Rule Library

Sigma Rules

11 rules found for "Micah Babinski"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious External WebDAV Execution

Detects executables launched from external WebDAV shares using the WebDAV Explorer integration, commonly seen in initial access campaigns.

Proxy Log
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing
Ahmed FaroukFri May 10web
Detectionmediumtest

External Remote RDP Logon from Public IP

Detects successful logon from public IP address via RDP. This can indicate a publicly-exposed RDP port.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
Micah Babinski+1Thu Jan 19windows
Detectionhightest

External Remote SMB Logon from Public IP

Detects successful logon from public IP address via SMB. This can indicate a publicly-exposed SMB port.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
Micah Babinski+1Thu Jan 19windows
Detectionhighexperimental

Suspicious File Created by ArcSOC.exe

Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS server, creates a file with suspicious file type, indicating that it may be an executable, script file, or otherwise unusual.

WindowsFile Event
TA0005 · Defense EvasionTA0011 · Command and ControlTA0003 · PersistenceTA0001 · Initial Access+3
Micah BabinskiTue Nov 25windows
Detectionmediumtest

Potential Homoglyph Attack Using Lookalike Characters in Filename

Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters. This is used as an obfuscation and masquerading techniques. Only "perfect" homoglyphs are included; these are characters that are indistinguishable from ASCII characters and thus may make excellent candidates for homoglyph attack characters.

WindowsFile Event
TA0005 · Defense EvasionT1036 · MasqueradingT1036.003 · Rename System Utilities
Micah BabinskiMon May 08windows
Detectionhighexperimental

Suspicious ArcSOC.exe Child Process

Detects script interpreters, command-line tools, and similar suspicious child processes of ArcSOC.exe. ArcSOC.exe is the process name which hosts ArcGIS Server REST services. If an attacker compromises an ArcGIS Server system and uploads a malicious Server Object Extension (SOE), they can send crafted requests to the corresponding service endpoint and remotely execute code from the ArcSOC.exe process.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterT1203 · Exploitation for Client Execution
Micah BabinskiTue Nov 25windows
Detectionhightest

Suspicious Microsoft OneNote Child Process

Detects suspicious child processes of the Microsoft OneNote application. This may indicate an attempt to execute malicious embedded objects from a .one file.

WindowsProcess Creation
T1566 · PhishingT1566.001 · Spearphishing AttachmentTA0001 · Initial Access
Tim Rauch+2Fri Oct 21windows
Detectionmediumtest

PUA - Potential PE Metadata Tamper Using Rcedit

Detects the use of rcedit to potentially alter executable PE metadata properties, which could conceal efforts to rename system utilities for defense evasion.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.003 · Rename System UtilitiesT1036 · MasqueradingT1027.005 · Indicator Removal from Tools+1
Micah BabinskiSun Dec 11windows
Detectionmediumtest

Potential Homoglyph Attack Using Lookalike Characters

Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters. This is used as an obfuscation and masquerading techniques. Only "perfect" homoglyphs are included; these are characters that are indistinguishable from ASCII characters and thus may make excellent candidates for homoglyph attack characters.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1036.003 · Rename System Utilities
Micah BabinskiSun May 07windows
Detectionhightest

Potential Defense Evasion Via Right-to-Left Override

Detects the presence of the "u202+E" character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence. This character is used as an obfuscation and masquerading techniques by adversaries to trick users into opening malicious files.

WindowsProcess Creation
TA0005 · Defense EvasionT1036.002 · Right-to-Left Override
Micah Babinski+2Wed Feb 15windows
Detectionmediumtest

Potentially Suspicious WebDAV LNK Execution

Detects possible execution via LNK file accessed on a WebDAV server.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1204 · User Execution
Micah BabinskiMon Aug 21windows