Rule Library

Sigma Rules

431 rules found for "François Hubaut"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Greedy File Deletion Using Del

Detects execution of the "del" builtin command to remove files using greedy/wildcard expression. This is often used by malware to delete content of folders that perhaps contains the initial malware infection or to delete evidence.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
François Hubaut+1Thu Dec 02windows
Detectionlowtest

File And SubFolder Enumeration Via Dir Command

Detects usage of the "dir" command part of Windows CMD with the "/S" command line flag in order to enumerate files in a specified directory and all subdirectories.

WindowsProcess Creation
TA0007 · DiscoveryT1217 · Browser Information Discovery
François HubautMon Dec 13windows
Detectionmediumtest

Potential Dosfuscation Activity

Detects possible payload obfuscation via the commandline

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
François Hubaut+1Tue Feb 15windows
Detectionhightest

Potential Privilege Escalation Using Symlink Between Osk and Cmd

Detects the creation of a symbolic link between "cmd.exe" and the accessibility on-screen keyboard binary (osk.exe) using "mklink". This technique provides an elevated command prompt to the user from the login screen without the need to log in.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.008 · Accessibility Features
François HubautSun Dec 11windows
Detectionlowtest

Directory Removal Via Rmdir

Detects execution of the builtin "rmdir" command in order to delete directories. Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
François HubautSat Jan 15windows
Detectionmediumtest

Read Contents From Stdin Via Cmd.EXE

Detect the use of "<" to read and potentially execute a file via cmd.exe

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
François Hubaut+1Tue Mar 07windows
Detectionmediumtest

New Generic Credentials Added Via Cmdkey.EXE

Detects usage of "cmdkey.exe" to add generic credentials. As an example, this can be used before connecting to an RDP session via command line interface.

WindowsProcess Creation
TA0006 · Credential AccessT1003.005 · Cached Domain Credentials
François Hubaut+1Fri Feb 03windows
Detectionmediumtest

Potential Arbitrary File Download Via Cmdl32.EXE

Detects execution of Cmdl32 with the "/vpn" and "/lan" flags. Attackers can abuse this utility in order to download arbitrary files via a configuration file. Inspect the location and the content of the file passed as an argument in order to determine if it is suspicious.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
François HubautWed Nov 03windows
Detectionmediumtest

Arbitrary File Download Via ConfigSecurityPolicy.EXE

Detects the execution of "ConfigSecurityPolicy.EXE", a binary part of Windows Defender used to manage settings in Windows Defender. Users can configure different pilot collections for each of the co-management workloads. It can be abused by attackers in order to upload or download files.

WindowsProcess Creation
TA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
François HubautFri Nov 26windows
Detectioninformationaltest

Suspicious High IntegrityLevel Conhost Legacy Option

ForceV1 asks for information directly from the kernel space. Conhost connects to the console application. High IntegrityLevel means the process is running with elevated privileges, such as an Administrator context.

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
François HubautFri Dec 09windows
Detectionmediumtest

Uncommon Child Process Of Defaultpack.EXE

Detects uncommon child processes of "DefaultPack.EXE" binary as a proxy to launch other programs

WindowsProcess Creation
T1218 · System Binary Proxy ExecutionTA0005 · Defense EvasionTA0002 · Execution
François HubautSat Dec 31windows
Detectionlowtest

DirLister Execution

Detect the usage of "DirLister.exe" a utility for quickly listing folder or drive contents. It was seen used by BlackCat ransomware to create a list of accessible directories and files.

WindowsProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
François HubautSat Aug 20windows
Detectionmediumtest

Dism Remove Online Package

Deployment Image Servicing and Management tool. DISM is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautSun Jan 16windows
Detectionmediumtest

Esentutl Steals Browser Information

One way Qbot steals sensitive information is by extracting browser data from Internet Explorer and Microsoft Edge by using the built-in utility esentutl.exe

WindowsProcess Creation
TA0009 · CollectionT1005 · Data from Local System
François HubautSun Feb 13windows
Detectionhightest

Findstr GPP Passwords

Look for the encrypted cpassword value within Group Policy Preference files on the Domain Controller. This value can be decrypted with gpp-decrypt.

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
François HubautMon Dec 27windows
Detectionmediumtest

Recon Command Output Piped To Findstr.EXE

Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example. Attackers often time use this technique to extract specific information they require in their reconnaissance phase.

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discovery
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 06windows
Detectionmediumtest

Security Tools Keyword Lookup Via Findstr.EXE

Detects execution of "findstr" to search for common names of security tools. Attackers often pipe the results of recon commands such as "tasklist" or "whoami" to "findstr" in order to filter out the results. This detection focuses on the keywords that the attacker might use as a filter.

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 20windows
Detectionhightest

Sysmon Discovery Via Default Driver Altitude Using Findstr.EXE

Detects usage of "findstr" with the argument "385201". Which could indicate potential discovery of an installed Sysinternals Sysmon service using the default driver altitude (even if the name is changed).

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
François HubautThu Dec 16windows
Detectionmediumtest

Potentially Suspicious NTFS Symlink Behavior Modification

Detects the modification of NTFS symbolic link behavior using fsutil, which could be used to enable remote to local or remote to remote symlinks for potential attacks.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense Evasionattack.t1222.001
François Hubaut+1Wed Mar 02windows
Detectionmediumtest

Portable Gpg.EXE Execution

Detects the execution of "gpg.exe" from uncommon location. Often used by ransomware and loaders to decrypt/encrypt data.

WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impact
François Hubaut+1Sun Aug 06windows
Detectionmediumtest

Gpresult Display Group Policy Information

Detects cases in which a user uses the built-in Windows utility gpresult to display the Resultant Set of Policy (RSoP) information

WindowsProcess Creation
TA0007 · DiscoveryT1615 · Group Policy Discovery
François HubautSun May 01windows
Detectionmediumtest

HackTool - WinRM Access Via Evil-WinRM

Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.006 · Windows Remote Management
François HubautFri Jan 07windows
Detectionhightest

HackTool - Hashcat Password Cracker Execution

Execute Hashcat.exe with provided SAM file from registry of Windows and Password list to crack against

WindowsProcess Creation
TA0006 · Credential AccessT1110.002 · Password Cracking
François HubautMon Dec 27windows
Detectionhightest

HackTool - Pypykatz Credentials Dumping Activity

Detects the usage of "pypykatz" to obtain stored credentials. Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database through Windows registry where the SAM database is stored

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account Manager
François HubautWed Jan 05windows
Detectionhightest

HackTool - SharpView Execution

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections DiscoveryT1069.002 · Domain GroupsT1482 · Domain Trust Discovery+2
François HubautFri Dec 10windows
Detectionhightest

HackTool - TruffleSnout Execution

Detects the use of TruffleSnout.exe an iterative AD discovery toolkit for offensive operators, situational awareness and targeted low noise enumeration.

WindowsProcess Creation
TA0007 · DiscoveryT1482 · Domain Trust Discovery
François HubautSat Aug 20windows
Detectionmediumtest

Suspicious ZipExec Execution

ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1202 · Indirect Command Execution
François HubautSun Nov 07windows
Detectionlowtest

Suspicious Execution of Hostname

Use of hostname to get information

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
François HubautSat Jan 01windows
Detectionmediumtest

Use Icacls to Hide File to Everyone

Detect use of icacls to deny access for everyone in Users folder sometimes used to hide malicious files

WindowsProcess Creation
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
François HubautMon Jul 18windows
Detectionhightest

Disable Windows IIS HTTP Logging

Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union)

WindowsProcess Creation
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
François HubautSun Jan 09windows
Detectionmediumtest

C# IL Code Compilation Via Ilasm.EXE

Detects the use of "Ilasm.EXE" in order to compile C# intermediate (IL) code to EXE or DLL.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
François Hubaut+1Sat May 07windows
Detectionmediumtest

InfDefaultInstall.exe .inf Execution

Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautTue Jul 13windows
Detectionmediumtest

Suspicious Execution of InstallUtil Without Log

Uses the .NET InstallUtil.exe application in order to execute image without log

WindowsProcess Creation
TA0005 · Defense Evasion
François HubautSun Jan 23windows
Detectionlowtest

JScript Compiler Execution

Detects the execution of the "jsc.exe" (JScript Compiler). Attacker might abuse this in order to compile JScript files on the fly and bypassing application whitelisting.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
François HubautMon May 02windows
Detectionmediumtest

Suspicious Diantz Alternate Data Stream Execution

Compress target file into a cab file stored in the Alternate Data Stream (ADS) of the target file.

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautFri Nov 26windows
Detectionmediumtest

Suspicious Diantz Download and Compress Into a CAB File

Download and compress a remote file and store it in a cab file on local machine.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautFri Nov 26windows
Detectionmediumtest

Suspicious Extrac32 Execution

Download or Copy file with Extrac32

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautFri Nov 26windows
Detectionmediumtest

Suspicious Extrac32 Alternate Data Stream Execution

Extract data from cab file and hide it in an alternate data stream

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautFri Nov 26windows
Detectionmediumtest

Gpscript Execution

Detects the execution of the LOLBIN gpscript, which executes logon or startup scripts configured in Group Policy

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautMon May 16windows
Detectionmediumtest

Ie4uinit Lolbin Use From Invalid Path

Detect use of ie4uinit.exe to execute commands from a specially prepared ie4uinit.inf file from a directory other than the usual directories

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautSat May 07windows
Detectionhightest

Mavinject Inject DLL Into Running Process

Detects process injection using the signed Windows tool "Mavinject" via the "INJECTRUNNING" flag

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library InjectionT1218.013 · Mavinject
François Hubaut+1Mon Jul 12windows
Detectionmediumtest

Execute Code with Pester.bat as Parent

Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1216 · System Script Proxy Execution
François Hubaut+1Sat Aug 20windows
Detectionhightest

PrintBrm ZIP Creation of Extraction

Detects the execution of the LOLBIN PrintBrm.exe, which can be used to create or extract ZIP files. PrintBrm.exe should not be run on a normal workstation.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool TransferTA0005 · Defense EvasionT1564.004 · NTFS File Attributes
François HubautMon May 02windows
Detectionmediumtest

Pubprn.vbs Proxy Execution

Detects the use of the 'Pubprn.vbs' Microsoft signed script to execute commands.

WindowsProcess Creation
TA0005 · Defense EvasionT1216.001 · PubPrn
François HubautSat May 28windows
Detectionmediumtest

Replace.exe Usage

Detects the use of Replace.exe which can be used to replace file with another file

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSun Mar 06windows
Detectionmediumtest

Lolbin Runexehelper Use As Proxy

Detect usage of the "runexehelper.exe" binary as a proxy to launch other programs

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautThu Dec 29windows
Detectionmediumtest

SyncAppvPublishingServer Execute Arbitrary PowerShell Code

Executes arbitrary PowerShell code using SyncAppvPublishingServer.exe.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautMon Jul 12windows
Detectionmediumtest

SyncAppvPublishingServer VBS Execute Arbitrary PowerShell Code

Executes arbitrary PowerShell code using SyncAppvPublishingServer.vbs

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1216 · System Script Proxy Execution
François HubautFri Jul 16windows