Rule Library

Sigma Rules

1,774 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Potential APT FIN7 Related PowerShell Script Created

Detects PowerShell script file creation with specific name or suffix which was seen being used often by FIN7 PowerShell scripts

WindowsFile Event
TA0002 · ExecutionG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential APT FIN7 POWERHOLD Execution

Detects execution of the POWERHOLD script seen used by FIN7 as reported by WithSecureLabs

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential POWERTRASH Script Execution

Detects potential execution of the PowerShell script POWERTRASH

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Potential APT FIN7 Reconnaissance/POWERTRASH Related Activity

Detects specific command line execution used by FIN7 as reported by WithSecureLabs for reconnaissance and POWERTRASH execution

WindowsProcess Creation
TA0002 · ExecutionG0046 · G0046detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu May 042023
Emerging Threathightest

Lace Tempest File Indicators

Detects PowerShell script file creation with specific names or suffixes which was seen being used often in PowerShell scripts by FIN7

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest PowerShell Evidence Eraser

Detects a PowerShell script used by Lace Tempest APT to erase evidence from victim servers by exploiting CVE-2023-47246 as reported by SysAid Team

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest PowerShell Launcher

Detects a PowerShell script used by Lace Tempest APT to launch their malware loader by exploiting CVE-2023-47246 as reported by SysAid Team

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest Cobalt Strike Download

Detects specific command line execution used by Lace Tempest to download Cobalt Strike as reported by SysAid Team

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lace Tempest Malware Loader Execution

Detects execution of a specific binary based on filename and hash used by Lace Tempest to load additional malware as reported by SysAid Team

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Nov 092023
Emerging Threathightest

Lazarus APT DLL Sideloading Activity

Detects sideloading of trojanized DLLs used in Lazarus APT campaign in the case of a Spanish aerospace company

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · PersistenceT1574.001 · DLL Search Order Hijacking+2
Thurein Oo+1Wed Oct 182023
Emerging Threatcriticaltest

Mint Sandstorm - AsperaFaspex Suspicious Process Execution

Detects suspicious execution from AsperaFaspex as seen used by Mint Sandstorm

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Apr 202023
Emerging Threathightest

Mint Sandstorm - Log4J Wstomcat Process Execution

Detects Log4J Wstomcat process execution as seen in Mint Sandstorm activity

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Apr 202023
Emerging Threatcriticaltest

Mint Sandstorm - ManageEngine Suspicious Process Execution

Detects suspicious execution from ManageEngine as seen used by Mint Sandstorm

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Apr 202023
Emerging Threathightest

Potential APT Mustang Panda Activity Against Australian Gov

Detects specific command line execution used by Mustang Panda in a targeted attack against the Australian government as reported by Lab52

WindowsProcess Creation
TA0002 · ExecutionG0129 · G0129detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Mon May 152023
Emerging Threathightest

Onyx Sleet APT File Creation Indicators

Detects file creation activity that is related to Onyx Sleet APT activity

WindowsFile Event
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Oct 242023
Emerging Threathightest

PaperCut MF/NG Exploitation Related Indicators

Detects exploitation indicators related to PaperCut MF/NG Exploitation

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 252023
Emerging Threathightest

PaperCut MF/NG Potential Exploitation

Detects suspicious child processes of "pc-app.exe". Which could indicate potential exploitation of PaperCut

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Apr 202023
Emerging Threathightest

Peach Sandstorm APT Process Activity Indicators

Detects process creation activity related to Peach Sandstorm APT

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
X__Junior (Nextron Systems)Mon Jan 152023
Emerging Threatmediumtest

Potential Peach Sandstorm APT C2 Communication Activity

Detects potential C2 communication activity related to Peach Sandstorm APT

Proxy Log
TA0011 · Command and Controldetection.emerging-threats
X__Junior (Nextron Systems)Mon Jan 152023
Emerging Threathightest

UNC4841 - Email Exfiltration File Pattern

Detects filename pattern of email related data used by UNC4841 for staging and exfiltration

LinuxFile Event
TA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - Barracuda ESG Exploitation Indicators

Detects file indicators as seen used by UNC4841 during their Barracuda ESG zero day exploitation.

LinuxFile Event
TA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - SSL Certificate Exfiltration Via Openssl

Detects the execution of "openssl" to connect to an IP address. This techniques was used by UNC4841 to exfiltrate SSL certificates and as a C2 channel with named pipes. Investigate commands executed in the temporal vicinity of this command.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - Download Compressed Files From Temp.sh Using Wget

Detects execution of "wget" to download a ".zip" or ".rar" files from "temp.sh". As seen used by UNC4841 during their Barracuda ESG zero day exploitation.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - Download Tar File From Untrusted Direct IP Via Wget

Detects execution of "wget" to download a "tar" from an IP address that doesn't have a trusted certificate. As seen used by UNC4841 during their Barracuda ESG zero day exploitation.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threatcriticaltest

UNC4841 - Potential SEASPY Execution

Detects execution of specific named binaries which were used by UNC4841 to deploy their SEASPY backdoor

LinuxProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

CVE-2024-1212 Exploitation - Progress Kemp LoadMaster Unauthenticated Command Injection

Detects potential exploitation of CVE-2024-1709 an unauthenticated command injection in Progress Kemp LoadMaster. It looks for GET requests to '/access/set' API with the parameters 'param=enableapi' and 'value=1' as well as an "Authorization" header with a base64 encoded value with an uncommon character.

Web Server Log
TA0001 · Initial Accesscve.2024-1212detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 202024
Emerging Threathightest

Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process

Detects potentially suspicious child process of SSH process (sshd) with a specific execution user. This could be a sign of potential exploitation of CVE-2024-3094.

