Rule Library

Sigma Rules

477 rules found for "François Hubaut"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Use of UltraVNC Remote Access Software

An adversary may use legitimate desktop support and remote access software,to establish an interactive command and control channel to target systems within networks

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
François HubautSun Oct 02windows
Detectionhightest

Uninstall Crowdstrike Falcon Sensor

Adversaries may disable security tools to avoid possible detection of their tools and activities by uninstalling Crowdstrike Falcon

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautMon Jul 12windows
Detectionmediumtest

Windows Credential Manager Access via VaultCmd

List credentials currently stored in Windows Credential Manager via the native Windows utility vaultcmd.exe

WindowsProcess Creation
TA0006 · Credential AccessT1555.004 · Windows Credential Manager
François HubautFri Apr 08windows
Detectionhightest

Use of W32tm as Timer

When configured with suitable command line arguments, w32tm can act as a delay mechanism

WindowsProcess Creation
TA0007 · DiscoveryT1124 · System Time Discovery
François HubautSun Sep 25windows
Detectionhightest

All Backups Deleted Via Wbadmin.EXE

Detects the deletion of all backups or system state backups via "wbadmin.exe". This technique is used by numerous ransomware families and actors. This may only be successful on server platforms that have Windows Backup enabled.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
François Hubaut+1Mon Dec 13windows
Detectionmediumtest

Windows Backup Deleted Via Wbadmin.EXE

Detects the deletion of backups or system state backups via "wbadmin.exe". This technique is used by numerous ransomware families and actors. This may only be successful on server platforms that have Windows Backup enabled.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
François Hubaut+1Mon Dec 13windows
Detectionhightest

Sensitive File Dump Via Wbadmin.EXE

Detects the dump of highly sensitive files such as "NTDS.DIT" and "SECURITY" hive. Attackers can leverage the "wbadmin" utility in order to dump sensitive files that might contain credential or sensitive information.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionmediumtest

File Recovery From Backup Via Wbadmin.EXE

Detects the recovery of files from backups via "wbadmin.exe". Attackers can restore sensitive files such as NTDS.DIT or Registry Hives from backups in order to potentially extract credentials.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionhightest

Sensitive File Recovery From Backup Via Wbadmin.EXE

Detects the dump of highly sensitive files such as "NTDS.DIT" and "SECURITY" hive. Attackers can leverage the "wbadmin" utility in order to dump sensitive files that might contain credential or sensitive information.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionlowtest

Suspicious Where Execution

Adversaries may enumerate browser bookmarks to learn more about compromised hosts. Browser bookmarks may reveal personal information about users (ex: banking sites, interests, social media, etc.) as well as details about internal network resources such as servers, tools/dashboards, or other related infrastructure.

WindowsProcess Creation
TA0007 · DiscoveryT1217 · Browser Information Discovery
François Hubaut+1Mon Dec 13windows
Detectionmediumtest

Install New Package Via Winget Local Manifest

Detects usage of winget to install applications via manifest file. Adversaries can abuse winget to download payloads remotely and execute them. The manifest option enables you to install an application by passing in a YAML file directly to the client. Winget can be used to download and install exe, msi or msix files later.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Sreeman+2Tue Apr 21windows
Detectionmediumtest

Compress Data and Lock With Password for Exfiltration With WINZIP

An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party utilities

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
François HubautTue Jul 27windows
Detectionmediumexperimental

Wlrmdr.EXE Uncommon Argument Or Child Process

Detects the execution of "Wlrmdr.exe" with the "-u" command line flag which allows anything passed to it to be an argument of the ShellExecute API, which would allow an attacker to execute arbitrary binaries. This detection also focuses on any uncommon child processes spawned from "Wlrmdr.exe" as a supplement for those that posses "ParentImage" telemetry.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François Hubaut+1Wed Feb 16windows
Detectionhightest

Potential Windows Defender Tampering Via Wmic.EXE

Detects potential tampering with Windows Defender settings such as adding exclusion using wmic

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1047 · Windows Management InstrumentationT1562 · Impair Defenses
François HubautSun Dec 11windows
Detectionlowtest

Local Groups Reconnaissance Via Wmic.EXE

Detects the execution of "wmic" with the "group" flag. Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.

WindowsProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
François HubautSun Dec 12windows
Detectionmediumtest

Process Reconnaissance Via Wmic.EXE

Detects the execution of "wmic" with the "process" flag, which adversary might use to list processes running on the compromised host or list installed software hotfixes and patches.

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
François HubautSat Jan 01windows
Detectionmediumtest

Service Reconnaissance Via Wmic.EXE

An adversary might use WMI to check if a certain remote service is running on a remote device. When the test completes, a service information will be displayed on the screen if it exists. A common feedback message is that "No instance(s) Available" if the service queried is not running. A common error message is "Node - (provided IP or default) ERROR Description =The RPC server is unavailable" if the provided remote host is unreachable

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
François Hubaut+1Tue Feb 14windows
Detectionmediumtest

WMIC Remote Command Execution

Detects the execution of WMIC to query information on a remote system

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
François Hubaut+1Tue Feb 14windows
Detectionmediumtest

Application Removed Via Wmic.EXE

Detects the removal or uninstallation of an application via "Wmic.EXE".

