Rule Library

Sigma Rules

7 rules found for "Ensar Şamil"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Time Travel Debugging Utility Usage - Image

Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0006 · Credential AccessT1218 · System Binary Proxy ExecutionT1003.001 · LSASS Memory
Ensar Şamil+1Tue Oct 06windows
Detectionmediumtest

SyncAppvPublishingServer Bypass Powershell Restriction - PS Module

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

WindowsPowerShell Module
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+1Mon Oct 05windows
Detectionmediumtest

SyncAppvPublishingServer Execution to Bypass Powershell Restriction

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

WindowsPowerShell Script
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+1Mon Oct 05windows
Detectionhightest

Time Travel Debugging Utility Usage

Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1218 · System Binary Proxy ExecutionT1003.001 · LSASS Memory
Ensar Şamil+1Tue Oct 06windows
Detectionhightest

Visual Basic Command Line Compiler Usage

Detects successful code compilation via Visual Basic Command Line Compiler that utilizes Windows Resource to Object Converter.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Delivery
Ensar Şamil+1Wed Oct 07windows
Detectionmediumtest

Malicious PE Execution by Microsoft Visual Studio Debugger

There is an option for a MS VS Just-In-Time Debugger "vsjitdebugger.exe" to launch specified executable and attach a debugger. This option may be used adversaries to execute malicious code by signed verified binary. The debugger is installed alongside with Microsoft Visual Studio package.

WindowsProcess Creation
T1218 · System Binary Proxy ExecutionTA0005 · Defense Evasion
Agro+2Wed Oct 14windows
Detectionmediumtest

COM Object Execution via Xwizard.EXE

Detects the execution of Xwizard tool with the "RunWizard" flag and a GUID like argument. This utility can be abused in order to run custom COM object created in the registry.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Ensar Şamil+2Wed Oct 07windows