Rule Library

Sigma Rules

638 rules found for "Florian Roth (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Adwind RAT / JRAT File Artifact

Detects javaw.exe in AppData folder as used by Adwind / JRAT

WindowsFile Event
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScript
Florian Roth (Nextron Systems)+3Fri Nov 10windows
Detectionhightest

File Creation In Suspicious Directory By Msdt.EXE

Detects msdt.exe creating files in suspicious directories which could be a sign of exploitation of either Follina or Dogwalk vulnerabilities

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Foldercve.2022-30190
Vadim Varganov+1Wed Aug 24windows
Detectionhightest

NTDS.DIT Creation By Uncommon Parent Process

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon parent process or directory

WindowsFile Event
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Fri Mar 11windows
Detectionhightest

NTDS.DIT Creation By Uncommon Process

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon process or a process located in a suspicious directory

WindowsFile Event
TA0006 · Credential AccessT1003.002 · Security Account ManagerT1003.003 · NTDS
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionhightest

NTDS Exfiltration Filename Patterns

Detects creation of files with specific name patterns seen used in various tools that export the NTDS.DIT for exfiltration.

WindowsFile Event
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Fri Mar 11windows
Detectionhighexperimental

Suspicious File Created in Outlook Temporary Directory

Detects the creation of files with suspicious file extensions in the temporary directory that Outlook uses when opening attachments. This can be used to detect spear-phishing campaigns that use suspicious files as attachments, which may contain malicious code.

WindowsFile Event
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)+1Tue Jul 22windows
Detectionhightest

Potential SAM Database Dump

Detects the creation of files that look like exports of the local SAM (Security Account Manager)

WindowsFile Event
TA0006 · Credential AccessT1003.002 · Security Account Manager
Florian Roth (Nextron Systems)Fri Feb 11windows
Detectionhightest

Windows Shell/Scripting Application File Write to Suspicious Folder

Detects Windows shells and scripting applications that write files to suspicious folders

WindowsFile Event
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Sat Nov 20windows
Detectionhightest

Suspicious Desktopimgdownldr Target File

Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension

WindowsFile Event
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)Fri Jul 03windows
Detectionhightest

Suspicious MSExchangeMailboxReplication ASPX Write

Detects suspicious activity in which the MSExchangeMailboxReplication process writes .asp and .apsx files to disk, which could be a sign of ProxyShell exploitation

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)Fri Feb 25windows
Detectionhightest

Legitimate Application Dropped Archive

Detects programs on a Windows system that should not write an archive to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionhightest

Legitimate Application Dropped Executable

Detects programs on a Windows system that should not write executables to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionhightest

Legitimate Application Dropped Script

Detects programs on a Windows system that should not write scripts to disk

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Sun Aug 21windows
Detectionhightest

Potential File Extension Spoofing Using Right-to-Left Override

Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.

WindowsFile Event
TA0002 · ExecutionTA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Jonathan Peters (Nextron Systems)+2Sun Nov 17windows
Detectionhightest

Suspicious Interactive PowerShell as SYSTEM

Detects the creation of files that indicator an interactive use of PowerShell in the SYSTEM user context

WindowsFile Event
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue Dec 07windows
Detectionhightest

Suspicious Scheduled Task Write to System32 Tasks

Detects the creation of tasks from processes executed from suspicious locations

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1053 · Scheduled Task/Job
Florian Roth (Nextron Systems)Tue Nov 16windows
Detectionmediumtest

TeamViewer Remote Session

Detects the creation of log files during a TeamViewer remote session

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sun Jan 30windows
Detectionhightest

Process Explorer Driver Creation By Non-Sysinternals Binary

Detects creation of the Process Explorer drivers by processes other than Process Explorer (procexp) itself. Hack tools or malware may use the Process Explorer driver to elevate privileges, drops it to disk for a few moments, runs a service using that driver and removes it afterwards.

WindowsFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Florian Roth (Nextron Systems)Fri May 05windows
Detectionhightest

UAC Bypass Using EventVwr

Detects the pattern of a UAC bypass using Windows Event Viewer

WindowsFile Event
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Antonio Cocomazzi+1Wed Apr 27windows
Detectionhightest

HackTool - SharpEvtMute DLL Load

Detects the load of EvtMuteHook.dll, a key component of SharpEvtHook, a tool that tampers with the Windows event logs

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
Florian Roth (Nextron Systems)Wed Sep 07windows
Detectionhightest

Uncommon Network Connection Initiated By Certutil.EXE

Detects a network connection initiated by the certutil.exe utility. Attackers can abuse the utility in order to download malware or additional payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Fri Sep 02windows
Detectionhighstable

Network Communication With Crypto Mining Pool

Detects initiated network connections to crypto mining pools

WindowsNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)+1Tue Oct 26windows
Detectionhightest

Suspicious Dropbox API Usage

Detects an executable that isn't dropbox but communicates with the Dropbox API

WindowsNetwork Connection
TA0011 · Command and ControlTA0010 · ExfiltrationT1105 · Ingress Tool TransferT1567.002 · Exfiltration to Cloud Storage
Florian Roth (Nextron Systems)Wed Apr 20windows
Detectionlowtest

Network Connection Initiated To Mega.nz

Detects a network connection initiated by a binary to "api.mega.co.nz". Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.