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation
François HubautFri Jan 28windows
Detectionhightest

Removal Of AMSI Provider Registry Keys

Detects the deletion of AMSI provider registry key entries in HKLM\Software\Microsoft\AMSI. This technique could be used by an attacker in order to disable AMSI inspection.

WindowsRegistry Delete
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
François HubautMon Jun 07windows
Detectionhightest

Registry Persistence Mechanisms in Recycle Bin

Detects persistence registry keys for Recycle Bin

WindowsRegistry Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547 · Boot or Logon Autostart Execution
François HubautThu Nov 18windows
Detectionhightest

Registry Persistence via Service in Safe Mode

Detects the modification of the registry to allow a driver or service to persist in Safe Mode.

WindowsRegistry Set
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
François HubautMon Apr 04windows
Detectionmediumtest

Add Port Monitor Persistence in Registry

Adversaries may use port monitors to run an attacker supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set through the AddMonitor API call to set a DLL to be loaded at startup.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.010 · Port Monitors
François HubautThu Dec 30windows
Detectionmediumtest

Allow RDP Remote Assistance Feature

Detect enable rdp feature to allow specific user to rdp connect on the targeted machine

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Aug 19windows
Detectionmediumtest

Classes Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

Common Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+7Fri Oct 25windows
Detectionmediumtest

CurrentControlSet Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

CurrentVersion Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

CurrentVersion NT Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

Internet Explorer Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

Office Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

Session Manager Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup FolderT1546.009 · AppCert DLLs
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

System Scripts Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

WinSock2 Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

Wow6432Node CurrentVersion Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

Wow6432Node Classes Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionmediumtest

Wow6432Node Windows NT CurrentVersion Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Victor Sergeev+6Fri Oct 25windows
Detectionhightest

Bypass UAC Using DelegateExecute

Bypasses User Account Control using a fileless method

WindowsRegistry Set
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account Control
François HubautWed Jan 05windows
Detectionhightest

Bypass UAC Using Event Viewer

Bypasses User Account Control using Event Viewer and a relevant Windows Registry modification

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.010 · Port Monitors
François HubautWed Jan 05windows
Detectionhightest

Bypass UAC Using SilentCleanup Task

Detects the setting of the environement variable "windir" to a non default value. Attackers often abuse this variable in order to trigger a UAC bypass via the "SilentCleanup" task. The SilentCleanup task located in %windir%\system32\cleanmgr.exe is an auto-elevated task that can be abused to elevate any file with administrator privileges without prompting UAC.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548.002 · Bypass User Account Control
François Hubaut+1Thu Jan 06windows
Detectionhightest

Default RDP Port Changed to Non Standard Port

Detects changes to the default RDP port. Remote desktop is a common feature in operating systems. It allows a user to log into a remote system using an interactive session with a graphical user interface. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.010 · Port Monitors
François HubautSat Jan 01windows
Detectionmediumtest

IE Change Domain Zone

Hides the file extension through modification of the registry

WindowsRegistry Set
TA0003 · PersistenceT1137 · Office Application Startup
François HubautSat Jan 22windows
Detectionhightest

Change Winevt Channel Access Permission Via Registry

Detects tampering with the "ChannelAccess" registry key in order to change access to Windows event channel.

WindowsRegistry Set
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
François HubautSat Sep 17windows
Detectionhightest

Running Chrome VPN Extensions via the Registry 2 VPN Extension

Running Chrome VPN Extensions via the Registry install 2 vpn extension

WindowsRegistry Set
TA0001 · Initial AccessTA0003 · PersistenceT1133 · External Remote Services
François HubautTue Dec 28windows
Detectionhightest

Service Binary in Suspicious Folder

Detect the creation of a service with a service binary located in a suspicious directory

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Florian Roth (Nextron Systems)+1Mon May 02windows
Detectionmediumtest

Potential Registry Persistence Attempt Via DbgManagedDebugger

Detects the addition of the "Debugger" value to the "DbgManagedDebugger" key in order to achieve persistence. Which will get invoked when an application crashes

WindowsRegistry Set
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1574 · Hijack Execution Flow
François HubautSun Aug 07windows
Detectionmediumtest

Disable Administrative Share Creation at Startup

Administrative shares are hidden network shares created by Microsoft Windows NT operating systems that grant system administrators remote access to every disk volume on a network-connected system

WindowsRegistry Set
TA0005 · Defense EvasionT1070.005 · Network Share Connection Removal
François HubautSun Jan 16windows
Detectionmediumtest

Disable Microsoft Defender Firewall via Registry

Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage

WindowsRegistry Set
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSun Jan 09windows