Rule Library

Sigma Rules

638 rules found for "Florian Roth (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

PUA - AdvancedRun Suspicious Execution

Detects the execution of AdvancedRun utility in the context of the TrustedInstaller, SYSTEM, Local Service or Network Service accounts

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.002 · Create Process with Token
Florian Roth (Nextron Systems)Thu Jan 20windows
Detectionhightest

PUA - Chisel Tunneling Tool Execution

Detects usage of the Chisel tunneling tool via the commandline arguments

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Florian Roth (Nextron Systems)Tue Sep 13windows
Detectionhightest

PUA - CsExec Execution

Detects the use of the lesser known remote execution tool named CsExec a PsExec alternative

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · MalwareTA0002 · ExecutionT1569.002 · Service Execution
Florian Roth (Nextron Systems)Mon Aug 22windows
Detectionhightest

PUA - DefenderCheck Execution

Detects the use of DefenderCheck, a tool to evaluate the signatures used in Microsoft Defender. It can be used to figure out the strings / byte chains used in Microsoft Defender to detect a tool and thus used for AV evasion.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.005 · Indicator Removal from Tools
Florian Roth (Nextron Systems)Tue Aug 30windows
Detectionhightest

PUA - Fast Reverse Proxy (FRP) Execution

Detects the use of Fast Reverse Proxy. frp is a fast reverse proxy to help you expose a local server behind a NAT or firewall to the Internet.

WindowsProcess Creation
TA0011 · Command and ControlT1090 · Proxy
François Hubaut+1Fri Sep 02windows
Detectionhightest

PUA- IOX Tunneling Tool Execution

Detects the use of IOX - a tool for port forwarding and intranet proxy purposes

WindowsProcess Creation
TA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)Sat Oct 08windows
Detectionhightest

PUA - Netcat Suspicious Execution

Detects execution of Netcat. Adversaries may use a non-application layer protocol for communication between host and C2 server or among infected hosts within a network

WindowsProcess Creation
TA0011 · Command and ControlT1095 · Non-Application Layer Protocol
François Hubaut+1Wed Jul 21windows
Detectionhightest

PUA - Ngrok Execution

Detects the use of Ngrok, a utility used for port forwarding and tunneling, often used by threat actors to make local protected services publicly available. Involved domains are bin.equinox.io for download and *.ngrok.io for connections.

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Florian Roth (Nextron Systems)Fri May 14windows
Detectionmediumtest

PUA - NirCmd Execution

Detects the use of NirCmd tool for command execution, which could be the result of legitimate administrative activity

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)+1Mon Jan 24windows
Detectionhightest

PUA - NirCmd Execution As LOCAL SYSTEM

Detects the use of NirCmd tool for command execution as SYSTEM user

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)+1Mon Jan 24windows
Detectionhightest

PUA - NPS Tunneling Tool Execution

Detects the use of NPS, a port forwarding and intranet penetration proxy server

WindowsProcess Creation
TA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)Sat Oct 08windows
Detectionhightest

PUA - NSudo Execution

Detects the use of NSudo tool for command execution

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)+1Mon Jan 24windows
Detectionmediumtest

PUA - Process Hacker Execution

Detects the execution of Process Hacker based on binary metadata information (Image, Hash, Imphash, etc). Process Hacker is a tool to view and manipulate processes, kernel options and other low level options. Threat actors abused older vulnerable versions to manipulate system processes.

WindowsProcess Creation
TA0005 · Defense EvasionTA0007 · DiscoveryTA0003 · PersistenceTA0004 · Privilege Escalation+3
Florian Roth (Nextron Systems)Mon Oct 10windows
Detectionhightest

PUA - RunXCmd Execution

Detects the use of the RunXCmd tool to execute commands with System or TrustedInstaller accounts

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)Mon Jan 24windows
Detectionmediumtest

PUA - System Informer Execution

Detects the execution of System Informer, a task manager tool to view and manipulate processes, kernel options and other low level operations

