Rule Library

Sigma Rules

638 rules found for "Florian Roth (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Java Running with Remote Debugging

Detects a JAVA process running with remote debugging allowing more than just localhost to connect

WindowsProcess Creation
T1203 · Exploitation for Client ExecutionTA0002 · Execution
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionhightest

Suspicious Processes Spawned by Java.EXE

Detects suspicious processes spawned from a Java host process which could indicate a sign of exploitation (e.g. log4j)

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Fri Dec 17windows
Detectionmediumtest

Suspicious SysAidServer Child

Detects suspicious child processes of SysAidServer (as seen in MERCURY threat actor intrusions)

WindowsProcess Creation
TA0008 · Lateral MovementT1210 · Exploitation of Remote Services
Florian Roth (Nextron Systems)Fri Aug 26windows
Detectionhightest

Suspicious Windows Trace ETW Session Tamper Via Logman.EXE

Detects the execution of "logman" utility in order to disable or delete Windows trace sessions

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1070.001 · Clear Windows Event Logs
Florian Roth (Nextron Systems)Thu Feb 11windows
Detectionhightest

Mavinject Inject DLL Into Running Process

Detects process injection using the signed Windows tool "Mavinject" via the "INJECTRUNNING" flag

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library InjectionT1218.013 · Mavinject
François Hubaut+1Mon Jul 12windows
Detectionhightest

MpiExec Lolbin

Detects a certain command line flag combination used by mpiexec.exe LOLBIN from HPC pack that can be used to execute any other binary

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Florian Roth (Nextron Systems)Tue Jan 11windows
Detectionhightest

Suspicious GrpConv Execution

Detects the suspicious execution of a utility to convert Windows 3.x .grp files or for persistence purposes by malicious software or actors

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
Florian Roth (Nextron Systems)Thu May 19windows
Detectioncriticaltest

Potential Credential Dumping Via LSASS Process Clone

Detects a suspicious LSASS process process clone that could be a sign of credential dumping activity

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential DumpingT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)+1Sat Nov 27windows
Detectionhightest

Suspicious Mshta.EXE Execution Patterns

Detects suspicious mshta process execution patterns

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native API
Florian Roth (Nextron Systems)+1Sat Jul 17windows
Detectionhightest

Potential MsiExec Masquerading

Detects the execution of msiexec.exe from an uncommon directory

WindowsProcess Creation
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Florian Roth (Nextron Systems)Thu Nov 14windows
Detectionmediumtest

MsiExec Web Install

Detects suspicious msiexec process starts with web addresses as parameter

WindowsProcess Creation
TA0005 · Defense EvasionT1218.007 · MsiexecTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)Fri Feb 09windows
Detectionhightest

Potential MSTSC Shadowing Activity

Detects RDP session hijacking by using MSTSC shadowing

WindowsProcess Creation
TA0008 · Lateral MovementT1563.002 · RDP Hijacking
Florian Roth (Nextron Systems)Fri Jan 24windows
Detectionmediumtest

Suspicious Group And Account Reconnaissance Activity Using Net.EXE

Detects suspicious reconnaissance command line activity on Windows systems using Net.EXE Check if the user that executed the commands is suspicious (e.g. service accounts, LOCAL_SYSTEM)

WindowsProcess Creation
TA0007 · DiscoveryT1087.001 · Local AccountT1087.002 · Domain Account
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionmediumtest

New Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+3Tue Jan 29windows
Detectionhightest

RDP Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh to configure a port forwarding of port 3389 (RDP) rule

WindowsProcess Creation
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)+1Tue Jan 29windows
Detectionhightest

Network Reconnaissance Activity

Detects a set of suspicious network related commands often used in recon stages

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account DiscoveryT1082 · System Information Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Feb 07windows
Detectionhightest

Suspicious Execution From Outlook Temporary Folder

Detects a suspicious program execution in Outlook temp folder

WindowsProcess Creation
TA0001 · Initial AccessT1566.001 · Spearphishing Attachment
Florian Roth (Nextron Systems)Tue Oct 01windows
Detectionhightest

Suspicious Outlook Child Process

Detects a suspicious process spawning from an Outlook process.

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious File
Michael Haag+4Mon Feb 28windows
Detectionhightest

Suspicious Microsoft Office Child Process

Detects a suspicious process spawning from one of the Microsoft Office suite products (Word, Excel, PowerPoint, Publisher, Visio, etc.)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1047 · Windows Management InstrumentationT1204.002 · Malicious File+1
Florian Roth (Nextron Systems)+7Fri Apr 06windows
Detectionhightest

Ping Hex IP

Detects a ping command that uses a hex encoded IP address

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Fri Mar 23windows
Detectionhightest

Suspicious Plink Port Forwarding

Detects suspicious Plink tunnel port forwarding to a local port

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol TunnelingTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol
Florian Roth (Nextron Systems)Tue Jan 19windows
Detectionhightest

Potential RDP Tunneling Via Plink

Execution of plink to perform data exfiltration and tunneling

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Florian Roth (Nextron Systems)Thu Aug 04windows
Detectionhightest

Suspicious Encoded PowerShell Command Line

Detects suspicious powershell process starts with base64 encoded commands (e.g. Emotet)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+5Mon Sep 03windows
Detectionhightest

