Rule Library

Sigma Rules

6 rules found for "Caleb Stewart"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Malicious PowerShell Commandlets - PoshModule

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Module
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Nasreddine Bencherchali (Nextron Systems)Fri Jan 20windows
Detectionhightest

Malicious PowerShell Commandlets - ScriptBlock

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsPowerShell Script
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Sean Metcalf+10Sun Mar 05windows
Detectionhightest

Malicious PowerShell Commandlets - ProcessCreation

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsProcess Creation
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Emerging Threatmediumtest

CVE-2024-1708 - ScreenConnect Path Traversal Exploitation

This detects file modifications to ASPX and ASHX files within the root of the App_Extensions directory, which is allowed by a ZipSlip vulnerability in versions prior to 23.9.8. This occurs during exploitation of CVE-2024-1708.

WindowsFile Event
TA0003 · Persistencecve.2024-1708detection.emerging-threats
Matt Anderson+3Wed Feb 212024
Emerging Threatcriticaltest

CVE-2024-1708 - ScreenConnect Path Traversal Exploitation - Security

This detects file modifications to ASPX and ASHX files within the root of the App_Extensions directory, which is allowed by a ZipSlip vulnerability in versions prior to 23.9.8. This occurs during exploitation of CVE-2024-1708. This requires an Advanced Auditing policy to log a successful Windows Event ID 4663 events and with a SACL set on the directory.

Windowssecurity
TA0001 · Initial AccessTA0003 · Persistencecve.2024-1708detection.emerging-threats
Matt Anderson+2Tue Feb 202024
Emerging Threatmediumtest

ScreenConnect User Database Modification

Detects file modifications to the temporary xml user database file indicating local user modification in the ScreenConnect server. This will occur during exploitation of the ScreenConnect Authentication Bypass vulnerability (CVE-2024-1709) in versions <23.9.8, but may also be observed when making legitimate modifications to local users or permissions.

WindowsFile Event
TA0003 · Persistencecve.2024-1709detection.emerging-threats
Matt Anderson+3Wed Feb 212024