Rule Library

Sigma Rules

28 rules found for "Thomas Patzke"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumstable

Django Framework Exceptions

Detects suspicious Django web application framework exceptions that could indicate exploitation attempts

djangoapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSat Aug 05application
Detectionmediumstable

Python SQL Exceptions

Generic rule for SQL exceptions in Python according to PEP 249

pythonapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSat Aug 12application
Detectionmediumstable

Ruby on Rails Framework Exceptions

Detects suspicious Ruby on Rails exceptions that could indicate exploitation attempts

ruby_on_railsapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSun Aug 06application
Detectionmediumstable

Spring Framework Exceptions

Detects suspicious Spring framework exceptions that could indicate exploitation attempts

springapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSun Aug 06application
Detectionhightest

RDP Login from Localhost

RDP login with localhost source address may be a tunnelled login

Windowssecurity
TA0008 · Lateral Movement2013-07-002 · CAR 2013-07-002T1021.001 · Remote Desktop Protocol
Thomas PatzkeMon Jan 28windows
Detectionlowstable

Successful Account Login Via WMI

Detects successful logon attempts performed with WMI

Windowssecurity
TA0002 · ExecutionT1047 · Windows Management Instrumentation
Thomas PatzkeWed Dec 04windows
Detectioninformationalstable

Failed Code Integrity Checks

Detects code integrity failures such as missing page hashes or corrupted drivers due unauthorized modification. This could be a sign of tampered binaries.

Windowssecurity
TA0005 · Defense EvasionT1027.001 · Binary Padding
Thomas PatzkeTue Dec 03windows
Detectioncriticaltest

WCE wceaux.dll Access

Detects wceaux.dll access while WCE pass-the-hash remote command execution on source host

Windowssecurity
TA0006 · Credential AccessT1003 · OS Credential DumpingS0005 · S0005
Thomas PatzkeWed Jun 14windows
Detectionmediumtest

Potential Secure Deletion with SDelete

Detects files that have extensions commonly seen while SDelete is used to wipe files.

Windowssecurity
TA0040 · ImpactTA0005 · Defense EvasionT1070.004 · File DeletionT1027.005 · Indicator Removal from Tools+3
Thomas PatzkeWed Jun 14windows
Detectionmediumstable

A New Trust Was Created To A Domain

Addition of domains is seldom and should be verified for legitimacy.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Thomas PatzkeTue Dec 03windows
Detectionmediumstable

Addition of SID History to Active Directory Object

An attacker can use the SID history attribute to gain additional privileges.

Windowssecurity
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1134.005 · SID-History Injection
Thomas PatzkeSun Feb 19windows
Detectionhighstable

Password Change on Directory Service Restore Mode (DSRM) Account

Detects potential attempts made to set the Directory Services Restore Mode administrator password. The Directory Service Restore Mode (DSRM) account is a local administrator account on Domain Controllers. Attackers may change the password in order to obtain persistence.

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Thomas PatzkeSun Feb 19windows
Detectionmediumtest

PsExec Service Installation

Detects PsExec service installation and execution events

Windowssystem
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Thomas PatzkeMon Jun 12windows
Detectionhightest

HackTool - CACTUSTORCH Remote Thread Creation

Detects remote thread creation from CACTUSTORCH as described in references.

WindowsRemote Thread Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0002 · ExecutionT1055.012 · Process Hollowing+3
Thomas PatzkeFri Feb 01windows
Detectionhighstable

Password Dumper Remote Thread in LSASS

Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundreds of events.

WindowsRemote Thread Creation
TA0006 · Credential AccessS0005 · S0005T1003.001 · LSASS Memory
Thomas PatzkeSun Feb 19windows
Detectionmediumtest

Suspicious DNS Query for IP Lookup Service APIs

Detects DNS queries for IP lookup services such as "api.ipify.org" originating from a non browser process.

WindowsDNS Query
TA0043 · ReconnaissanceT1590 · Gather Victim Network Information
Brandon George (blog post)+1Thu Jul 08windows
Detectionmediumexperimental

ADExplorer Writing Complete AD Snapshot Into .dat File

Detects the dual use tool ADExplorer writing a complete AD snapshot into a .dat file. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

WindowsFile Event
TA0007 · DiscoveryT1087.002 · Domain AccountT1069.002 · Domain GroupsT1482 · Domain Trust Discovery
Arnim Rupp (Nextron Systems)+1Wed Jul 09windows
Detectionlowtest

PsExec Service File Creation

Detects default PsExec service filename which indicates PsExec service installation and execution

WindowsFile Event
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Thomas PatzkeMon Jun 12windows
Detectionhightest

WMI Persistence - Script Event Consumer File Write

Detects file writes of WMI script event consumer

WindowsFile Event
TA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event SubscriptionTA0003 · Persistence
Thomas PatzkeWed Mar 07windows
Detectionhightest

WMI Persistence - Command Line Event Consumer

Detects WMI command line event consumers

WindowsImage Load (DLL)
TA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event SubscriptionTA0003 · Persistence
Thomas PatzkeWed Mar 07windows
Detectionmediumtest

Potentially Suspicious GrantedAccess Flags On LSASS

Detects process access requests to LSASS process with potentially suspicious access flags

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatz
Florian Roth (Nextron Systems)+9Mon Nov 22windows
Detectionhighstable

HackTool - CrackMapExec Execution Patterns

Detects various execution patterns of the CrackMapExec pentesting framework

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1047 · Windows Management Instrumentation+4
Thomas PatzkeFri May 22windows
Detectionhightest

HackTool - CrackMapExec PowerShell Obfuscation

The CrachMapExec pentesting framework implements a PowerShell obfuscation with some static strings detected by this rule.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027.005 · Indicator Removal from Tools
Thomas PatzkeFri May 22windows
Detectionmediumtest

Invocation of Active Directory Diagnostic Tool (ntdsutil.exe)

Detects execution of ntdsutil.exe, which can be used for various attacks against the NTDS database (NTDS.DIT)

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Thomas PatzkeWed Jan 16windows
Detectionhightest

Suspicious Spool Service Child Process

Detects suspicious print spool service (spoolsv.exe) child processes.

WindowsProcess Creation
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Justin C.+1Sun Jul 11windows
Detectionmediumtest

PsExec Service Execution

Detects launch of the PSEXESVC service, which means that this system was the target of a psexec remote execution

WindowsProcess Creation
TA0002 · Execution
Thomas Patzke+2Mon Jun 12windows
Detectionhightest

Suspicious Process By Web Server Process

Detects potentially suspicious processes being spawned by a web server process which could be the result of a successfully placed web shell or exploitation

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1505.003 · Web ShellT1190 · Exploit Public-Facing Application
Thomas Patzke+4Wed Jan 16windows
Detectionmediumtest

WMI Persistence - Script Event Consumer

Detects WMI script event consumers

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1546.003 · Windows Management Instrumentation Event Subscription
Thomas PatzkeWed Mar 07windows