Rule Library

Sigma Rules

5 rules found for "Daniel Koifman (KoifSec)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Github Self-Hosted Runner Execution

Detects GitHub self-hosted runners executing workflows on local infrastructure that could be abused for persistence and code execution. Shai-Hulud is an npm supply chain worm targeting CI/CD environments. It installs runners on compromised systems to maintain access after credential theft, leveraging their access to secrets and internal networks.

WindowsProcess Creation
TA0011 · Command and ControlT1102.002 · Bidirectional CommunicationT1071 · Application Layer Protocol
Daniel Koifman (KoifSec)Sat Nov 29windows
Detectionmediumexperimental

RDP Enable or Disable via Win32_TerminalServiceSetting WMI Class

Detects enabling or disabling of Remote Desktop Protocol (RDP) using alternate methods such as WMIC or PowerShell. In PowerShell one-liner commands, the "SetAllowTSConnections" method of the "Win32_TerminalServiceSetting" class may be used to enable or disable RDP. In WMIC, the "rdtoggle" alias or "Win32_TerminalServiceSetting" class may be used for the same purpose.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.001 · Remote Desktop ProtocolTA0002 · ExecutionT1047 · Windows Management Instrumentation
Daniel Koifman (KoifSec)+1Sat Nov 15windows
Detectionmediumexperimental

Windows Recovery Environment Disabled Via Reagentc

Detects attempts to disable windows recovery environment using Reagentc. ReAgentc.exe is a command-line tool in Windows used to manage the Windows Recovery Environment (WinRE). It allows users to enable, disable, and configure WinRE, which is used for troubleshooting and repairing common boot issues.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Daniel Koifman (KoifSec)+1Thu Jul 31windows
Detectionmediumexperimental

Registry Manipulation via WMI Stdregprov

Detects the usage of wmic.exe to manipulate Windows registry via the WMI StdRegProv class. This behaviour could be potentially suspicious because it uses an alternative method to modify registry keys instead of legitimate registry tools like reg.exe or regedit.exe. Attackers specifically choose this technique to evade detection and bypass security monitoring focused on traditional registry modification commands.

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense EvasionTA0007 · Discovery+3
Daniel Koifman (KoifSec)Wed Jul 30windows
Detectionmediumexperimental

Password Set to Never Expire via WMI

Detects the use of wmic.exe to modify user account settings and explicitly disable password expiration.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1047 · Windows Management Instrumentation+1
Daniel Koifman (KoifSec)Wed Jul 30windows