Rule Library

Sigma Rules

784 rules found for "Nasreddine Bencherchali (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Zip A Folder With PowerShell For Staging In Temp - PowerShell Script

Detects PowerShell scripts that make use of the "Compress-Archive" Cmdlet in order to compress folders and files where the output is stored in a potentially suspicious location that is used often by malware for exfiltration. An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

WindowsPowerShell Script
TA0009 · CollectionT1074.001 · Local Data Staging
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 20windows
Detectionhightest

Tamper Windows Defender Remove-MpPreference - ScriptBlockLogging

Detects attempts to remove Windows Defender configuration using the 'MpPreference' cmdlet

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhightest

Tamper Windows Defender - ScriptBlockLogging

Detects PowerShell scripts attempting to disable scheduled scanning and other parts of Windows Defender ATP or set default actions to allow.

WindowsPowerShell Script
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François Hubaut+5Sun Jan 16windows
Detectionmediumtest

User Discovery And Export Via Get-ADUser Cmdlet - PowerShell

Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file

WindowsPowerShell Script
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Nov 17windows
Detectionmediumtest

Potential Persistence Via PowerShell User Profile Using Add-Content

Detects calls to "Add-Content" cmdlet in order to modify the content of the user profile and potentially adding suspicious commands for persistence

WindowsPowerShell Script
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.013 · PowerShell Profile
François Hubaut+1Wed Aug 18windows
Detectionhightest

Abuse of Service Permissions to Hide Services Via Set-Service - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

WindowsPowerShell Script
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Nasreddine Bencherchali (Nextron Systems)Mon Oct 17windows
Detectionhightest

Veeam Backup Servers Credential Dumping Script Execution

Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.

WindowsPowerShell Script
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Thu May 04windows
Detectionmediumtest

Potentially Suspicious Call To Win32_NTEventlogFile Class - PSScript

Detects usage of the WMI class "Win32_NTEventlogFile" in a potentially suspicious way (delete, backup, change permissions, etc.) from a PowerShell script

WindowsPowerShell Script
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Jul 13windows
Detectionhightest

Potential WinAPI Calls Via PowerShell Scripts

Detects use of WinAPI functions in PowerShell scripts

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShellT1106 · Native API
Nasreddine Bencherchali (Nextron Systems)+2Tue Oct 06windows
Detectionmediumtest

WMIC Unquoted Services Path Lookup - PowerShell

Detects known WMI recon method to look for unquoted service paths, often used by pentest inside of powershell scripts attackers enum scripts

WindowsPowerShell Script
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

HackTool - Generic Process Access

Detects process access requests from hacktool processes based on their default image name

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Nasreddine Bencherchali (Nextron Systems)+1Mon Nov 27windows
Detectionhightest

Suspicious LSASS Access Via MalSecLogon

Detects suspicious access to LSASS handle via a call trace to "seclogon.dll" with a suspicious access right.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS Memory
Samir Bousseaden (original elastic rule)+1Wed Jun 29windows
Detectionlowtest

Uncommon Process Access Rights For Target Image

Detects process access request to uncommon target images with a "PROCESS_ALL_ACCESS" access mask.

WindowsProcess Access
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.011 · Extra Window Memory Injection
Nasreddine Bencherchali (Nextron Systems)+1Mon May 27windows
Detectionmediumtest

7Zip Compressing Dump Files

Detects execution of 7z in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
Nasreddine Bencherchali (Nextron Systems)Tue Sep 27windows
Detectionhightest

Suspicious AddinUtil.EXE CommandLine Execution

Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with suspicious Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+2Mon Sep 18windows
Detectionhightest

Potential Adplus.EXE Abuse

Detects execution of "AdPlus.exe", a binary that is part of the Windows SDK that can be used as a LOLBIN in order to dump process memory and execute arbitrary commands.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0006 · Credential AccessT1003.001 · LSASS Memory
Nasreddine Bencherchali (Nextron Systems)Thu Jun 09windows
Detectionmediumtest

AgentExecutor PowerShell Execution

Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Sat Dec 24windows
Detectionhightest

Suspicious AgentExecutor PowerShell Execution

Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Sat Dec 24windows
Detectionhightest

Suspicious Child Process of AspNetCompiler

Detects potentially suspicious child processes of "aspnet_compiler.exe".

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Mon Aug 14windows
Detectionhightest

Potentially Suspicious ASP.NET Compilation Via AspNetCompiler

Detects execution of "aspnet_compiler.exe" with potentially suspicious paths for compilation.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Mon Aug 14windows
Detectionhightest

Set Suspicious Files as System Files Using Attrib.EXE

Detects the usage of attrib with the "+s" option to set scripts or executables located in suspicious locations as system files to hide them from users and make them unable to be deleted with simple rights. The rule limits the search to specific extensions and directories to avoid FPs

WindowsProcess Creation
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
Nasreddine Bencherchali (Nextron Systems)Tue Jun 28windows
Detectionhightest

Audit Policy Tampering Via NT Resource Kit Auditpol

Threat actors can use an older version of the auditpol binary available inside the NT resource kit to change audit policy configuration to impair detection capability. This can be carried out by selectively disabling/removing certain audit policies as well as restoring a custom policy owned by the threat actor.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionmediumtest

Indirect Command Execution From Script File Via Bash.EXE

Detects execution of Microsoft bash launcher without any flags to execute the content of a bash script directly. This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash.