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationTA0007 · DiscoveryTA0005 · Defense Evasion+3
Florian Roth (Nextron Systems)Mon May 08windows
Detectionhightest

Suspicious Greedy Compression Using Rar.EXE

Detects RAR usage that creates an archive from a suspicious folder, either a system folder or one of the folders often used by attackers for staging purposes

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
X__Junior (Nextron Systems)+1Thu Dec 15windows
Detectionhightest

Process Memory Dump via RdrLeakDiag.EXE

Detects the use of the Microsoft Windows Resource Leak Diagnostic tool "rdrleakdiag.exe" to dump process memory

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Cedric MAURUGEON+3Fri Sep 24windows
Detectionmediumtest

Potential Persistence Attempt Via Run Keys Using Reg.EXE

Detects suspicious command line reg.exe tool adding key to RUN key in Registry

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)+1Mon Jun 28windows
Detectionhightest

Security Service Disabled Via Reg.EXE

Detects execution of "reg.exe" to disable security services such as Windows Defender.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)+2Wed Jul 14windows
Detectionhightest

LSA PPL Protection Disabled Via Reg.EXE

Detects the usage of the "reg.exe" utility to disable PPL protection on the LSA process

WindowsProcess Creation
TA0005 · Defense EvasionT1562.010 · Downgrade Attack
Florian Roth (Nextron Systems)Tue Mar 22windows
Detectionhightest

Disabled Volume Snapshots

Detects commands that temporarily turn off Volume Snapshots

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Thu Jan 28windows
Detectionhightest

Suspicious Windows Defender Registry Key Tampering Via Reg.EXE

Detects the usage of "reg.exe" to tamper with different Windows Defender registry keys in order to disable some important features related to protection and detection

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)+2Tue Mar 22windows
Detectionhightest

Regedit as Trusted Installer

Detects a regedit started with TrustedInstaller privileges or by ProcessHacker.exe

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Florian Roth (Nextron Systems)Thu May 27windows
Detectionhightest

Suspicious Debugger Registration Cmdline

Detects the registration of a debugger for a program that is available in the logon screen (sticky key backdoor).

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.008 · Accessibility Features
Florian Roth (Nextron Systems)+2Fri Sep 06windows
Detectionmediumtest

Potential Regsvr32 Commandline Flag Anomaly

Detects a potential command line flag anomaly related to "regsvr32" in which the "/i" flag is used without the "/n" which should be uncommon.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)Sat Jul 13windows
Detectionhightest

Potentially Suspicious Regsvr32 HTTP IP Pattern

Detects regsvr32 execution to download and install DLLs located remotely where the address is an IP address.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)Tue Jan 11windows
Detectionmediumtest

Potentially Suspicious Regsvr32 HTTP/FTP Pattern

Detects regsvr32 execution to download/install/register new DLLs that are hosted on Web or FTP servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)Wed May 24windows
Detectionhightest

Potentially Suspicious Child Process Of Regsvr32

Detects potentially suspicious child processes of "regsvr32.exe".

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
elhoim+2Thu May 05windows
Detectionmediumtest

Regsvr32 Execution From Potential Suspicious Location

Detects execution of regsvr32 where the DLL is located in a potentially suspicious location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)+1Fri May 26windows
Detectionhightest

Regsvr32 DLL Execution With Suspicious File Extension

Detects the execution of REGSVR32.exe with DLL files masquerading as other files

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)+1Mon Nov 29windows
Detectionmediumtest

Scripting/CommandLine Process Spawned Regsvr32

Detects various command line and scripting engines/processes such as "PowerShell", "Wscript", "Cmd", etc. spawning a "regsvr32" instance.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.010 · Regsvr32
Florian Roth (Nextron Systems)+1Fri May 26windows
Detectionmediumtest

Regsvr32 DLL Execution With Uncommon Extension

Detects a "regsvr32" execution where the DLL doesn't contain a common file extension.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574 · Hijack Execution Flow+1
Florian Roth (Nextron Systems)Wed Jul 17windows
Detectionhightest

Remote Access Tool - Anydesk Execution From Suspicious Folder

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Fri May 20windows
Detectionmediumtest

Remote Access Tool - ScreenConnect Installation Execution

Detects ScreenConnect program starts that establish a remote access to a system.

