Rule Library

Sigma Rules

3,707 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Potential CVE-2023-25157 Exploitation Attempt

Detects a potential exploitation attempt of CVE-2023-25157 a SQL injection in GeoServer

Web Server Log
TA0001 · Initial Accesscve.2023-25157detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Jun 142023
Emerging Threathightest

Potential CVE-2023-25717 Exploitation Attempt

Detects a potential exploitation attempt of CVE-2023-25717 a Remote Code Execution via an unauthenticated HTTP GET Request, in Ruckus Wireless Admin

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-25717detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 302023
Emerging Threathightest

Potential CVE-2023-27363 Exploitation - HTA File Creation By FoxitPDFReader

Detects suspicious ".hta" file creation in the startup folder by Foxit Reader. This can be an indication of CVE-2023-27363 exploitation.

WindowsFile Event
TA0003 · PersistenceT1505.001 · SQL Stored Procedurescve.2023-27363detection.emerging-threats
GregoryWed Oct 112023
Emerging Threatmediumtest

Potential CVE-2023-27997 Exploitation Indicators

Detects indicators of potential exploitation of CVE-2023-27997 in Frotigate weblogs. To avoid false positives it is best to look for successive requests to the endpoints mentioned as well as weird values of the "enc" parameter

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-27997detection.emerging-threats
Sergio Palacios Dominguez+1Fri Jul 282023
Emerging Threathightest

Potential MOVEit Transfer CVE-2023-34362 Exploitation - File Activity

Detects file indicators of potential exploitation of MOVEit CVE-2023-34362.

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-34362detection.emerging-threats
Florian Roth (Nextron Systems)+1Thu Jun 012023
Emerging Threatmediumtest

Potential MOVEit Transfer CVE-2023-34362 Exploitation - Dynamic Compilation Via Csc.EXE

Detects the execution of "csc.exe" via "w3wp.exe" process. MOVEit affected hosts execute "csc.exe" via the "w3wp.exe" process to dynamically compile malicious DLL files. MOVEit is affected by a critical vulnerability. Exploited hosts show evidence of dynamically compiling a DLL and writing it under C:\\Windows\\Microsoft\.NET\\Framework64\\v4\.0\.30319\\Temporary ASP\.NET Files\\root\\([a-z0-9]{5,12})\\([a-z0-9]{5,12})\\App_Web_[a-z0-9]{5,12}\.dll. Hunting Opportunity Events from IIS dynamically compiling binaries via the csc.exe on behalf of the MOVEit application, especially since May 27th should be investigated.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpretercve.2023-34362detection.emerging-threats
kostastsaleThu Jun 012023
Emerging Threathightest

MOVEit CVE-2023-34362 Exploitation Attempt - Potential Web Shell Request

Detects get requests to specific files used during the exploitation of MOVEit CVE-2023-34362

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shellcve.2023-34362detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sat Jun 032023
Emerging Threatmediumtest

Potential CVE-2023-36874 Exploitation - Uncommon Report.Wer Location

Detects the creation of a "Report.wer" file in an uncommon folder structure. This could be a sign of potential exploitation of CVE-2023-36874.

WindowsFile Event
TA0002 · Executioncve.2023-36874detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Aug 232023
Emerging Threathightest

Potential CVE-2023-36874 Exploitation - Fake Wermgr.Exe Creation

Detects the creation of a file named "wermgr.exe" being created in an uncommon directory. This could be a sign of potential exploitation of CVE-2023-36874.

