Rule Library

Sigma Rules

10 rules found for "Janantha Marasinghe"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

SES Identity Has Been Deleted

Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities

AWScloudtrail
TA0005 · Defense EvasionT1070 · Indicator Removal
Janantha MarasingheTue Dec 13cloud
Detectionhightest

Discovery Using AzureHound

Detects AzureHound (A BloodHound data collector for Microsoft Azure) activity via the default User-Agent that is used during its operation after successful authentication.

Azuresigninlogs
TA0007 · DiscoveryT1087.004 · Cloud AccountT1526 · Cloud Service Discovery
Janantha MarasingheSun Nov 27cloud
Detectionmediumtest

Rclone Activity via Proxy

Detects the use of rclone, a command-line program to manage files on cloud storage, via its default user-agent string

Proxy Log
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Janantha MarasingheTue Oct 18web
Detectionmediumtest

Suspicious Network Connection to IP Lookup Service APIs

Detects external IP address lookups by non-browser processes via services such as "api.ipify.org". This could be indicative of potential post compromise internet test activity.

WindowsNetwork Connection
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
Janantha Marasinghe+1Mon Apr 24windows
Detectionhightest

Audit Policy Tampering Via Auditpol

Threat actors can use auditpol binary to change audit policy configuration to impair detection capability. This can be carried out by selectively disabling/removing certain audit policies as well as restoring a custom policy owned by the threat actor.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
Janantha MarasingheTue Feb 02windows
Detectionmediumtest

Cloudflared Tunnel Execution

Detects execution of the "cloudflared" tool to connect back to a tunnel. This was seen used by threat actors to maintain persistence and remote access to compromised networks.

WindowsProcess Creation
TA0011 · Command and ControlT1102 · Web ServiceT1090 · ProxyT1572 · Protocol Tunneling
Janantha Marasinghe+1Wed May 17windows
Detectionhightest

Microsoft IIS Service Account Password Dumped

Detects the Internet Information Services (IIS) command-line tool, AppCmd, being used to list passwords

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+2Tue Nov 08windows
Detectionhightest

PUA - AdFind Suspicious Execution

Detects AdFind execution with common flags seen used during attacks

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System DiscoveryT1087.002 · Domain AccountT1482 · Domain Trust Discovery+2
Janantha Marasinghe+3Tue Feb 02windows
Detectionmediumtest

Potential Suspicious Activity Using SeCEdit

Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy

WindowsProcess Creation
TA0009 · CollectionTA0007 · DiscoveryTA0003 · PersistenceTA0005 · Defense Evasion+16
Janantha MarasingheFri Nov 18windows
Detectionlowtest

Virtualbox Driver Installation or Starting of VMs

Adversaries can carry out malicious operations using a virtual instance to avoid detection. This rule is built to detect the registration of the Virtualbox driver or start of a Virtualbox VM.

WindowsProcess Creation
TA0005 · Defense EvasionT1564.006 · Run Virtual InstanceT1564 · Hide Artifacts
Janantha MarasingheSat Sep 26windows