Rule Library

Sigma Rules

13 rules found for "Sander Wiebing"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Exports Registry Key To an Alternate Data Stream

Exports the target Registry key and hides it in the specified alternate data stream.

WindowsAlternate Data Stream
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Oddvar Moe+2Wed Oct 07windows
Detectionmediumtest

Files With System Process Name In Unsuspected Locations

Detects the creation of an executable with a system process name in folders other than the system ones (System32, SysWOW64, etc.). It is highly recommended to perform an initial baseline before using this rule in production.

WindowsFile Event
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Sander Wiebing+2Tue May 26windows
Detectionmediumtest

New Firewall Rule Added Via Netsh.EXE

Detects the addition of a new rule to the Windows firewall via netsh

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System FirewallS0246 · S0246
Markus Neis+1Tue Jan 29windows
Detectionhightest

Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE

Detects Netsh command execution that whitelists a program located in a suspicious location in the Windows Firewall

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Sander Wiebing+3Mon May 25windows
Detectionhightest

RDP Connection Allowed Via Netsh.EXE

Detects usage of the netsh command to open and allow connections to port 3389 (RDP). As seen used by Sarwent Malware

WindowsProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Sander WiebingSat May 23windows
Detectionhightest

Exports Critical Registry Keys To a File

Detects the export of a crital Registry key to a file.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1012 · Query Registry
Oddvar Moe+2Mon Oct 12windows
Detectionlowtest

Exports Registry Key To a File

Detects the export of the target Registry key to a file.

WindowsProcess Creation
TA0010 · ExfiltrationTA0007 · DiscoveryT1012 · Query Registry
Oddvar Moe+2Wed Oct 07windows
Detectionmediumtest

Imports Registry Key From a File

Detects the import of the specified file to the registry with regedit.exe.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Oddvar Moe+2Wed Oct 07windows
Detectionhightest

Imports Registry Key From an ADS

Detects the import of a alternate datastream to the registry with regedit.exe.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Oddvar Moe+2Mon Oct 12windows
Detectionhightest

Suspicious Registry Modification From ADS Via Regini.EXE

Detects the import of an alternate data stream with regini.exe, regini.exe can be used to modify registry keys.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Eli Salem+2Mon Oct 12windows
Detectionlowtest

Registry Modification Via Regini.EXE

Detects the execution of regini.exe which can be used to modify registry keys, the changes are imported from one or more text files.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Eli Salem+2Thu Oct 08windows
Detectionmediumtest

Suspicious File Characteristics Due to Missing Fields

Detects Executables in the Downloads folder without FileVersion,Description,Product,Company likely created with py2exe

WindowsProcess Creation
TA0002 · ExecutionT1059.006 · Python
Markus Neis+1Thu Nov 22windows
Detectionhighexperimental

New RUN Key Pointing to Suspicious Folder

Detects suspicious new RUN key element pointing to an executable in a suspicious folder

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder
Florian Roth (Nextron Systems)+3Sat Aug 25windows