WindowsFile Event
TA0002 · Executioncve.2023-36874detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Aug 232023
Emerging Threathightest

Potential CVE-2023-36874 Exploitation - Fake Wermgr Execution

Detects the execution of a renamed "cmd", "powershell" or "powershell_ise" binary. Attackers were seen using these binaries in a renamed form as "wermgr.exe" in exploitation of CVE-2023-36874

WindowsProcess Creation
TA0002 · Executioncve.2023-36874detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Aug 232023
Emerging Threatmediumtest

Potential CVE-2023-36884 Exploitation Dropped File

Detects a specific file being created in the recent folder of Office. These files have been seen being dropped during potential exploitations of CVE-2023-36884

WindowsFile Event
TA0003 · PersistenceTA0005 · Defense Evasioncve.2023-36884detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 132023
Emerging Threatcriticaltest

Potential CVE-2023-36884 Exploitation Pattern

Detects a unique pattern seen being used by RomCom potentially exploiting CVE-2023-36884

Proxy Log
TA0011 · Command and Controlcve.2023-36884detection.emerging-threats
X__JuniorWed Jul 122023
Emerging Threathightest

Potential CVE-2303-36884 URL Request Pattern Traffic

Detects a specific URL pattern containing a specific extension and parameters pointing to an IP address. This pattern was seen being used by RomCOM potentially exploiting CVE-2023-36884

Proxy Log
TA0011 · Command and Controlcve.2023-36884detection.emerging-threats
X__JuniorWed Jul 122023
Emerging Threatmediumtest

Potential CVE-2023-36884 Exploitation - File Downloads

Detects files seen being requested by RomCom while potentially exploiting CVE-2023-36884

Proxy Log
TA0011 · Command and Controlcve.2023-36884detection.emerging-threats
X__JuniorWed Jul 122023
Emerging Threathightest

Potential CVE-2023-36884 Exploitation - URL Marker

Detects a unique URL marker seen being used by RomCom potentially exploiting CVE-2023-36884

Proxy Log
TA0011 · Command and Controlcve.2023-36884detection.emerging-threats
X__JuniorWed Jul 122023
Emerging Threathightest

Potential CVE-2023-36884 Exploitation - Share Access

Detects access to a file share with a naming schema seen being used during exploitation of CVE-2023-36884

Windowssecurity
TA0011 · Command and Controlcve.2023-36884detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Jul 132023
Emerging Threathightest

CVE-2023-38331 Exploitation Attempt - Suspicious Double Extension File

Detects the creation of a file with a double extension and a space by WinRAR. This could be a sign of exploitation of CVE-2023-38331

WindowsFile Event
TA0002 · Executioncve.2023-38331detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Aug 302023
Emerging Threathightest

CVE-2023-38331 Exploitation Attempt - Suspicious WinRAR Child Process

Detects exploitation attempt of CVE-2023-38331 (WinRAR before v6.23), where an attacker can leverage WinRAR to execute arbitrary commands and binaries.

WindowsProcess Creation
detection.emerging-threatsTA0002 · ExecutionT1203 · Exploitation for Client Executioncve.2023-38331
Nasreddine Bencherchali (Nextron Systems)+1Wed Aug 302023
Emerging Threatlowtest

CVE-2023-40477 Potential Exploitation - .REV File Creation

Detects the creation of ".rev" files by WinRAR. Could be indicative of potential exploitation of CVE-2023-40477. Look for a suspicious execution shortly after creation or a WinRAR application crash.

WindowsFile Event
TA0002 · Executioncve.2023-40477detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Aug 312023
Emerging Threatmediumtest

CVE-2023-40477 Potential Exploitation - WinRAR Application Crash

Detects a crash of "WinRAR.exe" where the version is lower than 6.23. This could indicate potential exploitation of CVE-2023-40477

Windowsapplication
TA0002 · Executioncve.2023-40477detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Aug 312023
Emerging Threathightest

Potential Information Disclosure CVE-2023-43261 Exploitation - Proxy

Detects exploitation attempts of CVE-2023-43261 and information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 that allows attackers to access sensitive router components in proxy logs.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-43621detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 202023
Emerging Threathightest

Potential Information Disclosure CVE-2023-43261 Exploitation - Web

Detects exploitation attempts of CVE-2023-43261 and information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 that allows attackers to access sensitive router components in access logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-43621detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 202023
Emerging Threatmediumtest