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)Tue Aug 15windows
Detectionmediumtest

Data Export From MSSQL Table Via BCP.EXE

Detects the execution of the BCP utility in order to export data from the database. Attackers were seen saving their malware to a database column or table and then later extracting it via "bcp.exe" into a file.

WindowsProcess Creation
TA0002 · ExecutionTA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Omar Khaled+2Tue Aug 20windows
Detectionhightest

Suspicious Child Process Of BgInfo.EXE

Detects suspicious child processes of "BgInfo.exe" which could be a sign of potential abuse of the binary to proxy execution via external VBScript

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Nasreddine Bencherchali (Nextron Systems)Wed Aug 16windows
Detectionmediumtest

Uncommon Child Process Of BgInfo.EXE

Detects uncommon child processes of "BgInfo.exe" which could be a sign of potential abuse of the binary to proxy execution via external VBScript

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Nasreddine Bencherchali (Nextron Systems)+2Sat Oct 26windows
Detectionhightest

File With Suspicious Extension Downloaded Via Bitsadmin

Detects usage of bitsadmin downloading a file with a suspicious extension

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Florian Roth (Nextron Systems)+1Tue Jun 28windows
Detectionhightest

File Download Via Bitsadmin To A Suspicious Target Folder

Detects usage of bitsadmin downloading a file to a suspicious target folder

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Florian Roth (Nextron Systems)+1Tue Jun 28windows
Detectionhightest

Potential Data Stealing Via Chromium Headless Debugging

Detects chromium based browsers starting in headless and debugging mode and pointing to a user profile. This could be a sign of data stealing or remote control

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0009 · CollectionT1185 · Browser Session Hijacking+1
Nasreddine Bencherchali (Nextron Systems)Fri Dec 23windows
Detectionlowtest

Browser Execution In Headless Mode

Detects execution of Chromium based browser in headless mode

WindowsProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1564.003 · Hidden Window
Nasreddine Bencherchali (Nextron Systems)Tue Sep 12windows
Detectionmediumtest

File Download From Browser Process Via Inline URL

Detects execution of a browser process with a URL argument pointing to a file with a potentially interesting extension. This can be abused to download arbitrary files or to hide from the user for example by launching the browser in a minimized state.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionmediumtest

Browser Started with Remote Debugging

Detects browsers starting with the remote debugging flags. Which is a technique often used to perform browser injection attacks

WindowsProcess Creation
TA0006 · Credential AccessTA0009 · CollectionT1185 · Browser Session Hijacking
Martin Mueller+1Wed Jul 27windows
Detectionmediumtest

Potential Binary Proxy Execution Via Cdb.EXE

Detects usage of "cdb.exe" to launch arbitrary processes or commands from a debugger script file

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Beyu Denis+2Sat Oct 26windows
Detectionmediumtest

File Download via CertOC.EXE

Detects when a user downloads a file by using CertOC.exe

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Mon May 16windows
Detectionhightest

File Download From IP Based URL Via CertOC.EXE

Detects when a user downloads a file from an IP based URL using CertOC.exe

WindowsProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Oct 18windows
Detectionhightest

Suspicious DLL Loaded via CertOC.EXE

Detects when a user installs certificates by using CertOC.exe to load the target DLL file.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionmediumtest

Suspicious Download Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+3Wed Feb 15windows
Detectionhightest

Suspicious File Downloaded From Direct IP Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files from direct IPs.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionhightest

Suspicious File Downloaded From File-Sharing Website Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files from file-sharing websites.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionmediumtest

File Encoded To Base64 Via Certutil.EXE

Detects the execution of certutil with the "encode" flag to encode a file to base64. This can be abused by threat actors and attackers for data exfiltration

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)+3Sun Feb 24windows
Detectionhightest

Suspicious File Encoded To Base64 Via Certutil.EXE

Detects the execution of certutil with the "encode" flag to encode a file to base64 where the extensions of the file is suspicious

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionhightest

File In Suspicious Location Encoded To Base64 Via Certutil.EXE

Detects the execution of certutil with the "encode" flag to encode a file to base64 where the files are located in potentially suspicious locations

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionmediumtest

Certificate Exported Via Certutil.EXE

Detects the execution of the certutil with the "exportPFX" flag which allows the utility to export certificates.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)+3Wed Feb 15windows
Detectionhightest

Potential NTLM Coercion Via Certutil.EXE

Detects possible NTLM coercion via certutil using the 'syncwithWU' flag

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Detectionmediumtest

Cloudflared Portable Execution

Detects the execution of the "cloudflared" binary from a non standard location.

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Nasreddine Bencherchali (Nextron Systems)Wed Dec 20windows
Detectionmediumtest

Cloudflared Tunnel Connections Cleanup

Detects execution of the "cloudflared" tool with the tunnel "cleanup" flag in order to cleanup tunnel connections.

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web ServiceT1090 · ProxyT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed May 17windows
Detectionmediumtest

Cloudflared Tunnel Execution

Detects execution of the "cloudflared" tool to connect back to a tunnel. This was seen used by threat actors to maintain persistence and remote access to compromised networks.

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web ServiceT1090 · ProxyT1572 · Protocol Tunneling
Janantha Marasinghe+1Wed May 17windows
Detectionhightest

Change Default File Association To Executable Via Assoc

Detects when a program changes the default file association of any extension to an executable. When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access or by administrators using the built-in assoc utility. Applications can modify the file association for a given file extension to call an arbitrary program when a file with the given extension is opened.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.001 · Change Default File Association
Nasreddine Bencherchali (Nextron Systems)Tue Jun 28windows