Rule Library

Sigma Rules

431 rules found for "François Hubaut"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Suspicious Use of /dev/tcp

Detects suspicious command with /dev/tcp

Linux
TA0043 · Reconnaissance
François HubautFri Dec 10linux
Detectionmediumtest

Successful IIS Shortname Fuzzing Scan

When IIS uses an old .Net Framework it's possible to enumerate folders with the symbol "~"

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
François HubautWed Oct 06web
Detectionhightest

Java Payload Strings

Detects possible Java payloads in web access logs

Web Server Log
cve.2022-26134cve.2021-26084TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
François Hubaut+2Sat Jun 04web
Detectionhightest

Restricted Software Access By SRP

Detects restricted access to applications by the Software Restriction Policies (SRP) policy

Windowsapplication
TA0008 · Lateral MovementTA0002 · ExecutionTA0005 · Defense EvasionT1072 · Software Deployment Tools
François HubautThu Jan 12windows
Detectionlowtest

Application Uninstalled

An application has been removed. Check if it is critical.

Windowsapplication
TA0040 · ImpactT1489 · Service Stop
François HubautFri Jan 28windows
Detectionmediumtest

Deployment AppX Package Was Blocked By AppLocker

Detects an appx package deployment that was blocked by AppLocker policy.

Windowsappxdeployment-server
TA0005 · Defense Evasion
François HubautWed Jan 11windows
Detectionmediumtest

Deployment Of The AppX Package Was Blocked By The Policy

Detects an appx package deployment that was blocked by the local computer policy. The following events indicate that an AppX package deployment was blocked by a policy: - Event ID 441: The package deployment operation is blocked by the "Allow deployment operations in special profiles" policy - Event ID 442: Deployments to non-system volumes are blocked by the "Disable deployment of Windows Store apps to non-system volumes" policy." - Event ID 453: Package blocked by a platform policy. - Event ID 454: Package blocked by a platform policy.

Windowsappxdeployment-server
TA0005 · Defense Evasion
François HubautWed Jan 11windows
Detectionlowtest

New BITS Job Created Via Bitsadmin

Detects the creation of a new bits job by Bitsadmin

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionlowtest

New BITS Job Created Via PowerShell

Detects the creation of a new bits job by PowerShell

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionmediumtest

BITS Transfer Job Downloading File Potential Suspicious Extension

Detects new BITS transfer job saving local files with potential suspicious extensions

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionmediumtest

Uncommon New Firewall Rule Added In Windows Firewall Exception List

Detects when a rule has been added to the Windows Firewall exception list

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionhightest

New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application

Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location.

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSun Feb 26windows
Detectionmediumtest

New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE

Detects the addition of a new "Allow" firewall rule by the WMI process (WmiPrvSE.EXE). This can occur if an attacker leverages PowerShell cmdlets such as "New-NetFirewallRule", or directly uses WMI CIM classes such as "MSFT_NetFirewallRule".

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François Hubaut+1Fri May 10windows
Detectionhightest

All Rules Have Been Deleted From The Windows Firewall Configuration

Detects when a all the rules have been deleted from the Windows Defender Firewall configuration

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François Hubaut+1Tue Jan 17windows
Detectionmediumtest

A Rule Has Been Deleted From The Windows Firewall Exception List

Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionlowtest

The Windows Defender Firewall Service Failed To Load Group Policy

Detects activity when The Windows Defender Firewall service failed to load Group Policy

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionlowtest

Windows Defender Firewall Has Been Reset To Its Default Configuration

Detects activity when Windows Defender Firewall has been reset to its default configuration

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François HubautSat Feb 19windows
Detectionlowtest

Windows Firewall Settings Have Been Changed

Detects activity when the settings of the Windows firewall have been changed

Windowsfirewall-as
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
François Hubaut+1Sat Feb 19windows
Detectionmediumtest

ETW Logging/Processing Option Disabled On IIS Server

Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François Hubaut+1Sun Oct 06windows
Detectionhightest

HTTP Logging Disabled On IIS Server

Detects changes to of the IIS server configuration in order to disable HTTP logging for successful requests.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François HubautSun Oct 06windows
Detectionmediumtest

New Module Module Added To IIS Server

Detects the addition of a new module to an IIS server.

Windowsiis-configuration
TA0005 · Defense EvasionTA0003 · PersistenceT1562.002 · Disable Windows Event LoggingT1505.004 · IIS Components
François HubautSun Oct 06windows
Detectionmediumtest

Standard User In High Privileged Group

Detect standard users login that are part of high privileged groups such as the Administrator group

Windowslsa-server
TA0006 · Credential AccessTA0004 · Privilege Escalation
François HubautFri Jan 13windows
Detectionlowtest

Add or Remove Computer from DC

Detects the creation or removal of a computer. Can be used to detect attacks such as DCShadow via the creation of a new SPN.

Windowssecurity
TA0005 · Defense Evasionattack.t1207
François HubautFri Oct 14windows
Detectionmediumtest

Device Installation Blocked

Detects an installation of a device that is forbidden by the system policy

Windowssecurity
TA0001 · Initial AccessT1200 · Hardware Additions
François HubautFri Oct 14windows
Detectionhightest

Replay Attack Detected

Detects possible Kerberos Replay Attack on the domain controllers when "KRB_AP_ERR_REPEAT" Kerberos response is sent to the client

Windowssecurity
TA0006 · Credential AccessT1558 · Steal or Forge Kerberos Tickets
François HubautFri Oct 14windows
Detectioninformationaltest

User Logoff Event

Detects a user log-off activity. Could be used for example to correlate information during forensic investigations

Windowssecurity
TA0040 · ImpactT1531 · Account Access Removal
François HubautFri Oct 14windows
Detectioninformationalstable

Windows Update Error

Detects Windows update errors including installation failures and connection issues. Defenders should observe this in case critical update KBs aren't installed.

