Rule Library

Sigma Rules

784 rules found for "Nasreddine Bencherchali (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Suspicious Non-Browser Network Communication With Telegram API

Detects an a non-browser process interacting with the Telegram API which could indicate use of a covert C2

WindowsNetwork Connection
TA0011 · Command and ControlTA0010 · ExfiltrationT1102 · Web ServiceT1567 · Exfiltration Over Web Service+1
Nasreddine Bencherchali (Nextron Systems)Fri May 19windows
Detectionmediumtest

Office Application Initiated Network Connection To Non-Local IP

Detects an office application (Word, Excel, PowerPoint) that initiate a network connection to a non-private IP addresses. This rule aims to detect traffic similar to one seen exploited in CVE-2021-42292. This rule will require an initial baseline and tuning that is specific to your organization.

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Execution
Christopher Peacock+4Wed Nov 10windows
Detectionmediumtest

Office Application Initiated Network Connection Over Uncommon Ports

Detects an office suit application (Word, Excel, PowerPoint, Outlook) communicating to target systems over uncommon ports.

WindowsNetwork Connection
TA0005 · Defense EvasionTA0011 · Command and Control
X__Junior (Nextron Systems)+1Wed Jul 12windows
Detectionhightest

Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder

Detects executables located in potentially suspicious directories initiating network connections towards file sharing domains.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Thu Aug 30windows
Detectionhightest

Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location

Detects a network connection initiated by programs or processes running from suspicious or uncommon files system locations.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Sun Mar 19windows
Detectioncriticaltest

HackTool - DiagTrackEoP Default Named Pipe

Detects creation of default named pipe used by the DiagTrackEoP POC, a tool that abuses "SeImpersonate" privilege.

WindowsNamed Pipe Created
TA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Wed Aug 03windows
Detectioncriticaltest

HackTool - Koh Default Named Pipe

Detects creation of default named pipes used by the Koh tool

WindowsNamed Pipe Created
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0006 · Credential AccessT1528 · Steal Application Access Token+1
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectionmediumtest

PUA - CSExec Default Named Pipe

Detects default CSExec pipe creation

WindowsNamed Pipe Created
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesTA0002 · ExecutionT1569.002 · Service Execution
Nikita Nazarov+2Mon Aug 07windows
Detectionmediumtest

PUA - PAExec Default Named Pipe

Detects PAExec default named pipe

WindowsNamed Pipe Created
TA0002 · ExecutionT1569.002 · Service Execution
Nasreddine Bencherchali (Nextron Systems)Wed Oct 26windows
Detectionmediumtest

PUA - RemCom Default Named Pipe

Detects default RemCom pipe creation

WindowsNamed Pipe Created
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin SharesTA0002 · ExecutionT1569.002 · Service Execution
Nikita Nazarov+2Mon Aug 07windows
Detectionmediumtest

PsExec Tool Execution From Suspicious Locations - PipeName

Detects PsExec default pipe creation where the image executed is located in a suspicious location. Which could indicate that the tool is being used in an attack

WindowsNamed Pipe Created
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Nasreddine Bencherchali (Nextron Systems)Thu Aug 04windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

Windowspowershell-classic
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Tue Jul 13windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Windowspowershell-classic
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionhightest

Tamper Windows Defender - PSClassic

Attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

Windowsps_classic_provider_start
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+1Mon Jun 07windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - PsModule

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsPowerShell Module
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
Nasreddine Bencherchali (Nextron Systems)+1Sun Jan 22windows
Detectionhightest

Malicious PowerShell Scripts - PoshModule

Detects the execution of known offensive powershell scripts used for exploitation or reconnaissance

WindowsPowerShell Module
TA0002 · ExecutionT1059.001 · PowerShell
François Hubaut+1Mon Jan 23windows
Detectionhightest

HackTool - Evil-WinRm Execution - PowerShell Module

Detects the execution of Evil-WinRM via PowerShell Module logs by leveraging the hardcoded strings inside the utility.

WindowsPowerShell Module
TA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Sun Feb 25windows
Detectionhightest

Malicious PowerShell Commandlets - PoshModule

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Module
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Nasreddine Bencherchali (Nextron Systems)Fri Jan 20windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell Module

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Module
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 13windows
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Module

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Module
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionhightest

AADInternals PowerShell Cmdlets Execution - PsScript

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

WindowsPowerShell Script
TA0002 · ExecutionTA0043 · ReconnaissanceTA0007 · DiscoveryTA0006 · Credential Access+1
Austin Songer+2Fri Dec 23windows
Detectionmediumtest

Potential Active Directory Enumeration Using AD Module - PsScript

Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.

WindowsPowerShell Script
TA0043 · ReconnaissanceTA0007 · DiscoveryTA0040 · Impact
François Hubaut+1Sun Jan 22windows
Detectionmediumtest

Add Windows Capability Via PowerShell Script

Detects usage of the "Add-WindowsCapability" cmdlet to add Windows capabilities. Notable capabilities could be "OpenSSH" and others.