Potential CVE-2023-46214 Exploitation Attempt

Detects potential exploitation of CVE-2023-46214, a remote code execution (RCE) in Splunk Enterprise through insecure XML parsing

Web Server Log
TA0008 · Lateral MovementT1210 · Exploitation of Remote Servicescve.2023-46214detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Mon Nov 272023
Emerging Threathightest

Exploitation Attempt Of CVE-2023-46214 Using Public POC Code

Detects exploitation attempt of CVE-2023-46214, a remote code execution (RCE) in Splunk Enterprise through insecure XML parsing using known public proof of concept code

Web Server Log
TA0008 · Lateral MovementT1210 · Exploitation of Remote Servicescve.2023-46214detection.emerging-threats
Lars B. P. Frydenskov(Trifork Security)Mon Nov 272023
Emerging Threathightest

CVE-2023-46747 Exploitation Activity - Proxy

Detects exploitation activity of CVE-2023-46747 an unauthenticated remote code execution vulnerability in F5 BIG-IP.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-46747detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Nov 082023
Emerging Threathightest

CVE-2023-46747 Exploitation Activity - Webserver

Detects exploitation activity of CVE-2023-46747 an unauthenticated remote code execution vulnerability in F5 BIG-IP.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-46747detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Nov 082023
Emerging Threathightest

CVE-2023-4966 Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Proxy

Detects exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via proxy logs by looking for a very long host header string.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Nov 282023
Emerging Threatmediumtest

CVE-2023-4966 Potential Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Proxy

Detects potential exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via proxy logs.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Tue Nov 282023
Emerging Threatmediumtest

CVE-2023-4966 Potential Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Webserver

Detects potential exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via webserver logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Tue Nov 282023
Emerging Threathightest

CVE-2023-4966 Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Webserver

Detects exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via webserver logs by looking for a very long host header string.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Nov 282023
Emerging Threathightest

Potential Exploitation Attempt Of Undocumented WindowsServer RCE

Detects potential exploitation attempt of undocumented Windows Server Pre Auth Remote Code Execution (RCE)

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Florian Roth (Nextron Systems)+1Sat Jan 212023
Emerging Threathightest

Potential COLDSTEEL RAT File Indicators

Detects the creation of a file named "dllhost.exe" in the "C:\users\public\Documents\" directory. Seen being used by the COLDSTEEL RAT in some of its variants.

WindowsFile Event
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sun Apr 302023
Emerging Threathightest

Potential COLDSTEEL Persistence Service DLL Creation

Detects the creation of a file in a specific location and with a specific name related to COLDSTEEL RAT

WindowsFile Event
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
X__Junior (Nextron Systems)Sun Apr 302023
Emerging Threathightest

Potential COLDSTEEL Persistence Service DLL Load

Detects a suspicious DLL load by an "svchost" process based on location and name that might be related to ColdSteel RAT. This DLL location and name has been seen used by ColdSteel as the service DLL for its persistence mechanism

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 022023
Emerging Threathightest

COLDSTEEL RAT Anonymous User Process Execution

Detects the creation of a process executing as user called "ANONYMOUS" seen used by the "MileStone2016" variant of COLDSTEEL

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sun Apr 302023
Emerging Threatcriticaltest

COLDSTEEL RAT Cleanup Command Execution

Detects the creation of a "rundll32" process from the ColdSteel persistence service to initiate the cleanup command by calling one of its own exports. This functionality is not present in "MileStone2017" and some "MileStone2016" samples

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Sun Apr 302023
Emerging Threatcriticaltest

COLDSTEEL RAT Service Persistence Execution

Detects the creation of an "svchost" process with specific command line flags, that were seen present and used by ColdSteel RAT

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense Evasiondetection.emerging-threats
X__Junior (Nextron Systems)Sun Apr 302023
Emerging Threathightest

Potential COLDSTEEL RAT Windows User Creation

Detects creation of a new user profile with a specific username, seen being used by some variants of the COLDSTEEL RAT.

