Rule Library

Sigma Rules

6 rules found for "Luc Génaux"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowexperimental

Linux Setgid Capability Set on a Binary via Setcap Utility

Detects the use of the 'setcap' utility to set the 'setgid' capability (cap_setgid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of group IDs (GIDs), including setting its current GID to a value that would otherwise be restricted (i.e. GID 0, the root group). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1548 · Abuse Elevation Control Mechanism+1
Luc GénauxSat Jan 24linux
Detectionlowexperimental

Linux Setuid Capability Set on a Binary via Setcap Utility

Detects the use of the 'setcap' utility to set the 'setuid' capability (cap_setuid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of user IDs (UIDs), including setting its current UID to a value that would otherwise be restricted (i.e. UID 0, the root user). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1548 · Abuse Elevation Control Mechanism+1
Luc GénauxSat Jan 24linux
Detectionhightest

Load Of RstrtMgr.DLL By A Suspicious Process

Detects the load of RstrtMgr DLL (Restart Manager) by a suspicious process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows. It could also be used for anti-analysis purposes by shut downing specific processes.

WindowsImage Load (DLL)
TA0040 · ImpactTA0005 · Defense EvasionT1486 · Data Encrypted for ImpactT1562.001 · Disable or Modify Tools
Luc GénauxTue Nov 28windows
Detectionlowtest

Load Of RstrtMgr.DLL By An Uncommon Process

Detects the load of RstrtMgr DLL (Restart Manager) by an uncommon process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (e.g. Conti ransomware, Cactus ransomware). It has also recently been seen used by the BiBi wiper for Windows. It could also be used for anti-analysis purposes by shut downing specific processes.

WindowsImage Load (DLL)
TA0040 · ImpactTA0005 · Defense EvasionT1486 · Data Encrypted for ImpactT1562.001 · Disable or Modify Tools
Luc GénauxTue Nov 28windows
Detectionmediumexperimental

Potential PowerShell Console History Access Attempt via History File

Detects potential access attempts to the PowerShell console history directly via history file (ConsoleHost_history.txt). This can give access to plaintext passwords used in PowerShell commands or used for general reconnaissance.

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Files
Luc GénauxThu Apr 03windows
Detectionhightest

Potential Defense Evasion Via Right-to-Left Override

Detects the presence of the "u202+E" character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence. This character is used as an obfuscation and masquerading techniques by adversaries to trick users into opening malicious files.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Micah Babinski+2Wed Feb 15windows