Rule Library

Sigma Rules

13 rules found for "Andreas Hunkeler"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

BPFtrace Unsafe Option Usage

Detects the usage of the unsafe bpftrace option

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix Shell
Andreas HunkelerFri Feb 11linux
Detectionhightest

Suspicious Shells Spawn by Java Utility Keytool

Detects suspicious shell spawn from Java utility keytool process (e.g. adselfservice plus exploitation)

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas HunkelerWed Dec 22windows
Detectionhightest

Suspicious Processes Spawned by Java.EXE

Detects suspicious processes spawned from a Java host process which could indicate a sign of exploitation (e.g. log4j)

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Fri Dec 17windows
Detectionmediumtest

Shell Process Spawned by Java.EXE

Detects shell spawned from Java host process, which could be a sign of exploitation (e.g. log4j exploitation)

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Fri Dec 17windows
Detectionmediumtest

Harvesting Of Wifi Credentials Via Netsh.EXE

Detect the harvesting of wifi credentials using netsh.exe

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Andreas Hunkeler+1Mon Apr 20windows
Detectionmediumtest

Potential Defense Evasion Via Binary Rename

Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Matthew Green+4Sat Jun 15windows
Detectionhightest

Service DACL Abuse To Hide Services Via Sc.EXE

Detects usage of the "sc.exe" utility adding a new service with special permission seen used by threat actors which makes the service hidden and unremovable.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.011 · Services Registry Permissions Weakness
Andreas HunkelerMon Dec 20windows
Detectionhighstable

Shadow Copies Deletion Using Operating Systems Utilities

Shadow Copies deletion using operating systems utilities

WindowsProcess Creation
TA0005 · Defense EvasionTA0040 · ImpactT1070 · Indicator RemovalT1490 · Inhibit System Recovery
Florian Roth (Nextron Systems)+5Tue Oct 22windows
Detectionhightest

Suspicious Processes Spawned by WinRM

Detects suspicious processes including shells spawnd from WinRM host process

WindowsProcess Creation
T1190 · Exploit Public-Facing ApplicationTA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege Escalation
Andreas Hunkeler+1Thu May 20windows
Detectionmediumtest

New PortProxy Registry Entry Added

Detects the modification of the PortProxy registry key which is used for port forwarding.

WindowsRegistry Event
TA0008 · Lateral MovementTA0005 · Defense EvasionTA0011 · Command and ControlT1090 · Proxy
Andreas HunkelerTue Jun 22windows
Detectionhightest

New File Association Using Exefile

Detects the abuse of the exefile handler in new file association. Used for bypass of security products.

WindowsRegistry Set
TA0005 · Defense Evasion
Andreas HunkelerFri Nov 19windows
Emerging Threathightest

Potential ACTINIUM Persistence Activity

Detects specific process parameters as used by ACTINIUM scheduled task persistence creation.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053 · Scheduled Task/Job+2
Andreas HunkelerMon Feb 072022
Threat Huntmediumtest

.Class Extension URI Ending Request

Detects requests to URI ending with the ".class" extension in proxy logs. This could rules can be used to hunt for potential downloads of Java classes as seen for example in Log4shell exploitation attacks against Log4j.

Proxy Log
TA0001 · Initial Accessdetection.threat-hunting
Andreas HunkelerTue Dec 21web