Rule Library

Sigma Rules

1,405 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Important Windows Service Terminated With Error

Detects important or interesting Windows services that got terminated for whatever reason

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhightest

Important Windows Service Terminated Unexpectedly

Detects important or interesting Windows services that got terminated unexpectedly.

Windowssystem
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Fri Apr 14windows
Detectionhightest

RTCore Suspicious Service Installation

Detects the installation of RTCore service. Which could be an indication of Micro-Star MSI Afterburner vulnerable driver abuse

Windowssystem
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Aug 30windows
Detectionmediumtest

Scheduled Task Executed From A Suspicious Location

Detects the execution of Scheduled Tasks where the Program being run is located in a suspicious location or it's an unusale program to be run from a Scheduled Task

Windowstaskscheduler
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Dec 05windows
Detectionmediumtest

Scheduled Task Executed Uncommon LOLBIN

Detects the execution of Scheduled Tasks where the program being run is located in a suspicious location or where it is an unusual program to be run from a Scheduled Task

Windowstaskscheduler
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Nasreddine Bencherchali (Nextron Systems)Mon Dec 05windows
Detectionhightest

Ngrok Usage with Remote Desktop Service

Detects cases in which ngrok, a reverse proxy tool, forwards events to the local RDP port, which could be a sign of malicious behaviour

Windowsterminalservices-localsessionmanager
TA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)Fri Apr 29windows
Detectionhightest

Mimikatz Use

This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)

Windows
S0002 · MimikatzTA0008 · Lateral MovementTA0006 · Credential Access2013-07-001 · CAR 2013-07-001+5
Florian Roth (Nextron Systems)+1Tue Jan 10windows
Detectionmediumstable

Windows Defender Exclusions Added

Detects the Setting of Windows Defender Exclusions

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christian Burkard (Nextron Systems)Tue Jul 06windows
Detectionhightest

Windows Defender Exploit Guard Tamper

Detects when someone is adding or removing applications or folders from exploit guard "ProtectedFolders" or "AllowedApplications"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionlowstable

Windows Defender Submit Sample Feature Disabled

Detects disabling of the "Automatic Sample Submission" feature of Windows Defender.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionmediumstable

Windows Defender Real-Time Protection Failure/Restart

Detects issues with Windows Defender Real-Time Protection features

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+1Tue Mar 28windows
Detectionhightest

Win Defender Restored Quarantine File

Detects the restoration of files from the defender quarantine

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Windows Defender Configuration Changes

Detects suspicious changes to the Windows Defender configuration

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Dec 06windows
Detectionhighstable

Microsoft Defender Tamper Protection Trigger

Detects blocked attempts to change any of Defender's settings such as "Real Time Monitoring" and "Behavior Monitoring"

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Bhabesh Raj+1Mon Jul 05windows
Detectionmediumtest

WMI Persistence

Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs.

Windowswmi
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
Florian Roth (Nextron Systems)+2Tue Aug 22windows
Detectionhightest

HackTool - Potential CobaltStrike Process Injection

Detects a potential remote threat creation with certain characteristics which are typical for Cobalt Strike beacons

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.001 · Dynamic-link Library Injection
Olaf Hartong+3Fri Nov 30windows
Detectionhightest

Remote Thread Creation In Mstsc.Exe From Suspicious Location

Detects remote thread creation in the "mstsc.exe" process by a process located in a potentially suspicious location. This technique is often used by attackers in order to hook some APIs used by DLLs loaded by "mstsc.exe" during RDP authentications in order to steal credentials.

WindowsRemote Thread Creation
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Fri Jul 28windows
Detectionmediumtest

Remote Thread Creation Via PowerShell In Uncommon Target

Detects the creation of a remote thread from a Powershell process in an uncommon target process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Jun 25windows
Detectionmediumtest

Remote Thread Creation In Uncommon Target Image

Detects uncommon target processes for remote thread creation

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.003 · Thread Execution Hijacking
Florian Roth (Nextron Systems)Wed Mar 16windows
Detectionmediumtest

Hidden Executable In NTFS Alternate Data Stream

Detects the creation of an ADS (Alternate Data Stream) that contains an executable by looking at a non-empty Imphash

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Sun Jun 03windows
Detectionhightest

Suspicious File Download From File Sharing Websites - File Stream

Detects the download of suspicious file type from a well-known file and paste sharing domain

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionmediumtest

Unusual File Download From File Sharing Websites - File Stream

Detects the download of suspicious file type from a well-known file and paste sharing domain

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionhightest

HackTool Named File Stream Created

Detects the creation of a named file stream with the imphash of a well-known hack tool

WindowsAlternate Data Stream
TA0005 · Defense EvasionS0139 · S0139T1564.004 · NTFS File Attributes
Florian Roth (Nextron Systems)Wed Aug 24windows
Detectionhightest

Unusual File Download from Direct IP Address

Detects the download of suspicious file type from URLs with IP

WindowsAlternate Data Stream
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Nasreddine Bencherchali (Nextron Systems)+1Wed Sep 07windows
Detectionhightest

Potential Suspicious Winget Package Installation

Detects potential suspicious winget package installation from a suspicious source.

WindowsAlternate Data Stream
TA0005 · Defense EvasionTA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Tue Apr 18windows
Detectionhightest

Potentially Suspicious File Download From ZIP TLD

Detects the download of a file with a potentially suspicious extension from a .zip top level domain.