WindowsRegistry Set
TA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 022023
Emerging Threathightest

COLDSTEEL Persistence Service Creation

Detects the creation of new services potentially related to COLDSTEEL RAT

Windowssystem
TA0005 · Defense EvasionTA0003 · Persistencedetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 022023
Emerging Threatmediumtest

DarkGate - Autoit3.EXE File Creation By Uncommon Process

Detects the usage of curl.exe, KeyScramblerLogon, or other non-standard/suspicious processes used to create Autoit3.exe. This activity has been associated with DarkGate malware, which uses Autoit3.exe to execute shellcode that performs process injection and connects to the DarkGate command-and-control server. Curl, KeyScramblerLogon, and these other processes consitute non-standard and suspicious ways to retrieve the Autoit3 executable.

WindowsFile Event
TA0011 · Command and ControlTA0002 · ExecutionT1105 · Ingress Tool TransferT1059 · Command and Scripting Interpreter+1
Micah BabinskiSun Oct 152023
Emerging Threathightest

DarkGate - Autoit3.EXE Execution Parameters

Detects execution of the legitimate Autoit3 utility from a suspicious parent process. AutoIt3.exe is used within the DarkGate infection chain to execute shellcode that performs process injection and connects to the DarkGate command-and-control server.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Micah BabinskiSun Oct 152023
Emerging Threathightest

DarkGate - User Created Via Net.EXE

Detects creation of local users via the net.exe command with the name of "DarkGate"

WindowsProcess Creation
TA0003 · PersistenceT1136.001 · Local Accountdetection.emerging-threats
X__Junior (Nextron Systems)Sun Aug 272023
Emerging Threatcriticaltest

Griffon Malware Attack Pattern

Detects process execution patterns related to Griffon malware as reported by Kaspersky

WindowsProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Mar 092023
Emerging Threathightest

Injected Browser Process Spawning Rundll32 - GuLoader Activity

Detects the execution of installed GuLoader malware on the host. GuLoader is initiating network connections via the rundll32.exe process that is spawned via a browser parent(injected) process.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injectiondetection.emerging-threats
kostastsaleMon Aug 072023
Emerging Threathightest

IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32

Detects RunDLL32.exe executing a single digit DLL named "1.dll" with the export function "DllRegisterServer". This behaviour was often seen used by malware and especially IcedID

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Aug 312023
Emerging Threathightest

Potential Pikabot C2 Activity

Detects the execution of rundll32 that leads to an external network connection. The malware Pikabot has been seen to use this technique to initiate C2-communication through hard-coded Windows binaries.

WindowsNetwork Connection
TA0011 · Command and ControlT1573 · Encrypted Channeldetection.emerging-threats
Andreas Braathen (mnemonic.io)Fri Oct 272023
Emerging Threatmediumtest

Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE

Detects the execution of concatenated commands via "cmd.exe". Pikabot often executes a combination of multiple commands via the command handler "cmd /c" in order to download and execute additional payloads. Commands such as "curl", "wget" in order to download extra payloads. "ping" and "timeout" are abused to introduce delays in the command execution and "Rundll32" is also used to execute malicious DLL files. In the observed Pikabot infections, a combination of the commands described above are used to orchestrate the download and execution of malicious DLL files.

WindowsProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlTA0002 · ExecutionT1059.003 · Windows Command Shell+3
Alejandro HouspanossianTue Jan 022023
Emerging Threathightest

Potential Pikabot Discovery Activity

Detects system discovery activity carried out by Pikabot, such as incl. network, user info and domain groups. The malware Pikabot has been seen to use this technique as part of its C2-botnet registration with a short collection time frame (less than 1 minute).

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration DiscoveryT1049 · System Network Connections DiscoveryT1087 · Account Discovery+1
Andreas Braathen (mnemonic.io)Fri Oct 272023