Rule Library

Sigma Rules

25 rules found for "Christopher Peacock"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

Potential Bucket Enumeration on AWS

Looks for potential enumeration of AWS buckets via ListBuckets.

AWScloudtrail
TA0007 · DiscoveryT1580 · Cloud Infrastructure DiscoveryT1619 · Cloud Storage Object Discovery
Christopher Peacock+1Fri Jan 06cloud
Detectionmediumtest

Nohup Execution

Detects usage of nohup which could be leveraged by an attacker to keep a process running or break out from restricted environments

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix Shell
Christopher Peacock+1Mon Jun 06linux
Detectionmediumtest

Chmod Suspicious Directory

Detects chmod targeting files in abnormal directory paths.

LinuxProcess Creation
TA0005 · Defense Evasionattack.t1222.002
Christopher Peacock+1Fri Jun 03linux
Detectionmediumstable

Windows Defender Real-Time Protection Failure/Restart

Detects issues with Windows Defender Real-Time Protection features

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)+1Tue Mar 28windows
Detectionmediumtest

SCR File Write Event

Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an ".SCR" file using "rundll32.exe desk.cpl,InstallScreenSaver" for example.

WindowsFile Event
TA0005 · Defense EvasionT1218.011 · Rundll32
Christopher Peacock+1Wed Apr 27windows
Detectionhightest

Potential Startup Shortcut Persistence Via PowerShell.EXE

Detects PowerShell writing startup shortcuts. This procedure was highlighted in Red Canary Intel Insights Oct. 2021, "We frequently observe adversaries using PowerShell to write malicious .lnk files into the startup directory to establish persistence. Accordingly, this detection opportunity is likely to identify persistence mechanisms in multiple threats. In the context of Yellow Cockatoo, this persistence mechanism eventually launches the command-line script that leads to the installation of a malicious DLL"

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Christopher Peacock+1Sun Oct 24windows
Detectionmediumtest

VHD Image Download Via Browser

Detects creation of ".vhd"/".vhdx" files by browser processes. Malware can use mountable Virtual Hard Disk ".vhd" files to encapsulate payloads and evade security controls.

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malware
François Hubaut+2Mon Oct 25windows
Detectionmediumtest

Office Application Initiated Network Connection To Non-Local IP

Detects an office application (Word, Excel, PowerPoint) that initiate a network connection to a non-private IP addresses. This rule aims to detect traffic similar to one seen exploited in CVE-2021-42292. This rule will require an initial baseline and tuning that is specific to your organization.

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Execution
Christopher Peacock+4Wed Nov 10windows
Detectionmediumtest

Outbound Network Connection To Public IP Via Winlogon

Detects a "winlogon.exe" process that initiate network communications with public IP addresses

WindowsNetwork Connection
TA0005 · Defense EvasionTA0002 · ExecutionTA0011 · Command and ControlT1218.011 · Rundll32
Christopher Peacock+1Fri Apr 28windows
Detectionmediumtest

Use of FSharp Interpreters

Detects the execution of FSharp Interpreters "FsiAnyCpu.exe" and "FSi.exe" Both can be used for AWL bypass and to execute F# code via scripts or inline.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Christopher Peacock+1Thu Jun 02windows
Detectionlowtest

Fsutil Drive Enumeration

Attackers may leverage fsutil to enumerated connected drives.

WindowsProcess Creation
TA0007 · DiscoveryT1120 · Peripheral Device Discovery
Christopher Peacock+1Tue Mar 29windows
Detectionmediumtest

Use of Remote.exe

Remote.exe is part of WinDbg in the Windows SDK and can be used for AWL bypass and running remote files.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Christopher Peacock+1Thu Jun 02windows
Detectionmediumtest

Use of VisualUiaVerifyNative.exe

VisualUiaVerifyNative.exe is a Windows SDK that can be used for AWL bypass and is listed in Microsoft's recommended block rules.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Christopher Peacock+1Wed Jun 01windows
Detectionmediumtest

Use of Wfc.exe

The Workflow Command-line Compiler can be used for AWL bypass and is listed in Microsoft's recommended block rules.

WindowsProcess Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
Christopher Peacock+1Wed Jun 01windows
Detectionlowtest

Mstsc.EXE Execution With Local RDP File

Detects potential RDP connection via Mstsc using a local ".rdp" file

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)+1Tue Apr 18windows
Detectionlowtest

Firewall Configuration Discovery Via Netsh.EXE

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
François Hubaut+2Tue Dec 07windows
Detectionhightest

Suspicious Microsoft Office Child Process

Detects a suspicious process spawning from one of the Microsoft Office suite products (Word, Excel, PowerPoint, Publisher, Visio, etc.)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1047 · Windows Management InstrumentationT1204.002 · Malicious File+1
Florian Roth (Nextron Systems)+7Fri Apr 06windows
Detectionmediumtest

Rundll32 InstallScreenSaver Execution

An attacker may execute an application as a SCR File using rundll32.exe desk.cpl,InstallScreenSaver

WindowsProcess Creation
T1218.011 · Rundll32TA0005 · Defense Evasion
Christopher Peacock+2Thu Apr 28windows
Detectionlowtest

Run Once Task Execution as Configured in Registry

This rule detects the execution of Run Once task as configured in the registry

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Avneet Singh+2Sun Oct 18windows
Detectionmediumtest

LOLBIN Execution From Abnormal Drive

Detects LOLBINs executing from an abnormal or uncommon drive such as a mounted ISO.

WindowsProcess Creation
TA0005 · Defense Evasion
Christopher Peacock+3Tue Jan 25windows
Detectionlowtest

Suspicious Network Command

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
François Hubaut+2Tue Dec 07windows
Detectionmediumtest

Potential Process Hollowing Activity

Detects when a memory process image does not match the disk image, indicative of process hollowing.

Windowsprocess_tampering
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1055.012 · Process Hollowing
Christopher Peacock+2Tue Jan 25windows
Detectionmediumtest

Scripted Diagnostics Turn Off Check Enabled - Registry

Detects enabling TurnOffCheck which can be used to bypass defense of MSDT Follina vulnerability

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Christopher Peacock+1Wed Jun 15windows
Emerging Threathightest

Potential NetWire RAT Activity - Registry

Detects registry keys related to NetWire RAT

WindowsRegistry Add
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registrydetection.emerging-threats
Christopher PeacockThu Oct 072021
Threat Huntlowtest

Local Firewall Rules Enumeration Via NetFirewallRule Cmdlet

Detects execution of "Get-NetFirewallRule" or "Show-NetFirewallRule" to enumerate the local firewall rules on a host.

WindowsPowerShell Module
detection.threat-huntingTA0007 · DiscoveryT1518.001 · Security Software DiscoveryT1016 · System Network Configuration Discovery
Christopher Peacock+1Thu Jul 13windows