Rule Library

Sigma Rules

3 rules found for "Nounou Mbeiri"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

DPAPI Backup Keys And Certificate Export Activity IOC

Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.

WindowsFile Event
TA0006 · Credential AccessT1555 · Credentials from Password StoresT1552.004 · Private Keys
Nounou Mbeiri+1Wed Jun 26windows
Detectionhightest

DSInternals Suspicious PowerShell Cmdlets

Detects execution and usage of the DSInternals PowerShell module. Which can be used to perform what might be considered as suspicious activity such as dumping DPAPI backup keys or manipulating NTDS.DIT files. The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Nasreddine Bencherchali (Nextron Systems)+1Wed Jun 26windows
Detectionhighexperimental

PUA - Restic Backup Tool Execution

Detects the execution of the Restic backup tool, which can be used for data exfiltration. Threat actors may leverage Restic to back up and exfiltrate sensitive data to remote storage locations, including cloud services. If not legitimately used in the enterprise environment, its presence may indicate malicious activity.

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative ProtocolT1567.002 · Exfiltration to Cloud Storage
Nounou Mbeiri+1Fri Oct 17windows