LinuxProcess Creation
TA0002 · Executioncve.2024-3094detection.emerging-threats
Arnim Rupp+2Mon Apr 012024
Emerging Threathightest

Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection

Detects potential exploitation attempts of CVE-2024-3400 - an OS command injection in Palo Alto GlobalProtect. This detection looks for suspicious strings that indicate a potential directory traversal attempt or command injection.

paloaltoapplianceglobalprotect
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+2
Nasreddine Bencherchali (Nextron Systems)Thu Apr 182024
Emerging Threathightest

Potential Exploitation of CVE-2024-37085 - Suspicious ESX Admins Group Activity

Detects any creation or modification to a windows domain group with the name "ESX Admins". This could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor. VMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named "ESX Admins" to have full administrative access by default.

Windowssecurity
TA0002 · Executioncve.2024-37085detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Jul 302024
Emerging Threatmediumtest

Potential KamiKakaBot Activity - Lure Document Execution

Detects the execution of a Word document via the WinWord Start Menu shortcut. This behavior was observed being used by KamiKakaBot samples in order to initiate the 2nd stage of the infection.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Mar 222024
Emerging Threatmediumtest

Potential KamiKakaBot Activity - Shutdown Schedule Task Creation

Detects the creation of a schedule task that runs weekly and execute the "shutdown /l /f" command. This behavior was observed being used by KamiKakaBot samples in order to achieve persistence on a system.

WindowsProcess Creation
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Mar 222024
Emerging Threathightest

Potential KamiKakaBot Activity - Winlogon Shell Persistence

Detects changes to the "Winlogon" registry key where a process will set the value of the "Shell" to a value that was observed being used by KamiKakaBot samples in order to achieve persistence.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Mar 222024
Emerging Threathightest

Potential Kapeka Decrypted Backdoor Indicator

Detects the presence of a file that is decrypted backdoor binary dropped by the Kapeka Dropper, which disguises itself as a hidden file under a folder named "Microsoft" within "CSIDL_COMMON_APPDATA" or "CSIDL_LOCAL_APPDATA", depending on the process privileges. The file, typically 5-6 characters long with a random combination of consonants and vowels followed by a ".wll" extension to pose as a legitimate file to evade detection.

WindowsFile Event
TA0005 · Defense Evasiondetection.emerging-threats
Swachchhanda Shrawan Poudel+1Wed Jul 032024
Emerging Threathightest

Kapeka Backdoor Execution Via RunDLL32.EXE

Detects Kapeka backdoor process execution pattern, where the dropper launch the backdoor binary by calling rundll32 and passing the backdoor's first export ordinal (#1) with a "-d" argument.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Swachchhanda Shrawan Poudel+1Wed Jul 032024
Emerging Threathightest

DPRK Threat Actor - C2 Communication DNS Indicators

Detects DNS queries for C2 domains used by DPRK Threat actors.

WindowsDNS Query
TA0011 · Command and Controldetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Feb 202024
Emerging Threathightest

Forest Blizzard APT - File Creation Activity

Detects the creation of specific files inside of ProgramData directory. These files were seen being created by Forest Blizzard as described by MSFT.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Loggingdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threatmediumtest

Forest Blizzard APT - JavaScript Constrained File Creation

Detects the creation of JavaScript files inside of the DriverStore directory. Forest Blizzard used this to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Loggingdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathighexperimental

Forest Blizzard APT - Process Creation Activity

Detects the execution of specific processes and command line combination. These were seen being created by Forest Blizzard as described by MSFT.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathightest

Forest Blizzard APT - Custom Protocol Handler Creation

Detects the setting of a custom protocol handler with the name "rogue". Seen being created by Forest Blizzard APT as reported by MSFT.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathightest

Forest Blizzard APT - Custom Protocol Handler DLL Registry Set

Detects the setting of the DLL that handles the custom protocol handler. Seen being created by Forest Blizzard APT as reported by MSFT.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Apr 232024
Emerging Threathightest

ScreenConnect - SlashAndGrab Exploitation Indicators

Detects indicators of exploitation by threat actors during exploitation of the "SlashAndGrab" vulnerability related to ScreenConnect as reported Team Huntress

WindowsFile Event
TA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Feb 232024
Emerging Threathighexperimental

Potential Exploitation of GoAnywhere MFT Vulnerability

Detects suspicious command execution by child processes of the GoAnywhere Managed File Transfer (MFT) application, which may indicate exploitation such as CVE-2025-10035. This behavior is indicative of post-exploitation activity related to CVE-2025-10035, as observed in campaigns by the threat actor Storm-1175.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1059.001 · PowerShell+4
MSFT+1Tue Oct 072025
Emerging Threathighexperimental

Cisco ASA Exploitation Activity - Proxy

Detects suspicious requests to Cisco ASA WebVpn via proxy logs associated with CVE-2025-20333 and CVE-2025-20362 exploitation.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2025-20333cve.2025-20362+1
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 202025
Emerging Threatmediumexperimental

Suspicious CrushFTP Child Process

Detects suspicious child processes spawned by the CrushFTP service that may indicate exploitation of remote code execution vulnerabilities such as CVE-2025-31161, where attackers can achieve RCE through crafted HTTP requests. The detection focuses on commonly abused Windows executables (like powershell.exe, cmd.exe etc.) that attackers typically use post-exploitation to execute malicious commands.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shell+3
Craig Sweeney+6Thu Apr 102025
Emerging Threatmediumexperimental

Potential SAP NetWeaver Webshell Creation - Linux

Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as CVE-2025-31324.

LinuxFile Event
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Potential SAP NetWeaver Webshell Creation

Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as CVE-2025-31324.

WindowsFile Event
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver - Linux

Detects suspicious child processes spawned by SAP NetWeaver on Linux systems that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

LinuxProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver

Detects suspicious child processes spawned by SAP NetWeaver that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025