Rule Library

Sigma Rules

14 rules found for "Beyu Denis"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectioncriticaltest

Webshell Remote Command Execution

Detects possible command execution by web application/web shell

Linuxauditd
TA0003 · PersistenceT1505.003 · Web Shell
Ilyas Ochkov+2Sat Oct 12linux
Detectionmediumtest

Potential Webshell Creation On Static Website

Detects the creation of files with certain extensions on a static web site. This can be indicative of potential uploads of a web shell.

WindowsFile Event
TA0003 · PersistenceT1505.003 · Web Shell
Beyu Denis+3Tue Oct 22windows
Detectionmediumtest

Uncommon Child Process Of BgInfo.EXE

Detects uncommon child processes of "BgInfo.exe" which could be a sign of potential abuse of the binary to proxy execution via external VBScript

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Nasreddine Bencherchali (Nextron Systems)+2Sat Oct 26windows
Detectionmediumtest

Potential Binary Proxy Execution Via Cdb.EXE

Detects usage of "cdb.exe" to launch arbitrary processes or commands from a debugger script file

WindowsProcess Creation
TA0002 · ExecutionT1106 · Native APITA0005 · Defense EvasionT1218 · System Binary Proxy Execution+1
Beyu Denis+2Sat Oct 26windows
Detectionmediumtest

Potential Application Whitelisting Bypass via Dnx.EXE

Detects the execution of Dnx.EXE. The Dnx utility allows for the execution of C# code. Attackers might abuse this in order to bypass application whitelisting.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1027.004 · Compile After Delivery
Beyu Denis+1Sat Oct 26windows
Detectionmediumtest

Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE

Detects execution of arbitrary DLLs or unsigned code via a ".csproj" files via Dotnet.EXE.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+1Sun Oct 18windows
Detectionmediumtest

New Capture Session Launched Via DXCap.EXE

Detects the execution of "DXCap.EXE" with the "-c" flag, which allows a user to launch any arbitrary binary or windows package through DXCap itself. This can be abused to potentially bypass application whitelisting.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+2Sat Oct 26windows
Detectionhightest

Devtoolslauncher.exe Executes Specified Binary

The Devtoolslauncher.exe executes other binary

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+2Sat Oct 12windows
Detectionmediumtest

Execute Files with Msdeploy.exe

Detects file execution using the msdeploy.exe lolbin

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+1Sun Oct 18windows
Detectionhightest

OpenWith.exe Executes Specified Binary

The OpenWith.exe executes other binary

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Beyu Denis+2Sat Oct 12windows
Detectionmediumtest

New DLL Registered Via Odbcconf.EXE

Detects execution of "odbcconf" with "REGSVR" in order to register a new DLL (equivalent to running regsvr32). Attackers abuse this to install and run malicious DLLs.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Kirill Kiryanov+4Mon May 22windows
Detectionmediumtest

Response File Execution Via Odbcconf.EXE

Detects execution of "odbcconf" with the "-f" flag in order to load a response file which might contain a malicious action.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.008 · Odbcconf
Kirill Kiryanov+4Mon May 22windows
Detectionhightest

Potential Arbitrary File Download Using Office Application

Detects potential arbitrary file download using a Microsoft Office application

WindowsProcess Creation
TA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)+2Tue May 17windows
Detectionmediumtest

Screen Capture Activity Via Psr.EXE

Detects execution of Windows Problem Steps Recorder (psr.exe), a utility used to record the user screen and clicks.

WindowsProcess Creation
TA0009 · CollectionT1113 · Screen Capture
Beyu Denis+1Sat Oct 12windows