Suspicious PowerShell Encoded Command Patterns

Detects PowerShell command line patterns in combincation with encoded commands that often appear in malware infection chains

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue May 24windows
Detectionhightest

Suspicious Obfuscated PowerShell Code

Detects suspicious UTF16 and base64 encoded and often obfuscated PowerShell code often used in command lines

WindowsProcess Creation
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Mon Jul 11windows
Detectionhightest

PowerShell Base64 Encoded FromBase64String Cmdlet

Detects usage of a base64 encoded "FromBase64String" cmdlet in a process command line

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Sat Aug 24windows
Detectionhightest

PowerShell Base64 Encoded IEX Cmdlet

Detects usage of a base64 encoded "IEX" cmdlet in a process command line

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Fri Aug 23windows
Detectionhightest

Powershell Base64 Encoded MpPreference Cmdlet

Detects base64 encoded "MpPreference" PowerShell cmdlet code that tries to modifies or tamper with Windows Defender AV

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Fri Mar 04windows
Detectionhightest

Powershell Defender Disable Scan Feature

Detects requests to disable Microsoft Defender features using PowerShell commands

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Thu Mar 03windows
Detectionmediumtest

Powershell Defender Exclusion

Detects requests to exclude files, folders or processes from Antivirus scanning using PowerShell cmdlets

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Thu Apr 29windows
Detectionhightest

Disabled IE Security Features

Detects command lines that indicate unwanted modifications to registry keys that disable important Internet Explorer security features

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Fri Jun 19windows
Detectionmediumtest

Potential DLL File Download Via PowerShell Invoke-WebRequest

Detects potential DLL files being downloaded using the PowerShell Invoke-WebRequest or Invoke-RestMethod cmdlets.

WindowsProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1059.001 · PowerShellT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Mon Mar 13windows
Detectionhightest

PowerShell Download and Execution Cradles

Detects PowerShell download and execution cradles.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Florian Roth (Nextron Systems)Thu Mar 24windows
Detectionmediumtest

PowerShell Download Pattern

Detects a Powershell process that contains download commands in its command line string

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionhightest

Base64 Encoded PowerShell Command Detected

Detects usage of the "FromBase64String" function in the commandline which is used to decode a base64 encoded string

WindowsProcess Creation
T1027 · Obfuscated Files or InformationTA0005 · Defense EvasionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+1
Florian Roth (Nextron Systems)Wed Jan 29windows
Detectionhightest

PowerShell Get-Process LSASS

Detects a "Get-Process" cmdlet and it's aliases on lsass process, which is in almost all cases a sign of malicious activity

WindowsProcess Creation
TA0006 · Credential AccessT1552.004 · Private Keys
Florian Roth (Nextron Systems)Fri Apr 23windows
Detectionhightest

Suspicious PowerShell IEX Execution Patterns

Detects suspicious ways to run Invoke-Execution using IEX alias

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+1Thu Mar 24windows
Detectioncriticaltest

Suspicious PowerShell Mailbox Export to Share

Detects usage of the powerShell New-MailboxExportRequest Cmdlet to exports a mailbox to a remote or local share, as used in ProxyShell exploitations

WindowsProcess Creation
TA0010 · Exfiltration
Florian Roth (Nextron Systems)Sat Aug 07windows
Detectionhightest

Potential PowerShell Obfuscation Via WCHAR/CHAR

Detects suspicious encoded character syntax often used for defense evasion

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Thu Jul 09windows
Detectionhightest

PowerShell SAM Copy

Detects suspicious PowerShell scripts accessing SAM hives

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account Manager
Florian Roth (Nextron Systems)Thu Jul 29windows
Detectionmediumtest

Suspicious PowerShell Invocation From Script Engines

Detects suspicious powershell invocations from interpreters or unusual programs

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Wed Jan 16windows
Detectionhightest

Suspicious PowerShell Download and Execute Pattern

Detects suspicious PowerShell download patterns that are often used in malicious scripts, stagers or downloaders (make sure that your backend applies the strings case-insensitive)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Feb 28windows
Detectionhightest

Suspicious PowerShell Parameter Substring

Detects suspicious PowerShell invocation with a parameter substring

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionmediumtest

PowerShell Script Run in AppData

Detects a suspicious command line execution that invokes PowerShell with reference to an AppData folder

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 09windows
Detectionhightest

Net WebClient Casing Anomalies

Detects PowerShell command line contents that include a suspicious abnormal casing in the Net.Webclient (e.g. nEt.WEbCliEnT) string as used in obfuscation techniques

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue May 24windows
Detectionmediumtest

Visual Studio NodejsTools PressAnyKey Arbitrary Binary Execution

Detects child processes of Microsoft.NodejsTools.PressAnyKey.exe that can be used to execute any other binary

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionhightest

PUA - 3Proxy Execution

Detects the use of 3proxy, a tiny free proxy server

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Florian Roth (Nextron Systems)Tue Sep 13windows
Detectionmediumtest

PUA - AdvancedRun Execution

Detects the execution of AdvancedRun utility

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionTA0004 · Privilege EscalationT1564.003 · Hidden Window+2
Florian Roth (Nextron Systems)Thu Jan 20windows