Rule Library

Sigma Rules

784 rules found for "Nasreddine Bencherchali (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Copy .DMP/.DUMP Files From Remote Share Via Cmd.EXE

Detects usage of the copy builtin cmd command to copy files with the ".dmp"/".dump" extension from a remote share

WindowsProcess Creation
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Tue Sep 27windows
Detectionhightest

Curl Download And Execute Combination

Adversaries can use curl to download payloads remotely and execute them. Curl is included by default in Windows 10 build 17063 and later.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Sreeman+1Mon Jan 13windows
Detectionmediumtest

Potential Dosfuscation Activity

Detects possible payload obfuscation via the commandline

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
François Hubaut+1Tue Feb 15windows
Detectionmediumtest

Potentially Suspicious CMD Shell Output Redirect

Detects inline Windows shell commands redirecting output via the ">" symbol to a suspicious location. This technique is sometimes used by malicious actors in order to redirect the output of reconnaissance commands such as "hostname" and "dir" to files for future exfiltration.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionmediumtest

Read Contents From Stdin Via Cmd.EXE

Detect the use of "<" to read and potentially execute a file via cmd.exe

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
François Hubaut+1Tue Mar 07windows
Detectionmediumtest

Potential Download/Upload Activity Using Type Command

Detects usage of the "type" command to download/upload data from WebDAV server

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Dec 14windows
Detectionmediumtest

New Generic Credentials Added Via Cmdkey.EXE

Detects usage of "cmdkey.exe" to add generic credentials. As an example, this can be used before connecting to an RDP session via command line interface.

WindowsProcess Creation
TA0006 · Credential AccessT1003.005 · Cached Domain Credentials
François Hubaut+1Fri Feb 03windows
Detectionhightest

Potential Reconnaissance For Cached Credentials Via Cmdkey.EXE

Detects usage of cmdkey to look for cached credentials on the system

WindowsProcess Creation
TA0006 · Credential AccessT1003.005 · Cached Domain Credentials
jmallette+2Wed Jan 16windows
Detectionhightest

Conhost.exe CommandLine Path Traversal

detects the usage of path traversal in conhost.exe indicating possible command/argument confusion/hijacking

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command Shell
Nasreddine Bencherchali (Nextron Systems)Tue Jun 14windows
Detectionhightest

CreateDump Process Dump

Detects uses of the createdump.exe LOLOBIN utility to dump process memory

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)+1Tue Jan 04windows
Detectionhightest

Csc.EXE Execution Form Potentially Suspicious Parent

Detects a potentially suspicious parent of "csc.exe", which could be a sign of payload delivery.

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScriptTA0005 · Defense Evasion+2
Florian Roth (Nextron Systems)+2Mon Feb 11windows
Detectionmediumtest

Active Directory Structure Export Via Csvde.EXE

Detects the execution of "csvde.exe" in order to export organizational Active Directory structure.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1087.002 · Domain Account
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionmediumtest

Potential Cookies Session Hijacking

Detects execution of "curl.exe" with the "-c" flag in order to save cookie data.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionmediumtest

Curl Web Request With Potential Custom User-Agent

Detects execution of "curl.exe" with a potential custom "User-Agent". Attackers can leverage this to download or exfiltrate data via "curl" to a domain that only accept specific "User-Agent" strings

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionmediumtest

File Download From IP URL Via Curl.EXE

Detects file downloads directly from IP address URL using curl.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Oct 18windows
Detectionhightest

Suspicious File Download From IP Via Curl.EXE

Detects potentially suspicious file downloads directly from IP addresses using curl.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionhightest

Suspicious File Download From File Sharing Domain Via Curl.EXE

Detects potentially suspicious file download from file sharing domains using curl.exe

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri May 05windows
Detectionmediumtest

Insecure Proxy/DOH Transfer Via Curl.EXE

Detects execution of "curl.exe" with the "insecure" flag over proxy or DOH.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionmediumtest

Local File Read Using Curl.EXE

Detects execution of "curl.exe" with the "file://" protocol handler in order to read local files.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Thu Jul 27windows
Detectionhightest

Suspicious Curl.EXE Download

Detects a suspicious curl process start on Windows and outputs the requested document to a local file

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Fri Jul 03windows
Detectionhightest

Suspicious CustomShellHost Execution

Detects the execution of CustomShellHost.exe where the child isn't located in 'C:\Windows\explorer.exe'. CustomShellHost is a known LOLBin that can be abused by attackers for defense evasion techniques.

WindowsProcess Creation
TA0005 · Defense EvasionT1216 · System Script Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionhightest

ManageEngine Endpoint Central Dctask64.EXE Potential Abuse

Detects the execution of "dctask64.exe", a signed binary by ZOHO Corporation part of ManageEngine Endpoint Central. This binary can be abused for DLL injection, arbitrary command and process execution.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.001 · Dynamic-link Library Injection
Florian Roth (Nextron Systems)+1Tue Jan 28windows
Detectionmediumtest

DeviceCredentialDeployment Execution

Detects the execution of DeviceCredentialDeployment to hide a process from view.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Aug 19windows
Detectionmediumtest

Potentially Suspicious Child Process Of ClickOnce Application

Detects potentially suspicious child processes of a ClickOnce deployment application

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon Jun 12windows
Detectionmediumtest

Potentially Suspicious Child Process Of DiskShadow.EXE

Detects potentially suspicious child processes of "Diskshadow.exe". This could be an attempt to bypass parent/child relationship detection or application whitelisting rules.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 15windows
Detectionmediumtest

