Rule Library

Sigma Rules

17 rules found for "Sreeman"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Uncommon Child Process Of Appvlp.EXE

Detects uncommon child processes of Appvlp.EXE Appvlp or the Application Virtualization Utility is included with Microsoft Office. Attackers are able to abuse "AppVLP" to execute shell commands. Normally, this binary is used for Application Virtualization, but it can also be abused to circumvent the ASR file path rule folder or to mark a file as a system file.

WindowsProcess Creation
T1218 · System Binary Proxy ExecutionTA0005 · Defense EvasionTA0002 · Execution
SreemanFri Mar 13windows
Detectionmediumtest

Monitoring For Persistence Via BITS

BITS will allow you to schedule a command to execute after a successful download to notify you that the job is finished. When the job runs on the system the command specified in the BITS job will be executed. This can be abused by actors to create a backdoor within the system and for persistence. It will be chained in a BITS job to schedule the download of malware/additional binaries and execute the program after being downloaded.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1197 · BITS Jobs
SreemanThu Oct 29windows
Detectionhightest

File Download with Headless Browser

Detects execution of chromium based browser in headless mode using the "dump-dom" command line to download files

WindowsProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1564.003 · Hidden Window
Sreeman+1Tue Jan 04windows
Detectionhightest

Curl Download And Execute Combination

Adversaries can use curl to download payloads remotely and execute them. Curl is included by default in Windows 10 build 17063 and later.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Sreeman+1Mon Jan 13windows
Detectioncriticaltest

Persistence Via Sticky Key Backdoor

By replacing the sticky keys executable with the local admins CMD executable, an attacker is able to access a privileged windows console session without authenticating to the system. When the sticky keys are "activated" the privilleged shell is launched.

WindowsProcess Creation
TA0003 · PersistenceT1546.008 · Accessibility FeaturesTA0004 · Privilege Escalation
SreemanTue Feb 18windows
Detectionmediumtest

Potential Fake Instance Of Hxtsr.EXE Executed

HxTsr.exe is a Microsoft compressed executable file called Microsoft Outlook Communications. HxTsr.exe is part of Outlook apps, because it resides in a hidden "WindowsApps" subfolder of "C:\Program Files". Any instances of hxtsr.exe not in this folder may be malware camouflaging itself as HxTsr.exe

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
SreemanFri Apr 17windows
Detectionmediumtest

Dropping Of Password Filter DLL

Detects dropping of dll files in system32 that may be used to retrieve user credentials from LSASS

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556.002 · Password Filter DLL
SreemanThu Oct 29windows
Detectionmediumtest

Write Protect For Storage Disabled

Detects applications trying to modify the registry in order to disable any write-protect property for storage devices. This could be a precursor to a ransomware attack and has been an observed technique used by cypherpunk group.

WindowsProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defenses
SreemanFri Jun 11windows
Detectionmediumtest

Potential Persistence Via Microsoft Compatibility Appraiser

Detects manual execution of the "Microsoft Compatibility Appraiser" task via schtasks. In order to trigger persistence stored in the "\AppCompatFlags\TelemetryController" registry key.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
SreemanTue Sep 29windows
Detectionmediumtest

Potential Persistence Attempt Via Existing Service Tampering

Detects the modification of an existing service in order to execute an arbitrary payload when the service is started or killed as a potential method for persistence.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1543.003 · Windows Service+1
SreemanTue Sep 29windows
Detectionmediumtest

Arbitrary Shell Command Execution Via Settingcontent-Ms

The .SettingContent-ms file type was introduced in Windows 10 and allows a user to create "shortcuts" to various Windows 10 setting pages. These files are simply XML and contain paths to various Windows 10 settings binaries.

WindowsProcess Creation
T1204 · User ExecutionT1566.001 · Spearphishing AttachmentTA0002 · ExecutionTA0001 · Initial Access
SreemanFri Mar 13windows
Detectionmediumtest

Writing Of Malicious Files To The Fonts Folder

Monitors for the hiding possible malicious files in the C:\Windows\Fonts\ location. This folder doesn't require admin privillege to be written and executed from.

WindowsProcess Creation
T1211 · Exploitation for Defense EvasionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionTA0003 · Persistence+1
SreemanTue Apr 21windows
Detectionhightest

Tasks Folder Evasion

The Tasks folder in system32 and syswow64 are globally writable paths. Adversaries can take advantage of this and load or influence any script hosts or ANY .NET Application in Tasks to load and execute a custom assembly into cscript, wscript, regsvr32, mshta, eventvwr

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceTA0002 · Execution+1
SreemanMon Jan 13windows
Detectionmediumtest

Install New Package Via Winget Local Manifest

Detects usage of winget to install applications via manifest file. Adversaries can abuse winget to download payloads remotely and execute them. The manifest option enables you to install an application by passing in a YAML file directly to the client. Winget can be used to download and install exe, msi or msix files later.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Sreeman+2Tue Apr 21windows
Detectionhightest

Proxy Execution Via Wuauclt.EXE

Detects the use of the Windows Update Client binary (wuauclt.exe) for proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Execution
Roberto Rodriguez (Cyb3rWard0g)+4Mon Oct 12windows
Detectionhightest

Potential Registry Persistence Attempt Via Windows Telemetry

Detects potential persistence behavior using the windows telemetry registry key. Windows telemetry makes use of the binary CompatTelRunner.exe to run a variety of commands and perform the actual telemetry collections. This binary was created to be easily extensible, and to that end, it relies on the registry to instruct on which commands to run. The problem is, it will run any arbitrary command without restriction of location or type.

WindowsRegistry Set
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task
Lednyov Alexey+2Fri Oct 16windows
Emerging Threathightest

PwnKit Local Privilege Escalation

Detects potential PwnKit exploitation CVE-2021-4034 in auth logs

Linuxauth
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.001 · Setuid and Setgiddetection.emerging-threats+1
SreemanWed Jan 262021