Rule Library

Sigma Rules

15 rules found for "Florian Roth (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Threat Huntlowtest

File Creation Date Changed to Another Year

Detects when the file creation time is changed to a year before 2020. Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system. Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity. In order to use this rule in production, it is recommended first baseline normal behavior in your environment and then tune the rule accordingly. Hunting Recommendation: Focus on files with creation times set to years significantly before the current date, especially those in user-writable directories. Correlate with process execution logs to identify the source of the modification and investigate any unsigned or suspicious binaries involved.

WindowsFile Change
T1070.006 · TimestompTA0005 · Defense Evasiondetection.threat-hunting
François Hubaut+1Fri Aug 12windows
Threat Huntlowtest

Network Connection Initiated By PowerShell Process

Detects a network connection that was initiated from a PowerShell process. Often times malicious powershell scripts download additional payloads or communicate back to command and control channels via uncommon ports or IPs. Use this rule as a basis for hunting for anomalies.

WindowsNetwork Connection
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Florian Roth (Nextron Systems)Mon Mar 13windows
Threat Huntmediumtest

Network Connection Initiated From Users\Public Folder

Detects a network connection initiated from a process located in the "C:\Users\Public" folder. Attacker are known to drop their malicious payloads and malware in this directory as its writable by everyone. Use this rule to hunt for potential suspicious or uncommon activity in your environement.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Fri May 31windows
Threat Huntmediumtest

LSASS Access From Program In Potentially Suspicious Folder

Detects process access to LSASS memory with suspicious access flags and from a potentially suspicious folder

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatzdetection.threat-hunting
Florian Roth (Nextron Systems)Sat Nov 27windows
Threat Huntmediumtest

Uncommon GrantedAccess Flags On LSASS

Detects process access to LSASS memory with uncommon access flags 0x410 and 0x01410

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatzdetection.threat-hunting
Florian Roth (Nextron Systems)Sun Mar 13windows
Threat Huntmediumtest

File Download Via Curl.EXE

Detects file download using curl.exe

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Tue Jul 05windows
Threat Huntlowtest

Curl.EXE Execution

Detects a curl process start on Windows, which could indicates a file download from a remote location or a simple web request to a remote server

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transferdetection.threat-hunting
Florian Roth (Nextron Systems)Tue Jul 05windows
Threat Huntmediumtest

Potential Data Exfiltration Via Curl.EXE

Detects the execution of the "curl" process with "upload" flags. Which might indicate potential data exfiltration

WindowsProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer+1
Florian Roth (Nextron Systems)+1Fri Jul 03windows
Threat Huntmediumtest

Potentially Suspicious PowerShell Child Processes

Detects potentially suspicious child processes spawned by PowerShell. Use this rule to hunt for potential anomalies initiating from PowerShell scripts and commands.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.threat-hunting
Florian Roth (Nextron Systems)+1Tue Apr 26windows
Threat Huntmediumstable

DLL Call by Ordinal Via Rundll32.EXE

Detects calls of DLLs exports by ordinal numbers via rundll32.dll.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.threat-hunting
Florian Roth (Nextron Systems)Tue Oct 22windows
Threat Huntmediumtest

Scheduled Task Creation From Potential Suspicious Parent Location

Detects the execution of "schtasks.exe" from a parent that is located in a potentially suspicious location. Multiple malware strains were seen exhibiting a similar behavior in order to achieve persistence.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.005 · Scheduled Task+1
Florian Roth (Nextron Systems)Wed Feb 23windows
Threat Huntmediumtest

Potential CommandLine Obfuscation Using Unicode Characters

Detects potential CommandLine obfuscation using unicode characters. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Informationdetection.threat-hunting
François Hubaut+1Sat Jan 15windows
Threat Huntmediumtest

Potentially Suspicious Compression Tool Parameters

Detects potentially suspicious command line arguments of common data compression tools

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utilitydetection.threat-hunting
Florian Roth (Nextron Systems)+1Tue Oct 15windows
Threat Huntmediumtest

Execution From Webserver Root Folder

Detects a program executing from a web server root folder. Use this rule to hunt for potential interesting activity such as webshell or backdoors

WindowsProcess Creation
TA0003 · PersistenceT1505.003 · Web Shelldetection.threat-hunting
Florian Roth (Nextron Systems)Wed Jan 16windows
Threat Huntmediumtest

Service Binary in User Controlled Folder

Detects the setting of the "ImagePath" value of a service registry key to a path controlled by a non-administrator user such as "\AppData\" or "\ProgramData\". Attackers often use such directories for staging purposes. This rule might also trigger on badly written software, where if an attacker controls an auto starting service, they might achieve persistence or privilege escalation. Note that while ProgramData is a user controlled folder, software might apply strict ACLs which makes them only accessible to admin users. Remove such folders via filters if you experience a lot of noise.

WindowsRegistry Set
TA0005 · Defense EvasionTA0003 · PersistenceT1112 · Modify Registrydetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)+1Mon May 02windows