Rule Library

Sigma Rules

3 rules found for "Swachchhanda Shrawan Poudel (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Threat Huntlowexperimental

Successful MSIX/AppX Package Installation

Detects successful MSIX/AppX package installations on Windows systems by monitoring EventID 854 in the Microsoft-Windows-AppXDeployment-Server/Operational log. While most installations are legitimate, this can help identify unauthorized or suspicious package installations. It is crucial to monitor such events as threat actors may exploit MSIX/AppX packages to deliver and execute malicious payloads.

Windowsappxdeployment-server
TA0002 · ExecutionT1204.002 · Malicious Filedetection.threat-hunting
Michael Haag+1Mon Nov 03windows
Threat Huntmediumexperimental

WerFaultSecure Loading DbgCore or DbgHelp - EDR-Freeze

Detects the loading of dbgcore.dll or dbghelp.dll by WerFaultSecure.exe, which has been observed in EDR-Freeze attacks to suspend processes and evade detection. However, this behavior has also been observed during normal software installations, so further investigation is required to confirm malicious activity. When threat hunting, look for this activity in conjunction with other suspicious processes starting, network connections, or file modifications that occur shortly after the DLL load. Pay special attention to timing - if other malicious activities occur during or immediately after this library loading, it may indicate EDR evasion attempts. Also correlate with any EDR/AV process suspension events or gaps in security monitoring during the timeframe.

WindowsImage Load (DLL)
TA0005 · Defense EvasionT1562.001 · Disable or Modify Toolsdetection.threat-hunting
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Threat Huntlowexperimental

Process Execution From WebDAV Share

Detects execution of processes with image paths starting with WebDAV shares (\\), which might indicate malicious file execution from remote web shares. Execution of processes from WebDAV shares can be a sign of lateral movement or exploitation attempts, especially if the process is not a known legitimate application. Exploitation Attempt of vulnerabilities like CVE-2025-33053 also involves executing processes from WebDAV paths.

WindowsProcess Creation
TA0002 · ExecutionTA0011 · Command and ControlTA0008 · Lateral MovementT1105 · Ingress Tool Transfer+1
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 13windows