Rule Library

Sigma Rules

5 rules found for "Perez Diego"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Rare Remote Thread Creation By Uncommon Source Image

Detects uncommon processes creating remote threads.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Perez Diego+1Sun Oct 27windows
Detectionmediumtest

Remote Thread Creation By Uncommon Source Image

Detects uncommon processes creating remote threads.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injection
Perez Diego+1Sun Oct 27windows
Detectionhightest

Suspicious Unsigned Dbghelp/Dbgcore DLL Loaded

Detects the load of dbghelp/dbgcore DLL (used to make memory dumps) by suspicious processes. Tools like ProcessHacker and some attacker tradecract use MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity C2 Framework has a module that leverages this API to dump the contents of Lsass.exe and transfer it over the network back to the attacker's machine.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003.001 · LSASS Memory
Perez Diego+2Sun Oct 27windows
Detectionmediumtest

Potential Suspicious PowerShell Keywords

Detects potentially suspicious keywords that could indicate the use of a PowerShell exploitation framework

WindowsPowerShell Script
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Mon Feb 11windows
Threat Huntmediumtest

Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process

Detects the load of dbghelp/dbgcore DLL by a potentially uncommon or potentially suspicious process. The Dbghelp and Dbgcore DLLs export functions that allow for the dump of process memory. Tools like ProcessHacker, Task Manager and some attacker tradecraft use the MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity C2 Framework has a module that leverages this API to dump the contents of Lsass.exe and transfer it over the network back to the attacker's machine. Keep in mind that many legitimate Windows processes and services might load the aforementioned DLLs for debugging or other related purposes. Investigate the CommandLine and the Image location of the process loading the DLL.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003.001 · LSASS Memorydetection.threat-hunting
Perez Diego+2Sun Oct 27windows