Diskshadow Script Mode - Uncommon Script Extension Execution

Detects execution of "Diskshadow.exe" in script mode to execute an script with a potentially uncommon extension. Initial baselining of the allowed extension list is required.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 15windows
Detectionmediumtest

Diskshadow Script Mode - Execution From Potential Suspicious Location

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag where the script is located in a potentially suspicious location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Fri Sep 15windows
Detectionhightest

DLL Sideloading by VMware Xfer Utility

Detects execution of VMware Xfer utility (VMwareXferlogs.exe) from the non-default directory which may be an attempt to sideload arbitrary DLL

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionhightest

Dllhost.EXE Execution Anomaly

Detects a "dllhost" process spawning with no commandline arguments which is very rare to happen and could indicate process injection activity or malware mimicking similar system processes.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Nasreddine Bencherchali (Nextron Systems)Mon Jun 27windows
Detectionmediumtest

Process Memory Dump Via Dotnet-Dump

Detects the execution of "dotnet-dump" with the "collect" flag. The execution could indicate potential process dumping of critical processes such as LSASS.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Mar 14windows
Detectionhightest

Potential Recon Activity Using DriverQuery.EXE

Detect usage of the "driverquery" utility to perform reconnaissance on installed drivers

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Jan 19windows
Detectionmediumtest

DriverQuery.EXE Execution

Detect usage of the "driverquery" utility. Which can be used to perform reconnaissance on installed drivers

WindowsProcess Creation
TA0007 · Discovery
Nasreddine Bencherchali (Nextron Systems)Thu Jan 19windows
Detectionmediumtest

Potentially Over Permissive Permissions Granted Using Dsacls.EXE

Detects usage of Dsacls to grant over permissive permissions

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionmediumtest

Potential Password Spraying Attempt Using Dsacls.EXE

Detects possible password spraying attempts using Dsacls

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jun 20windows
Detectionhightest

Potential Windows Defender AV Bypass Via Dump64.EXE Rename

Detects when a user is potentially trying to bypass the Windows Defender AV by renaming a tool to dump64.exe and placing it in the Visual Studio folder. Currently the rule is covering only usage of procdump but other utilities can be added in order to increase coverage.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Austin Songer+2Fri Nov 26windows
Detectionmediumtest

DumpMinitool Execution

Detects the use of "DumpMinitool.exe" a tool that allows the dump of process memory via the use of the "MiniDumpWriteDump"

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)+1Wed Apr 06windows
Detectionmediumtest

New Capture Session Launched Via DXCap.EXE

Detects the execution of "DXCap.EXE" with the "-c" flag, which allows a user to launch any arbitrary binary or windows package through DXCap itself. This can be abused to potentially bypass application whitelisting.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+2Sat Oct 26windows
Detectionmediumtest

Explorer Process Tree Break

Detects a command line process that uses explorer.exe to launch arbitrary commands or binaries, which is similar to cmd.exe /c, only it breaks the process tree and makes its parent a new instance of explorer spawning from "svchost"

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Florian Roth (Nextron Systems)+1Sat Jun 29windows
Detectionmediumtest

Remote File Download Via Findstr.EXE

Detects execution of "findstr" with specific flags and a remote share path. This specific set of CLI flags would allow "findstr" to download the content of the file located on the remote share as described in the LOLBAS entry.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionmediumtest

Permission Misconfiguration Reconnaissance Via Findstr.EXE

Detects usage of findstr with the "EVERYONE" or "BUILTIN" keywords. This was seen being used in combination with "icacls" and other utilities to spot misconfigured files or folders permissions.

WindowsProcess Creation
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
Nasreddine Bencherchali (Nextron Systems)Fri Aug 12windows
Detectionmediumtest

Recon Command Output Piped To Findstr.EXE

Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example. Attackers often time use this technique to extract specific information they require in their reconnaissance phase.

WindowsProcess Creation
TA0007 · DiscoveryT1057 · Process Discovery
Nasreddine Bencherchali (Nextron Systems)+1Thu Jul 06windows
Detectionmediumtest

Security Tools Keyword Lookup Via Findstr.EXE

Detects execution of "findstr" to search for common names of security tools. Attackers often pipe the results of recon commands such as "tasklist" or "whoami" to "findstr" in order to filter out the results. This detection focuses on the keywords that the attacker might use as a filter.

WindowsProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 20windows
Detectionlowtest

Insensitive Subfolder Search Via Findstr.EXE

Detects execution of findstr with the "s" and "i" flags for a "subfolder" and "insensitive" search respectively. Attackers sometimes leverage this built-in utility to search the system for interesting files or filter through results of commands.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionmediumtest

Filter Driver Unloaded Via Fltmc.EXE

Detect filter driver unloading activity via fltmc.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator RemovalT1562 · Impair DefensesT1562.002 · Disable Windows Event Logging
Nasreddine Bencherchali (Nextron Systems)Mon Feb 13windows
Detectionhightest

Forfiles.EXE Child Process Masquerading

Detects the execution of "forfiles" from a non-default location, in order to potentially spawn a custom "cmd.exe" from the current working directory.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Nasreddine Bencherchali (Nextron Systems)+1Fri Jan 05windows
Detectionmediumtest

Suspicious Git Clone

Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious

WindowsProcess Creation
TA0043 · Reconnaissanceattack.t1593.003
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03windows
Detectionhightest

Potentially Suspicious GoogleUpdate Child Process

Detects potentially suspicious child processes of "GoogleUpdate.exe"

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Mon May 15windows
Detectionmediumtest

File Decryption Using Gpg4win

Detects usage of Gpg4win to decrypt files

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Aug 09windows