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Florian Roth (Nextron Systems)Thu Feb 11windows
Detectionmediumtest

Remote Access Tool - ScreenConnect Potential Suspicious Remote Command Execution

Detects potentially suspicious child processes launched via the ScreenConnect client service.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)+1Fri Feb 25windows
Detectionhightest

Renamed AdFind Execution

Detects the use of a renamed Adfind.exe. AdFind continues to be seen across majority of breaches. It is used to domain trust discovery to plan out subsequent steps in the attack chain.

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System DiscoveryT1087.002 · Domain AccountT1482 · Domain Trust Discovery+1
Florian Roth (Nextron Systems)Sun Aug 21windows
Detectionhightest

Renamed AutoIt Execution

Detects the execution of a renamed AutoIt2.exe or AutoIt3.exe. AutoIt is a scripting language and automation tool for Windows systems. While primarily used for legitimate automation tasks, it can be misused in cyber attacks. Attackers can leverage AutoIt to create and distribute malware, including keyloggers, spyware, and botnets. A renamed AutoIt executable is particularly suspicious.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Sun Jun 04windows
Detectionhightest

Potential Defense Evasion Via Rename Of Highly Relevant Binaries

Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities2013-05-009 · CAR 2013-05-009
Matthew Green+2Sat Jun 15windows
Detectionhightest

Renamed CreateDump Utility Execution

Detects uses of a renamed legitimate createdump.exe LOLOBIN utility to dump process memory

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)Tue Sep 20windows
Detectionhightest

Renamed ZOHO Dctask64 Execution

Detects a renamed "dctask64.exe" execution, a signed binary by ZOHO Corporation part of ManageEngine Endpoint Central. This binary can be abused for DLL injection, arbitrary command and process execution.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1036 · MasqueradingT1055.001 · Dynamic-link Library Injection+2
Florian Roth (Nextron Systems)+1Tue Jan 28windows
Detectionhightest

Renamed Mavinject.EXE Execution

Detects the execution of a renamed version of the "Mavinject" process. Which can be abused to perform process injection using the "/INJECTRUNNING" flag

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.001 · Dynamic-link Library InjectionT1218.013 · Mavinject
François Hubaut+1Mon Dec 05windows
Detectionhightest

Renamed PAExec Execution

Detects execution of renamed version of PAExec. Often used by attackers

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Florian Roth (Nextron Systems)+1Sat May 22windows
Detectionmediumtest

Visual Studio NodejsTools PressAnyKey Renamed Execution

Detects renamed execution of "Microsoft.NodejsTools.PressAnyKey.exe", which can be abused as a LOLBIN to execute arbitrary binaries

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+1Tue Apr 11windows
Detectionhightest

Renamed SysInternals DebugView Execution

Detects suspicious renamed SysInternals DebugView execution

WindowsProcess Creation
TA0042 · Resource DevelopmentT1588.002 · Tool
Florian Roth (Nextron Systems)Thu May 28windows
Detectionhightest

Renamed ProcDump Execution

Detects the execution of a renamed ProcDump executable. This often done by attackers or malware in order to evade defensive mechanisms.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Florian Roth (Nextron Systems)+1Mon Nov 18windows
Detectionhightest

Renamed PsExec Service Execution

Detects suspicious launch of a renamed version of the PSEXESVC service with, which is not often used by legitimate administrators

WindowsProcess Creation
TA0002 · Execution
Florian Roth (Nextron Systems)Thu Jul 21windows
Detectionhightest

Renamed Sysinternals Sdelete Execution

Detects the use of a renamed SysInternals Sdelete, which is something an administrator shouldn't do (the renaming)

WindowsProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Florian Roth (Nextron Systems)Tue Sep 06windows
Detectioncriticaltest

Renamed Whoami Execution

Detects the execution of whoami that has been renamed to a different name to avoid detection

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Thu Aug 12windows