdetection.emerging-threats
Florian Roth (Nextron Systems)Mon Jan 252021
Emerging Threathightest

Potential BlackByte Ransomware Activity

Detects command line patterns used by BlackByte ransomware in different operations

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0040 · ImpactT1485 · Data Destruction+4
Florian Roth (Nextron Systems)Fri Feb 252021
Emerging Threathightest

Conti Volume Shadow Listing

Detects a command used by conti to find volume shadow backups

WindowsProcess Creation
T1587.001 · MalwareTA0042 · Resource Developmentdetection.emerging-threats
Max Altgelt (Nextron Systems)+1Mon Aug 092021
Emerging Threathightest

Conti NTDS Exfiltration Command

Detects a command used by conti to exfiltrate NTDS

WindowsProcess Creation
TA0009 · CollectionT1560 · Archive Collected Datadetection.emerging-threats
Max Altgelt (Nextron Systems)+1Mon Aug 092021
Emerging Threatcriticaltest

DarkSide Ransomware Pattern

Detects DarkSide Ransomware and helpers

WindowsProcess Creation
TA0002 · ExecutionT1204 · User Executiondetection.emerging-threats
Florian Roth (Nextron Systems)Fri May 142021
Emerging Threathightest

Potential Devil Bait Related Indicator

Detects the creation of ".xml" and ".txt" files in folders of the "\AppData\Roaming\Microsoft" directory by uncommon processes. This behavior was seen common across different Devil Bait samples and stages as described by the NCSC

WindowsFile Event
TA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Mon May 152021
Emerging Threathightest

Potential Devil Bait Malware Reconnaissance

Detects specific process behavior observed with Devil Bait samples

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Mon May 152021
Emerging Threathightest

Devil Bait Potential C2 Communication Traffic

Detects potential C2 communication related to Devil Bait malware

Proxy Log
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Mon May 152021
Emerging Threatcriticaltest

FoggyWeb Backdoor DLL Loading

Detects DLL hijacking technique used by NOBELIUM in their FoggyWeb backdoor. Which loads a malicious version of the expected "version.dll" dll

WindowsImage Load (DLL)
TA0042 · Resource DevelopmentT1587 · Develop Capabilitiesdetection.emerging-threats
Florian Roth (Nextron Systems)Mon Sep 272021
Emerging Threathightest

Goofy Guineapig Backdoor IOC

Detects malicious indicators seen used by the Goofy Guineapig malware

WindowsFile Event
TA0002 · ExecutionTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sun May 142021
Emerging Threathightest

Potential Goofy Guineapig Backdoor Activity

Detects a specific broken command that was used by Goofy-Guineapig as described by the NCSC report.

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
X__Junior (Nextron Systems)Sun May 142021
Emerging Threathightest

Potential Goofy Guineapig GoolgeUpdate Process Anomaly

Detects "GoogleUpdate.exe" spawning a new instance of itself in an uncommon location as seen used by the Goofy Guineapig backdoor

WindowsProcess Creation
TA0005 · Defense Evasiondetection.emerging-threats
X__Junior (Nextron Systems)+1Mon May 152021
Emerging Threathightest

Goofy Guineapig Backdoor Potential C2 Communication

Detects potential C2 communication related to Goofy Guineapig backdoor

Proxy Log
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sun May 142021
Emerging Threatcriticaltest

Goofy Guineapig Backdoor Service Creation

Detects service creation persistence used by the Goofy Guineapig backdoor

Windowssystem
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Mon May 152021
Emerging Threathightest

Small Sieve Malware File Indicator Creation

Detects filename indicators that contain a specific typo seen used by the Small Sieve malware.

WindowsFile Event
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Locationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri May 192021
Emerging Threathightest

Small Sieve Malware CommandLine Indicator

Detects specific command line argument being passed to a binary as seen being used by the malware Small Sieve.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574.001 · DLL Search Order Hijacking+1
Nasreddine Bencherchali (Nextron Systems)Fri May 192021
Emerging Threatcriticaltest

Small Sieve Malware Potential C2 Communication

Detects potential C2 communication related to Small Sieve malware

Proxy Log
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri May 192021
Emerging Threathightest

Small Sieve Malware Registry Persistence

Detects registry value with specific intentional typo and strings seen used by the Small Sieve malware

WindowsRegistry Set
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri May 192021
Emerging Threatcriticaltest

HAFNIUM Exchange Exploitation Activity

Detects activity observed by different researchers to be HAFNIUM group activity (or related) on Exchange servers

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1546 · Event Triggered Execution+3
Florian Roth (Nextron Systems)Tue Mar 092021
Emerging Threathightest

Exchange Exploitation Used by HAFNIUM

Detects exploitation attempts in Exchange server logs as described in blog posts reporting on HAFNIUM group activity

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationG0125 · HAFNIUMdetection.emerging-threats
Florian Roth (Nextron Systems)Wed Mar 032021
Emerging Threatcriticaltest

REvil Kaseya Incident Malware Patterns

Detects process command line patterns and locations used by REvil group in Kaseya incident (can also match on other malware)

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterG0115 · G0115detection.emerging-threats
Florian Roth (Nextron Systems)Sat Jul 032021