WindowsPowerShell Script
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Sun Jan 22windows
Detectionmediumtest

Potential AMSI Bypass Script Using NULL Bits

Detects usage of special strings/null bits in order to potentially bypass AMSI functionalities

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Wed Jan 04windows
Detectionmediumtest

Potential Data Exfiltration Via Audio File

Detects potential exfiltration attempt via audio file using PowerShell

WindowsPowerShell Script
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionmediumtest

Computer Discovery And Export Via Get-ADComputer Cmdlet - PowerShell

Detects usage of the Get-ADComputer cmdlet to collect computer information and output it to a file

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 17windows
Detectionhightest

Powershell Install a DLL in System Directory

Uses PowerShell to install/copy a file into a system directory such as "System32" or "SysWOW64"

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556.002 · Password Filter DLL
François Hubaut+1Mon Dec 27windows
Detectionhightest

DSInternals Suspicious PowerShell Cmdlets - ScriptBlock

Detects execution and usage of the DSInternals PowerShell module. Which can be used to perform what might be considered as suspicious activity such as dumping DPAPI backup keys or manipulating NTDS.DIT files. The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Wed Jun 26windows
Detectionhightest

Disable of ETW Trace - Powershell

Detects usage of powershell cmdlets to disable or remove ETW trace sessions

WindowsPowerShell Script
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562.006 · Indicator Blocking2016-04-002 · CAR 2016-04-002
Nasreddine Bencherchali (Nextron Systems)Tue Jun 28windows
Detectionmediumtest

Security Software Discovery Via Powershell Script

Detects calls to "get-process" where the output is piped to a "where-object" filter to search for security solution processes. Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as firewall rules and anti-virus

WindowsPowerShell Script
TA0007 · DiscoveryT1518.001 · Security Software Discovery
François Hubaut+2Thu Dec 16windows
Detectionmediumtest

PowerShell Hotfix Enumeration

Detects call to "Win32_QuickFixEngineering" in order to enumerate installed hotfixes often used in "enum" scripts by attackers

WindowsPowerShell Script
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Jun 21windows
Detectionmediumtest

Import PowerShell Modules From Suspicious Directories

Detects powershell scripts that import modules from suspicious directories

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Thu Jul 07windows
Detectionmediumtest

Unsigned AppX Installation Attempt Using Add-AppxPackage - PsScript

Detects usage of the "Add-AppxPackage" or it's alias "Add-AppPackage" to install unsigned AppX packages

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Jan 31windows
Detectioncriticaltest

Suspicious PowerShell Mailbox Export to Share - PS

Detects usage of the powerShell New-MailboxExportRequest Cmdlet to exports a mailbox to a remote or local share, as used in ProxyShell exploitations

WindowsPowerShell Script
TA0010 · Exfiltration
Nasreddine Bencherchali (Nextron Systems)Wed Oct 26windows
Detectionhightest

Malicious PowerShell Commandlets - ScriptBlock

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Sean Metcalf+10Sun Mar 05windows
Detectionhightest

PSAsyncShell - Asynchronous TCP Reverse Shell

Detects the use of PSAsyncShell an Asynchronous TCP Reverse Shell written in powershell

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Tue Oct 04windows
Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell ScriptBlock

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue May 09windows
Detectionmediumtest

PowerShell Script With File Hostname Resolving Capabilities

Detects PowerShell scripts that have capabilities to read files, loop through them and resolve DNS host entries.

WindowsPowerShell Script
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionlowtest

PowerShell Script Change Permission Via Set-Acl - PsScript

Detects PowerShell scripts set ACL to of a file or a folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionhightest

PowerShell Set-Acl On Windows Folder - PsScript

Detects PowerShell scripts to set the ACL to a file in the Windows folder

WindowsPowerShell Script
TA0005 · Defense Evasionattack.t1222
François Hubaut+1Tue Jul 18windows
Detectionhightest

Potential Persistence Via Security Descriptors - ScriptBlock

Detects usage of certain functions and keywords that are used to manipulate security descriptors in order to potentially set a backdoor. As seen used in the DAMP project.

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Jan 05windows
Detectionlowtest

Potential PowerShell Obfuscation Using Character Join

Detects specific techniques often seen used inside of PowerShell scripts to obfscuate Alias creation

WindowsPowerShell Script
TA0005 · Defense EvasionTA0002 · ExecutionT1027 · Obfuscated Files or InformationT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)Mon Jan 09windows
Detectionmediumtest

Suspicious Eventlog Clear

Detects usage of known powershell cmdlets such as "Clear-EventLog" to clear the Windows event logs

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.001 · Clear Windows Event Logs
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 12windows
Detectionmediumtest

Troubleshooting Pack Cmdlet Execution

Detects execution of "TroubleshootingPack" cmdlets to leverage CVE-2022-30190 or action similar to "msdt" lolbin (as described in LOLBAS)

WindowsPowerShell Script
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jun 21windows
Detectionmediumtest

Potential Keylogger Activity

Detects PowerShell scripts that contains reference to keystroke capturing functions

WindowsPowerShell Script
TA0009 · CollectionTA0006 · Credential AccessT1056.001 · Keylogging
Nasreddine Bencherchali (Nextron Systems)Wed Jan 04windows
Detectionmediumtest

Suspicious TCP Tunnel Via PowerShell Script

Detects powershell scripts that creates sockets/listeners which could be indicative of tunneling activity

WindowsPowerShell Script
TA0011 · Command and ControlT1090 · Proxy
Nasreddine Bencherchali (Nextron Systems)Fri Jul 08windows
Detectionhightest

Suspicious Service DACL Modification Via Set-Service Cmdlet - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionmediumtest

PowerShell Write-EventLog Usage

Detects usage of the "Write-EventLog" cmdlet with 'RawData' flag. The cmdlet can be levreage to write malicious payloads to the EventLog and then retrieve them later for later use

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Aug 16windows