WindowsAlternate Data Stream
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Thu May 18windows
Detectionmediumtest

Cloudflared Tunnels Related DNS Requests

Detects DNS requests to Cloudflared tunnels domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed Dec 20windows
Detectionmediumtest

DNS Query To AzureWebsites.NET By Non-Browser Process

Detects a DNS query by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionhighexperimental

DNS Query by Finger Utility

Detects DNS queries made by the finger utility, which can be abused by threat actors to retrieve remote commands for execution on Windows devices. In one ClickFix malware campaign, adversaries leveraged the finger protocol to fetch commands from a remote server. Since the finger utility is not commonly used in modern Windows environments, its presence already raises suspicion. Investigating such DNS queries can also help identify potential malicious infrastructure used by threat actors for command and control (C2) communication.

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNSTA0002 · ExecutionT1059.003 · Windows Command Shell
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Nov 19windows
Detectionmediumexperimental

Notepad++ Updater DNS Query to Uncommon Domains

Detects when the Notepad++ updater (gup.exe) makes DNS queries to domains that are not part of the known legitimate update infrastructure. This could indicate potential exploitation of the updater mechanism or suspicious network activity that warrants further investigation.

WindowsDNS Query
TA0009 · CollectionTA0006 · Credential AccessT1195.002 · Compromise Software Supply ChainTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Feb 02windows
Detectionhighexperimental

Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing

Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.

WindowsDNS Query
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20windows
Detectioncriticaltest

Suspicious Cobalt Strike DNS Beaconing - Sysmon

Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Tue Nov 09windows
Detectionmediumtest

TeamViewer Domain Query By Non-TeamViewer Application

Detects DNS queries to a TeamViewer domain only resolved by a TeamViewer client by an image that isn't named TeamViewer (sometimes used by threat actors for obfuscation)

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sun Jan 30windows
Detectionhightest

Malicious Driver Load

Detects loading of known malicious drivers via their hash.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows
Detectionmediumtest

Malicious Driver Load By Name

Detects loading of known malicious drivers via the file name of the drivers.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Mon Oct 03windows
Detectionhightest

PUA - Process Hacker Driver Load

Detects driver load of the Process Hacker tool

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege Escalationcve.2021-21551T1543 · Create or Modify System Process
Florian Roth (Nextron Systems)Wed Nov 16windows
Detectionmediumtest

PUA - System Informer Driver Load

Detects driver load of the System Informer tool

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543 · Create or Modify System Process
Florian Roth (Nextron Systems)Mon May 08windows
Detectionhightest

Driver Load From A Temporary Directory

Detects a driver load from a temporary directory

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Florian Roth (Nextron Systems)Sun Feb 12windows
Detectionhightest

Vulnerable Driver Load

Detects loading of known vulnerable drivers via their hash.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows
Detectionlowtest

Vulnerable Driver Load By Name

Detects the load of known vulnerable drivers via the file name of the drivers.

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows ServiceT1068 · Exploitation for Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Mon Oct 03windows
Detectionhightest

Vulnerable HackSys Extreme Vulnerable Driver Load

Detects the load of HackSys Extreme Vulnerable Driver which is an intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level and often abused by threat actors

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Thu Aug 18windows
Detectionhightest

Vulnerable WinRing0 Driver Load

Detects the load of a signed WinRing0 driver often used by threat actors, crypto miners (XMRIG) or malware for privilege escalation

WindowsDriver Load
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Florian Roth (Nextron Systems)Tue Jul 26windows
Detectionhightest

WinDivert Driver Load

Detects the load of the Windiver driver, a powerful user-mode capture/sniffing/modification/blocking/re-injection package for Windows

WindowsDriver Load
TA0006 · Credential AccessTA0009 · CollectionTA0005 · Defense EvasionT1599.001 · Network Address Translation Traversal+1
Florian Roth (Nextron Systems)Fri Jul 30windows
Detectionmediumtest

Credential Manager Access By Uncommon Applications

Detects suspicious processes based on name and location that access the windows credential manager and vault. Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::cred" function

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Tue Oct 11windows
Detectionmediumtest

Access To Windows Credential History File By Uncommon Applications

Detects file access requests to the Windows Credential History File by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::credhist" function

Windowsfile_access
TA0006 · Credential AccessT1555.004 · Windows Credential Manager
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionmediumtest

Access To Crypto Currency Wallets By Uncommon Applications

Detects file access requests to crypto currency files by uncommon processes. Could indicate potential attempt of crypto currency wallet stealing.

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Access
X__Junior (Nextron Systems)Mon Jul 29windows
Detectionmediumtest

Access To Windows DPAPI Master Keys By Uncommon Applications

Detects file access requests to the the Windows Data Protection API Master keys by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::masterkey" function

Windowsfile_access
TA0006 · Credential AccessT1555.004 · Windows Credential Manager
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionlowexperimental

Suspicious File Access to Browser Credential Storage

Detects file access to browser credential storage paths by non-browser processes, which may indicate credential access attempts. Adversaries may attempt to access browser credential storage to extract sensitive information such as usernames and passwords or cookies. This behavior is often commonly observed in credential stealing malware.

Windowsfile_access
TA0006 · Credential AccessT1555.003 · Credentials from Web BrowsersTA0007 · DiscoveryT1217 · Browser Information Discovery
François Hubaut+3Thu May 22windows