Rule Library

Sigma Rules

7 rules found for "TheDFIRReport"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathightest

Exploitation Attempt Of CVE-2020-1472 - Execution of ZeroLogon PoC

Detects the execution of the commonly used ZeroLogon PoC executable.

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1210 · Exploitation of Remote Servicescve.2020-1472+1
kostastsale+1Sat Feb 122020
Emerging Threathightest

CVE-2021-44077 POC Default Dropped File

Detects the creation of "msiexec.exe" in the "bin" directory of the ManageEngine SupportCenter Plus (Related to CVE-2021-44077) and public POC available (See references section)

WindowsFile Event
TA0002 · Executioncve.2021-44077detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Mon Jun 062021
Emerging Threathightest

Potential CVE-2021-44228 Exploitation Attempt - VMware Horizon

Detects potential initial exploitation attempts against VMware Horizon deployments running a vulnerable versions of Log4j.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-44228detection.emerging-threats
kostastsaleFri Jan 142021
Emerging Threathightest

Potential Bumblebee Remote Thread Creation

Detects remote thread injection events based on action seen used by bumblebee

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell+1
Nasreddine Bencherchali (Nextron Systems)Tue Sep 272022
Emerging Threathightest

IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32

Detects RunDLL32.exe executing a single digit DLL named "1.dll" with the export function "DllRegisterServer". This behaviour was often seen used by malware and especially IcedID

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Aug 312023
Emerging Threathightest

Potential CSharp Streamer RAT Loading .NET Executable Image

Detects potential CSharp Streamer RAT loading .NET executable image by using the default file name and path associated with the tool.

WindowsImage Load (DLL)
TA0011 · Command and Controlattack.t1219.002detection.emerging-threats
Luca Di BartolomeoSat Jun 222024
Emerging Threathighexperimental

Grixba Malware Reconnaissance Activity

Detects execution of the Grixba reconnaissance tool based on suspicious command-line parameter combinations. This tool is used by the Play ransomware group for network enumeration, data gathering, and event log clearing.

WindowsProcess Creation
TA0043 · ReconnaissanceT1595.001 · Scanning IP BlocksTA0007 · DiscoveryT1046 · Network Service Discovery+1
yxinmiracle+1Wed Nov 262025