Windowssystem
TA0040 · ImpactTA0042 · Resource DevelopmentT1584 · Compromise Infrastructure
François HubautSat Dec 04windows
Detectionmediumstable

Windows Defender Threat Detection Service Disabled

Detects when the "Windows Defender Threat Protection" service is disabled.

Windowssystem
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

Important Scheduled Task Deleted

Detects when adversaries try to stop system services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities

Windowstaskscheduler
TA0040 · ImpactT1489 · Service Stop
François HubautFri Jan 13windows
Detectionhighstable

Windows Defender Grace Period Expired

Detects the expiration of the grace period of Windows Defender. This means protection against viruses, spyware, and other potentially unwanted software is disabled.

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhighstable

Windows Defender Malware And PUA Scanning Disabled

Detects disabling of the Windows Defender feature of scanning for malware and other potentially unwanted software

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhighstable

Windows Defender Real-time Protection Disabled

Detects disabling of Windows Defender Real-time Protection. As this event doesn't contain a lot of information on who initiated this action you might want to reduce it to a "medium" level if this occurs too many times in your environment

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhighstable

Windows Defender Virus Scanning Feature Disabled

Detects disabling of the Windows Defender virus scanning feature

Windowswindefend
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Ján Trenčanský+1Tue Jul 28windows
Detectionhightest

Remote Thread Creation Ttdinject.exe Proxy

Detects a remote thread creation of Ttdinject.exe used as proxy

WindowsRemote Thread Creation
TA0005 · Defense EvasionT1127 · Trusted Developer Utilities Proxy Execution
François HubautMon May 16windows
Detectionmediumtest

Creation Of a Suspicious ADS File Outside a Browser Download

Detects the creation of a suspicious ADS (Alternate Data Stream) file by software other than browsers

WindowsAlternate Data Stream
TA0005 · Defense Evasion
François HubautSat Oct 22windows
Detectionmediumtest

AppX Package Installation Attempts Via AppInstaller.EXE

Detects DNS queries made by "AppInstaller.EXE". The AppInstaller is the default handler for the "ms-appinstaller" URI. It attempts to load/install a package from the referenced URL

WindowsDNS Query
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautWed Nov 24windows
Detectionlowtest

DNS Server Discovery Via LDAP Query

Detects DNS server discovery via LDAP query requests from uncommon applications

WindowsDNS Query
TA0007 · DiscoveryT1482 · Domain Trust Discovery
François HubautSat Aug 20windows
Detectionmediumtest

DNS Query To Remote Access Software Domain From Non-Browser App

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
François Hubaut+1Mon Jul 11windows
Detectionhightest

DNS Query Tor .Onion Address - Sysmon

Detects DNS queries to an ".onion" address related to Tor routing networks

WindowsDNS Query
TA0011 · Command and ControlT1090.003 · Multi-hop Proxy
François HubautSun Feb 20windows
Detectionmediumtest

Access To Potentially Sensitive Sysvol Files By Uncommon Applications

Detects file access requests to potentially sensitive files hosted on the Windows Sysvol share.

Windowsfile_access
TA0006 · Credential AccessT1552.006 · Group Policy Preferences
François HubautThu Dec 21windows
Detectionlowexperimental

Suspicious File Access to Browser Credential Storage

Detects file access to browser credential storage paths by non-browser processes, which may indicate credential access attempts. Adversaries may attempt to access browser credential storage to extract sensitive information such as usernames and passwords or cookies. This behavior is often commonly observed in credential stealing malware.

Windowsfile_access
TA0006 · Credential AccessT1555.003 · Credentials from Web BrowsersTA0007 · DiscoveryT1217 · Browser Information Discovery
François Hubaut+3Thu May 22windows
Detectionmediumtest

Backup Files Deleted

Detects deletion of files with extensions often used for backup files. Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery.

WindowsFile Delete
TA0040 · ImpactT1490 · Inhibit System Recovery
François HubautSun Jan 02windows
Detectionlowtest

TeamViewer Log File Deleted

Detects the deletion of the TeamViewer log files which may indicate an attempt to destroy forensic evidence

WindowsFile Delete
TA0005 · Defense EvasionT1070.004 · File Deletion
François HubautSun Jan 16windows
Detectionmediumtest

Anydesk Temporary Artefact

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautFri Feb 11windows
Detectionmediumtest

New Custom Shim Database Created

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backward compatibility of software as the operating system codebase changes over time.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
François Hubaut+1Wed Dec 29windows
Detectionmediumtest

Suspicious Screensaver Binary File Creation

Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.002 · Screensaver
François HubautWed Dec 29windows
Detectionhightest

Creation Exe for Service with Unquoted Path

Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in a higher level directory within the path, so that Windows will choose the adversary's executable to launch.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.009 · Shortcut Modification
François HubautThu Dec 30windows
Detectionlowtest

Dynamic CSharp Compile Artefact

When C# is compiled dynamically, a .cmdline file will be created as a part of the process. Certain processes are not typically observed compiling C# code, but can do so without touching disk. This can be used to unpack a payload for execution

WindowsFile Event
TA0005 · Defense EvasionT1027.004 · Compile After Delivery
François HubautSun Jan 09windows