WindowsNetwork Connection
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Florian Roth (Nextron Systems)Mon Dec 06windows
Detectionhightest

Process Initiated Network Connection To Ngrok Domain

Detects an executable initiating a network connection to "ngrok" domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communication with such domains can be legitimate, often times is a sign of either data exfiltration by malicious actors or additional download.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling+1
Florian Roth (Nextron Systems)Sat Jul 16windows
Detectionhightest

Communication To Ngrok Tunneling Service Initiated

Detects an executable initiating a network connection to "ngrok" tunneling domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communication with such domains can be legitimate, often times is a sign of either data exfiltration by malicious actors or additional download.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1568.002 · Domain Generation Algorithms+4
Florian Roth (Nextron Systems)Thu Nov 03windows
Detectionmediumtest

Network Communication Initiated To Portmap.IO Domain

Detects an executable accessing the portmap.io domain, which could be a sign of forbidden C2 traffic or data exfiltration by malicious actors

WindowsNetwork Connection
T1041 · Exfiltration Over C2 ChannelTA0011 · Command and ControlT1090.002 · External ProxyTA0010 · Exfiltration
Florian Roth (Nextron Systems)Fri May 31windows
Detectionmediumtest

Office Application Initiated Network Connection To Non-Local IP

Detects an office application (Word, Excel, PowerPoint) that initiate a network connection to a non-private IP addresses. This rule aims to detect traffic similar to one seen exploited in CVE-2021-42292. This rule will require an initial baseline and tuning that is specific to your organization.

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Execution
Christopher Peacock+4Wed Nov 10windows
Detectionhightest

RDP to HTTP or HTTPS Target Ports

Detects svchost hosting RDP termsvcs communicating to target systems on TCP port 80 or 443

WindowsNetwork Connection
TA0011 · Command and ControlT1572 · Protocol TunnelingTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol+1
Florian Roth (Nextron Systems)Fri Apr 29windows
Detectionmediumtest

Rundll32 Internet Connection

Detects a rundll32 that communicates with public IP addresses

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.011 · Rundll32TA0002 · Execution
Florian Roth (Nextron Systems)Sat Nov 04windows
Detectionhightest

Suspicious Network Connection Binary No CommandLine

Detects suspicious network connections made by a well-known Windows binary run with no command line parameters

WindowsNetwork Connection
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Sun Jul 03windows
Detectionhightest

Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder

Detects executables located in potentially suspicious directories initiating network connections towards file sharing domains.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Thu Aug 30windows
Detectionhightest

Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location

Detects a network connection initiated by programs or processes running from suspicious or uncommon files system locations.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Sun Mar 19windows
Detectionhightest

Potentially Suspicious Malware Callback Communication

Detects programs that connect to known malware callback ports based on statistical analysis from two different sandbox system databases

WindowsNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
Florian Roth (Nextron Systems)Sun Mar 19windows
Detectionmediumtest

Communication To Uncommon Destination Ports

Detects programs that connect to uncommon destination ports

WindowsNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
Florian Roth (Nextron Systems)Sun Mar 19windows
Detectionhightest

Outbound Network Connection Initiated By Script Interpreter

Detects a script interpreter wscript/cscript opening a network connection to a non-local network. Adversaries may use script to download malicious payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Sun Aug 28windows
Detectioncriticaltest

CobaltStrike Named Pipe

Detects the creation of a named pipe as used by CobaltStrike

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+1Tue May 25windows
Detectioncriticaltest

CobaltStrike Named Pipe Pattern Regex

Detects the creation of a named pipe matching a pattern used by CobaltStrike Malleable C2 profiles

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Fri Jul 30windows
Detectionhightest

CobaltStrike Named Pipe Patterns

Detects the creation of a named pipe with a pattern found in CobaltStrike malleable C2 profiles

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injectionstp.1k
Florian Roth (Nextron Systems)+1Fri Jul 30windows
Detectionhightest

HackTool - CoercedPotato Named Pipe Creation

Detects the pattern of a pipe name as used by the hack tool CoercedPotato

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Wed Oct 11windows
Detectionhightest

HackTool - EfsPotato Named Pipe Creation

Detects the pattern of a pipe name as used by the hack tool EfsPotato

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)Mon Aug 23windows
Detectionmediumtest

WMI Event Consumer Created Named Pipe

Detects the WMI Event Consumer service scrcons.exe creating a named pipe

WindowsNamed Pipe Created
T1047 · Windows Management InstrumentationTA0002 · Execution
Florian Roth (Nextron Systems)Wed Sep 01windows
Detectioncriticaltest

Malicious Named Pipe Created

Detects the creation of a named pipe seen used by known APTs or malware.

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055 · Process Injection
Florian Roth (Nextron Systems)+2Mon Nov 06windows
Detectionmediumtest

PowerShell Downgrade Attack - PowerShell

Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0

WindowsPowerShell Classic
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Mar 22windows
Detectionhightest

PowerShell Called from an Executable Version Mismatch

Detects PowerShell called from an executable by the version mismatch method

WindowsPowerShell Classic
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShell
Sean Metcalf (source)+1Sun Mar 05windows
Detectionmediumtest

Suspicious PowerShell Download

Detects suspicious PowerShell download command

WindowsPowerShell Classic
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 05windows
Detectionhightest

Suspicious Get-ADDBAccount Usage

Detects suspicious invocation of the Get-ADDBAccount script that reads from a ntds.dit file and may be used to get access to credentials without using any credential dumpers

WindowsPowerShell Module
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Wed Mar 16windows
Detectionmediumtest

Suspicious PowerShell Download - PoshModule

Detects suspicious PowerShell download command

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sun Mar 05windows